Zahid Anwar

According to our database1, Zahid Anwar authored at least 41 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds.
IEEE Trans. Cloud Computing, 2018

A thin client friendly trusted execution framework for infrastructure-as-a-service clouds.
Future Generation Comp. Syst., 2018

A generic framework for application streaming service.
Computers & Electrical Engineering, 2018

STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

2017
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++.
IEEE Trans. Services Computing, 2017

Data-driven analytics for cyber-threat intelligence and information sharing.
Computers & Security, 2017

IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Computers & Security, 2017

IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things.
IEEE Access, 2017

Data mining techniques and applications - A decade review.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

2016
A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm.
Multimedia Tools Appl., 2016

Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges.
J. Network and Computer Applications, 2016

A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms.
Computers & Security, 2016

Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
RRW - A Robust and Reversible Watermarking Technique for Relational Data.
IEEE Trans. Knowl. Data Eng., 2015

Storage schema and ontology-independent SPARQL to HiveQL translation.
The Journal of Supercomputing, 2015

A survey on reversible watermarking techniques for relational databases.
Security and Communication Networks, 2015

Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs.
Security and Communication Networks, 2015

2014
Semantic security against web application attacks.
Inf. Sci., 2014

Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies.
IEEE Communications Letters, 2014

Ontology for attack detection: An intelligent approach to web application security.
Computers & Security, 2014

secCloudSim: Secure Cloud Simulator.
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

2013
SOAD: Securing Oncology EMR by Anonymizing DICOM Images.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

GSAN: Green Cloud-Simulation for Storage Area Networks.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

2011
Digital Forensics for Eucalyptus.
Proceedings of the 2011 Frontiers of Information Technology, 2011

SWAM: Stuxnet Worm Analysis in Metasploit.
Proceedings of the 2011 Frontiers of Information Technology, 2011

DOFUR: DDoS Forensics Using MapReduce.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Trusted Framework for Health Information Exchange.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Design and Deployment of a Trusted Eucalyptus Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2009
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures.
IJCIP, 2009

An Integer Programming Model and Heuristic Algorithm for Automatic Scheduling in Synchrotron Facilities.
Proceedings of the IEEE International Conference on Systems, 2009

2008
Automated Assessment Of Compliance With Security Best Practices.
Proceedings of the Critical Infrastructure Protection II, 2008

Automatic security assessment of critical cyber-infrastructures.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

2006
Multiple design patterns for voice over IP (VoIP) security.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

A First Step Towards Call Survivability in Cellular Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...