default search action
Mohammad Zulkernine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Youssef Yamout, Tashaffi Samin Yeasar, Shahrear Iqbal, Mohammad Zulkernine:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. ACM Comput. Surv. 56(2): 45:1-45:35 (2024) - [j50]Weihan Ou, Steven H. H. Ding, Mohammad Zulkernine, Li Tao Li, Sarah Labrosse:
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning. ACM Trans. Priv. Secur. 27(3): 26:1-26:37 (2024) - [c181]Adel Abusitta, Talal Halabi, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments. ICC 2024: 4644-4649 - [c180]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Building Secure Software for Smart Aging Care Systems: An Agile Approach. QRS 2024: 562-571 - 2023
- [j49]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
AIM: An Android Interpretable Malware detector based on application class modeling. J. Inf. Secur. Appl. 75: 103486 (2023) - [j48]Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions. IEEE Trans. Veh. Technol. 72(4): 5079-5093 (2023) - [j47]Akib Anwar, Anika Anwar, Lama Moukahal, Mohammad Zulkernine:
Security assessment of in-vehicle communication protocols. Veh. Commun. 44: 100639 (2023) - [c179]Talal Halabi, Mohammad Zulkernine:
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. SSE 2023: 256-261 - [c178]Nilesh Chakraborty, Youssef Yamout, Mohammad Zulkernine:
The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords. CNS 2023: 1-5 - [c177]Maryam Davari, Mohammad Zulkernine:
Automatic Conversion of ABAC Policies for RBAC Systems. DSC 2023: 1-7 - [c176]Dominic Phillips, Talal Halabi, Mohammad Zulkernine:
Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. DSA 2023: 770-781 - [c175]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware. FPS (1) 2023: 269-284 - [c174]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET. ICC 2023: 3762-3767 - [c173]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective. ICDH 2023: 1-12 - [c172]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks. ISSREW 2023: 57-62 - [c171]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
A VeReMi-based Dataset for Predicting the Effect of Attacks in VANETs. MSWiM 2023: 175-179 - [c170]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks. RSSRail 2023: 22-39 - [c169]Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. UbiSec 2023: 319-334 - [e4]Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - 2022
- [j46]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory. Internet Things 20: 100631 (2022) - [j45]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
CamoDroid: An Android application analysis environment resilient against sandbox evasion. J. Syst. Archit. 125: 102452 (2022) - [j44]Karim Lounis, Ziad Mansour, Michael Wrana, Marwa A. Elsayed, Steven H. H. Ding, Mohammad Zulkernine:
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 58(6): 5586-5606 (2022) - [j43]Michael Wrana, Marwa Elsayed, Karim Lounis, Ziad Mansour, Steven H. H. Ding, Mohammad Zulkernine:
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation. ACM Trans. Cyber Phys. Syst. 6(4): 33:1-33:27 (2022) - [j42]Marwa A. Elsayed, Michael Wrana, Ziad Mansour, Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 23459-23473 (2022) - [j41]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
A coalitional security game against data integrity attacks in autonomous vehicle networks. Veh. Commun. 37: 100517 (2022) - [c168]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. ARES 2022: 57:1-57:10 - [c167]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the Standing Committee Vice Chairs. COMPSAC 2022: xl - [c166]Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine:
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. DSC 2022: 1-8 - [c165]Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Through Diagonally Distributed Matrix Matching. DSA 2022: 390-402 - [c164]Aawista Chaudhry, Talal Halabi, Mohammad Zulkernine:
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications. DSN Workshops 2022: 1-7 - [c163]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
Detecting Intrusions in Communication-Based Train Control Systems. ICC 2022: 4193-4198 - [c162]Yunke Liu, Jianbing Ni, Mohammad Zulkernine:
AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency. ICC 2022: 4402-4407 - [c161]Abu Faisal, Mohammad Zulkernine:
DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure. ICISS 2022: 23-43 - [c160]Maryam Davari, Mohammad Zulkernine:
Mining Attribute-Based Access Control Policies. ICISS 2022: 186-201 - [c159]Jeremy Banks, Ryan Kerr, Steven H. H. Ding, Mohammad Zulkernine:
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments. MILCOM 2022: 522-528 - [c158]Abu Faisal, Mohammad Zulkernine:
SAS-GKE: A Secure Authenticated Scalable Group Key Exchange. QRS 2022: 571-582 - [c157]Maryam Davari, Mohammad Zulkernine:
Classification-Based Anomaly Prediction in XACML Policies. SecureComm 2022: 3-19 - 2021
- [j40]Karim Lounis, Mohammad Zulkernine:
T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT. IEEE Access 9: 137384-137405 (2021) - [j39]Farnood Faghihi, Mohammad Zulkernine:
RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware. Comput. Networks 191: 108011 (2021) - [j38]Claudio Demartini, Leila De Floriani, Ji-Jiang Yang, Alfredo Cuzzocrea, Hossain Shahriar, Sorel Reisman, Mohammad Zulkernine:
IEEE COMPSAC 2022. Computer 54(12): 27 (2021) - [j37]Abu Faisal, Mohammad Zulkernine:
A secure architecture for TCP/UDP-based cloud communications. Int. J. Inf. Sec. 20(2): 161-179 (2021) - [j36]Aleem Khalid Alvi, Mohammad Zulkernine:
A security pattern detection framework for building more secure software. J. Syst. Softw. 171: 110838 (2021) - [j35]Talal Halabi, Omar Abdel Wahab, Ranwa Al Mallah, Mohammad Zulkernine:
Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game. IEEE Trans. Reliab. 70(3): 970-985 (2021) - [j34]Lama Moukahal, Mohammad Zulkernine, Martin Soukup:
Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems. IEEE Trans. Reliab. 70(4): 1422-1437 (2021) - [c156]Lama Moukahal, Mohammad Zulkernine, Martin Soukup:
AVSDA: Autonomous Vehicle Security Decay Assessment. CRiSIS 2021: 20-37 - [c155]Maryam Davari, Mohammad Zulkernine:
Policy Modeling and Anomaly Detection in ABAC Policies. CRiSIS 2021: 137-152 - [c154]Najmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine:
Reinforcement Learning-driven Attack on Road Traffic Signal Controllers. CSR 2021: 218-225 - [c153]Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3. FPS 2021: 235-252 - [c152]Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Towards a Secure Software Lifecycle for Autonomous Vehicles. ISSRE Workshops 2021: 371-377 - [c151]Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems. QRS Companion 2021: 516-527 - [c150]Dominic Phillips, Marwa A. Elsayed, Mohammad Zulkernine:
DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles. QRS Companion 2021: 528-535 - [i1]Karim Lounis, Mohammad Zulkernine:
More Lessons: Analysis of PUF-based Authentication Protocols for IoT. IACR Cryptol. ePrint Arch. 2021: 1509 (2021) - 2020
- [j33]Marwa Elsayed, Mohammad Zulkernine:
PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access 8: 45184-45197 (2020) - [j32]Karim Lounis, Mohammad Zulkernine:
Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access 8: 88892-88932 (2020) - [j31]Lama Moukahal, Marwa A. Elsayed, Mohammad Zulkernine:
Vehicle Software Engineering (VSE): Research and Practice. IEEE Internet Things J. 7(10): 10137-10149 (2020) - [j30]Joey Sun, Shahrear Iqbal, Najmeh Seifollahpour Arabi, Mohammad Zulkernine:
A classification of attacks to In-Vehicle Components (IVCs). Veh. Commun. 25: 100253 (2020) - [c149]Karim Lounis, Mohammad Zulkernine:
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs. CRiSIS 2020: 49-66 - [c148]Congwei Chen, Marwa A. Elsayed, Mohammad Zulkernine:
HBD-Authority: Streaming Access Control Model for Hadoop. DependSys 2020: 16-25 - [c147]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Reliability-based Formation of Cloud Federations Using Game Theory. GLOBECOM 2020: 1-6 - [c146]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation. ICC 2020: 1-7 - [c145]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Optimizing Virtual Machine Migration in Multi-Clouds. ISNCC 2020: 1-7 - [c144]Talal Halabi, Omar Abdel Wahab, Mohammad Zulkernine:
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems. NOMS 2020: 1-6 - [c143]Syed Akib Anwar Hridoy, Mohammad Zulkernine:
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network. SecureComm (2) 2020: 215-234 - [c142]Karim Lounis, Mohammad Zulkernine:
Exploiting Race Condition for Wi-Fi Denial of Service Attacks. SIN 2020: 2:1-2:8
2010 – 2019
- 2019
- [j29]Marwa Elsayed, Mohammad Zulkernine:
Offering security diagnosis as a service for cloud SaaS applications. J. Inf. Secur. Appl. 44: 32-48 (2019) - [c141]Abu Faisal, Mohammad Zulkernine:
Graphene: A Secure Cloud Communication Architecture. ACNS Workshops 2019: 51-69 - [c140]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi:
STPSA 2019 Welcome Message. COMPSAC (2) 2019: 567-568 - [c139]Juan Wang, Karim Lounis, Mohammad Zulkernine:
Security Features for Proximity Verification. COMPSAC (2) 2019: 592-597 - [c138]Juan Wang, Karim Lounis, Mohammad Zulkernine:
CSKES: A Context-Based Secure Keyless Entry System. COMPSAC (1) 2019: 817-822 - [c137]Karim Lounis, Mohammad Zulkernine:
WPA3 Connection Deprivation Attacks. CRiSIS 2019: 164-176 - [c136]Karim Lounis, Mohammad Zulkernine:
Bluetooth Low Energy Makes "Just Works" Not Work. CSNet 2019: 99-106 - [c135]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. CSNet 2019: 114-121 - [c134]Talal Halabi, Mohammad Zulkernine:
Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game. DSN Workshops 2019: 78-85 - [c133]Md Swawibe Ul Alam, Shahrear Iqbal, Mohammad Zulkernine, Clifford Liem:
Securing Vehicle ECU Communications and Stored Data. ICC 2019: 1-6 - [c132]Talal Halabi, Mohammad Zulkernine:
Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles. ICC 2019: 1-6 - [c131]Lama Moukahal, Mohammad Zulkernine:
Security Vulnerability Metrics for Connected Vehicles. QRS Companion 2019: 17-23 - [c130]Karim Lounis, Mohammad Zulkernine:
Bad-token: denial of service attacks on WPA3. SIN 2019: 15:1-15:8 - [c129]Shahrear Iqbal, Anwar Haque, Mohammad Zulkernine:
Towards a Security Architecture for Protecting Connected Vehicles from Malware. VTC Spring 2019: 1-5 - 2018
- [j28]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
DADI: Defending against distributed denial of service in information-centric networking routing and caching. Secur. Priv. 1(2) (2018) - [j27]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Preventing unauthorized access in information centric networking. Secur. Priv. 1(4) (2018) - [j26]Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
Protecting Internet users from becoming victimized attackers of click-fraud. J. Softw. Evol. Process. 30(3) (2018) - [c128]Marwa Elsayed, Mohammad Zulkernine:
Towards Security Monitoring for Cloud Analytic Applications. BigDataSecurity/HPSC/IDS 2018: 69-78 - [c127]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the STPSA 2018 Workshop Organizers. COMPSAC (2) 2018: 460-461 - [c126]Karim Lounis, Mohammad Zulkernine:
Connection Dumping Vulnerability Affecting Bluetooth Availability. CRiSIS 2018: 188-204 - [c125]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
A Security Framework for ICN Traffic Management. DASC/PiCom/DataCom/CyberSciTech 2018: 78-85 - [c124]Jia Wan, Mohammad Zulkernine, Clifford Liem:
A Dynamic App Anti-Debugging Approach on Android ART Runtime. DASC/PiCom/DataCom/CyberSciTech 2018: 560-567 - [c123]Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers:
Securing Web Applications with Secure Coding Practices and Integrity Verification. DASC/PiCom/DataCom/CyberSciTech 2018: 618-625 - [c122]A. B. M. Bodrul Alam, Anwar Haque, Mohammad Zulkernine:
CREM: A Cloud Reliability Evaluation Model. GLOBECOM 2018: 1-6 - [c121]Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Context-Aware Privacy Scheme for Crisis Situations. GLOBECOM 2018: 1-6 - [c120]Marwa A. Elsayed, Mohammad Zulkernine:
Integrating Security in Cloud Application Development Cycle. ICSSA 2018: 13-18 - [c119]Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine:
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. ICSSA 2018: 62-66 - [c118]Shahrear Iqbal, Mohammad Zulkernine:
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. MALWARE 2018: 33-40 - [c117]Marwa Elsayed, Mohammad Zulkernine:
A Taxonomy of Security as a Service. OTM Conferences (2) 2018: 305-312 - 2017
- [c116]Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem:
TRUST-CAP: A Trust Model for Cloud-Based Applications. COMPSAC (2) 2017: 584-589 - [c115]Katsuyoshi Iida, Mohammad Zulkernine:
Message from SEPT 2017 Organizing Committee. COMPSAC (1) 2017: 585 - [c114]Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem:
Towards defending connected vehicles against attacks. ECBS 2017: 9:1-9:9 - [c113]M. D. Siam Hasan, Thomas R. Dean, Fahim T. Imam, Francisco Garcia, Sylvain P. Leblanc, Mohammad Zulkernine:
A Constraint-based intrusion detection system. ECBS 2017: 12:1-12:10 - [c112]Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Participant Contribution Trust Scheme for Crisis Response Systems. GLOBECOM 2017: 1-6 - [c111]Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Using Ordered Matrix Matching. ICSSA 2017: 38-43 - [c110]Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar:
An Automatic Software Vulnerability Classification Framework. ICSSA 2017: 44-49 - [c109]Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem:
Defending Application Cache Integrity of Android Runtime. ISPEC 2017: 727-746 - [c108]Md. Shahrear Iqbal, Mohammad Zulkernine:
Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts. ISC 2017: 329-347 - [c107]Saeed Shafieian, Daniel Smith, Mohammad Zulkernine:
Detecting DNS Tunneling Using Ensemble Learning. NSS 2017: 112-127 - [c106]Md. Shahrear Iqbal, Mohammad Zulkernine:
Flamingo: a framework for smartphone security context management. SAC 2017: 563-568 - [c105]A. B. M. Bodrul Alam, Mohammad Zulkernine, Anwar Haque:
A Reliability-Based Resource Allocation Approach for Cloud Computing. SC² 2017: 249-252 - [e3]Mohammad Zulkernine, Mohammad Mahfuzul Islam:
International Conference on Networking, Systems and Security, NSysS 2017, Dhaka, Bangladesh, January 5-8, 2017. IEEE 2017, ISBN 978-1-5090-3260-0 [contents] - 2016
- [j25]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, Mohammad Zulkernine:
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. Empir. Softw. Eng. 21(3): 896-931 (2016) - [j24]Peter J. Clarke, Mohammad Zulkernine:
Special issue on High Assurance Systems Engineering. Softw. Qual. J. 24(1): 3-5 (2016) - [c104]Marwa Elsayed, Mohammad Zulkernine:
IFCaaS: Information Flow Control as a Service for Cloud Security. ARES 2016: 211-216 - [c103]Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. COMPSAC Workshops 2016: 381 - [c102]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c101]Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Reputation System to Evaluate Participants for Participatory Sensing. GLOBECOM 2016: 1-6 - [c100]Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
FCFraud: Fighting Click-Fraud from the User Side. HASE 2016: 157-164 - [c99]Saikat Das, Mohammad Zulkernine:
CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. HASE 2016: 268-275 - [c98]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
DACPI: A decentralized access control protocol for information centric networking. ICC 2016: 1-6 - [c97]Md. Shahrear Iqbal, Mohammad Zulkernine:
Zonedroid: control your droid through application zoning. MALWARE 2016: 113-120 - [c96]Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine:
Intrusion detection in a private network by satisfying constraints. PST 2016: 623-628 - [c95]Maryam Davari, Mohammad Zulkernine:
Analysing vulnerability reproducibility for Firefox browser. PST 2016: 674-681 - [c94]Md. Shahrear Iqbal, Mohammad Zulkernine:
SAM: A secure anti-malware framework for the smartphone operating systems. WCNC 2016: 1-6 - 2015
- [j23]Eslam G. AbdAllah, Hossam S. Hassanein, Mohammad Zulkernine:
A Survey of Security Attacks in Information-Centric Networking. IEEE Commun. Surv. Tutorials 17(3): 1441-1454 (2015) - [j22]Marwa Elsayed, Mohammad Zulkernine:
A Classification of Intrusion Detection Systems in the Cloud. J. Inf. Process. 23(4): 392-401 (2015) - [j21]Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam:
An Empirical Evaluation of Web-Based Fingerprinting. IEEE Softw. 32(4): 46-52 (2015) - [c93]Saeed Shafieian, Mohammad Zulkernine, Anwar Haque:
CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud. CIT/IUCC/DASC/PICom 2015: 1733-1740 - [c92]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Detection and Prevention of Malicious Requests in ICN Routing and Caching. CIT/IUCC/DASC/PICom 2015: 1741-1748 - [c91]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c90]Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam:
FPGuard: Detection and Prevention of Browser Fingerprinting. DBSec 2015: 293-308 - 2014
- [j20]Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier:
Effective detection of vulnerable and malicious browser extensions. Comput. Secur. 47: 66-84 (2014) - [j19]Atef Shalan, Mohammad Zulkernine:
Software control flow error detection and correlation with system performance deviation. J. Comput. Syst. Sci. 80(5): 953-972 (2014) - [j18]Xiaoying Bai, Atilla Elçi, Mohammad Zulkernine:
Special issue on "Trustworthy Software Systems for the Digital Society". J. Syst. Softw. 89: 1-2 (2014) - [j17]Michael Misiu Godfrey, Mohammad Zulkernine:
Preventing Cache-Based Side-Channel Attacks in a Cloud Environment. IEEE Trans. Cloud Comput. 2(4): 395-408 (2014) - [c89]Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam:
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks. CRiSIS 2014: 196-212 - [c88]Josh Marston, Komminist Weldemariam, Mohammad Zulkernine:
On evaluating and securing firefox for Android browser extensions. MOBILESoft 2014: 27-36 - [c87]Mohannad A. Alswailim, Mohammad Zulkernine, Hossam S. Hassanein:
Classification of participatory sensing privacy schemes. LCN Workshops 2014: 761-767 - [c86]Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
A Hybrid Monitoring of Software Design-Level Security Specifications. QSIC 2014: 111-116 - [c85]Fehmi Jaafar, Foutse Khomh, Yann-Gaël Guéhéneuc, Mohammad Zulkernine:
Anti-pattern Mutations and Fault-proneness. QSIC 2014: 246-255 - [c84]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Countermeasures for Mitigating ICN Routing Related DDoS Attacks. SecureComm (2) 2014: 84-92 - [c83]Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:
FRanC: A Ranking Framework for the Prioritization of Software Maintenance. SERE (Companion) 2014: 31-40 - 2013
- [c82]Michael Misiu Godfrey, Mohammad Zulkernine:
A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud. IEEE CLOUD 2013: 163-170 - [c81]Ladan Tahvildari, Mohammad Zulkernine:
Quality software for quality service (QS4QS). CASCON 2013: 365-366 - [c80]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. COMPSAC 2013: 375-380 - [c79]Mohammad Zulkernine:
Software Assurance: What Should We Do Next? COMPSAC 2013: 478 - [c78]Anton Barua, Mohammad Zulkernine, Komminist Weldemariam:
Protecting Web Browser Extensions from JavaScript Injection Attacks. ICECCS 2013: 188-197 - [c77]Atef Shalan, Mohammad Zulkernine:
Runtime Prediction of Failure Modes from System Error Logs. ICECCS 2013: 232-241 - [c76]Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:
Towards a ranking framework for software components. SAC 2013: 495-498 - [c75]Umme Hunny, Mohammad Zulkernine, Komminist Weldemariam:
OSDC: adapting ODC for developing more secure software. SAC 2013: 1131-1136 - [c74]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications. SERE 2013: 188-197 - [c73]Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine:
A Model-Based Detection of Vulnerable and Malicious Browser Extensions. SERE 2013: 198-207 - 2012
- [j16]Hossain Shahriar, Mohammad Zulkernine:
Mitigating program security vulnerabilities: Approaches and challenges. ACM Comput. Surv. 44(3): 11:1-11:46 (2012) - [j15]Hossain Shahriar, Mohammad Zulkernine:
Trustworthiness testing of phishing websites: A behavior model-based approach. Future Gener. Comput. Syst. 28(8): 1258-1271 (2012) - [j14]Jongmoon Baik, Fabio Massacci, Mohammad Zulkernine:
Guest Editorial: Special section on software reliability and security. Inf. Softw. Technol. 54(12): 1376 (2012) - [c72]Aleem Khalid Alvi, Mohammad Zulkernine:
A Comparative Study of Software Security Pattern Classifications. ARES 2012: 582-589 - [c71]Hossain Shahriar, Mohammad Zulkernine:
Information-Theoretic Detection of SQL Injection Attacks. HASE 2012: 40-47 - [c70]Lorena Gutiérrez-Madronal, Hossain Shahriar, Mohammad Zulkernine, Juan José Domínguez-Jiménez, Inmaculada Medina-Bulo:
Mutation Testing of Event Processing Queries. ISSRE 2012: 21-30 - [c69]Atef Mohamed, Mohammad Zulkernine:
A Control Flow Representation for Component-Based Software Reliability Analysis. SERE 2012: 1-10 - [c68]Amatul Mohosina, Mohammad Zulkernine:
DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations. SERE 2012: 98-107 - [e2]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1990-4 [contents] - [e1]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5 [contents] - 2011
- [j13]Istehad Chowdhury, Mohammad Zulkernine:
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. J. Syst. Archit. 57(3): 294-313 (2011) - [j12]Hossain Shahriar, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. J. Syst. Softw. 84(2): 250-269 (2011) - [j11]Mohammad Zulkernine, Mohammad Kaykobad, Mohammed Yeasin, Mohammad Ataul Karim:
Guest Editorial. J. Softw. 6(1): 1-2 (2011) - [c67]Hossain Shahriar, Mohammad Zulkernine:
Injecting Comments to Detect JavaScript Code Injection Attacks. COMPSAC Workshops 2011: 104-109 - [c66]Xiaofeng Yang, Mohammad Zulkernine:
Security Monitoring of Components Using Aspects and Contracts in Wrappers. COMPSAC 2011: 566-575 - [c65]Hossain Shahriar, Mohammad Zulkernine:
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks. DASC 2011: 7-14 - [c64]Aleem Khalid Alvi, Mohammad Zulkernine:
A Natural Classification Scheme for Software Security Patterns. DASC 2011: 113-120 - [c63]Atef Mohamed, Mohammad Zulkernine:
A Connection-Based Signature Approach for Control Flow Error Detection. DASC 2011: 129-136 - [c62]Hossain Shahriar, Mohammad Zulkernine:
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor. DASC 2011: 137-144 - [c61]Anton Barua, Hossain Shahriar, Mohammad Zulkernine:
Server Side Detection of Content Sniffing Attacks. ISSRE 2011: 20-29 - [c60]Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
Building components with embedded security monitors. QoSA/ISARCS 2011: 133-142 - [c59]Hossain Shahriar, Mohammad Zulkernine:
Information Source-Based Classification of Automatic Phishing Website Detectors. SAINT 2011: 190-195 - 2010
- [j10]Hossain Shahriar, Mohammad Zulkernine:
Assessing Test Suites for Buffer Overflow Vulnerabilities. Int. J. Softw. Eng. Knowl. Eng. 20(1): 73-101 (2010) - [j9]Hossain Shahriar, Mohammad Zulkernine:
Monitoring Buffer Overflow Attacks: A Perennial Task. Int. J. Secur. Softw. Eng. 1(3): 18-40 (2010) - [c58]Hossain Shahriar, Mohammad Zulkernine:
Classification of Buffer Overflow Vulnerability Monitors. ARES 2010: 519-524 - [c57]Atef Mohamed, Mohammad Zulkernine:
The Level of Decomposition Impact on Component Fault Tolerance. COMPSAC Workshops 2010: 57-62 - [c56]Atef Mohamed, Mohammad Zulkernine:
A taxonomy of software architecture-based reliability efforts. SHARK@ICSE 2010: 44-51 - [c55]Atef Mohamed, Mohammad Zulkernine:
Architectural Design Decisions for Achieving Reliable Software Systems. ISARCS 2010: 19-32 - [c54]Hossain Shahriar, Mohammad Zulkernine:
Client-Side Detection of Cross-Site Request Forgery Attacks. ISSRE 2010: 358-367 - [c53]Istehad Chowdhury, Mohammad Zulkernine:
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? SAC 2010: 1963-1969 - [c52]Hossain Shahriar, Mohammad Zulkernine:
Classification of Static Analysis-Based Buffer Overflow Detectors. SSIRI (Companion) 2010: 94-101 - [c51]Atef Mohamed, Mohammad Zulkernine:
Failure Type-Aware Reliability Assessment with Component Failure Dependency. SSIRI 2010: 98-105 - [c50]Hossain Shahriar, Mohammad Zulkernine:
PhishTester: Automatic Testing of Phishing Attacks. SSIRI 2010: 198-207
2000 – 2009
- 2009
- [j8]Zhi Jian Zhu, Mohammad Zulkernine:
A model-based aspect-oriented framework for building intrusion-aware software systems. Inf. Softw. Technol. 51(5): 865-875 (2009) - [j7]Mohammad Gias Uddin, Mohammad Zulkernine, Sheikh Iqbal Ahamed:
Collaboration through computation: incorporating trust model into service-based software systems. Serv. Oriented Comput. Appl. 3(1): 47-63 (2009) - [c49]Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software. COMPSAC (2) 2009: 353-358 - [c48]Hossain Shahriar, Mohammad Zulkernine:
Automatic Testing of Program Security Vulnerabilities. COMPSAC (2) 2009: 550-555 - [c47]Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
Activity and Artifact Views of a Secure Software Development Process. CSE (3) 2009: 399-404 - [c46]Xiaofeng Yang, Mohammad Zulkernine:
Secure Method Calls by Instrumenting Bytecode with Aspects. DBSec 2009: 126-141 - [c45]Hossain Shahriar, Mohammad Zulkernine:
MUTEC: Mutation-based testing of Cross Site Scripting. SESS@ICSE 2009: 47-53 - [c44]Mohammad Gias Uddin, Mohammad Zulkernine:
ATM: an automatic trust monitoring algorithm for service software. SAC 2009: 1040-1044 - [c43]Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Sharif Hasan, Mohammad Zulkernine:
Towards developing a trust-based security solution. SAC 2009: 2204-2205 - [c42]Mohammad Zulkernine, Mohammad Feroz Raihan, Mohammad Gias Uddin:
Towards Model-Based Automatic Testing of Attack Scenarios. SAFECOMP 2009: 229-242 - 2008
- [j6]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Sailaja Bulusu, Mehrab Monjur:
Architecture and Implementation of a trust Model for Pervasive Applications. J. Mobile Multimedia 4(2): 84-103 (2008) - [j5]Jiong Zhang, Mohammad Zulkernine, Anwar Haque:
Random-Forests-Based Network Intrusion Detection Systems. IEEE Trans. Syst. Man Cybern. Part C 38(5): 649-659 (2008) - [c41]Yonghua You, Mohammad Zulkernine, Anwar Haque:
A Distributed Defense Framework for Flooding-Based DDoS Attacks. ARES 2008: 245-252 - [c40]Liwei Kuang, Mohammad Zulkernine:
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. ARES 2008: 319-326 - [c39]Sarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie:
Towards Incorporating Discrete-Event Systems in Secure Software Development. ARES 2008: 1188-1195 - [c38]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the STPSA 2008 Workshop Organizers. COMPSAC 2008: 653 - [c37]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
STPSA 2008 Workshop Organization. COMPSAC 2008: 654 - [c36]Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
Quantifying Security in Secure Software Development Phases. COMPSAC 2008: 955-960 - [c35]Hossain Shahriar, Mohammad Zulkernine:
Mutation-Based Testing of Buffer Overflow Vulnerabilities. COMPSAC 2008: 979-984 - [c34]Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. HASE 2008: 89-96 - [c33]Hossain Shahriar, Mohammad Zulkernine:
Mutation-Based Testing of Format String Bugs. HASE 2008: 229-238 - [c32]Atef Mohamed, Mohammad Zulkernine:
At What Level of Granularity Should We be Componentizing for Software Reliability? HASE 2008: 273-282 - [c31]Istehad Chowdhury, Brian Chan, Mohammad Zulkernine:
Security metrics for source code structures. SESS 2008: 57-64 - [c30]Hossain Shahriar, Mohammad Zulkernine:
MUSIC: Mutation-based SQL Injection Vulnerability Checking. QSIC 2008: 77-86 - [c29]Atef Mohamed, Mohammad Zulkernine:
On Failure Propagation in Component-Based Software Systems. QSIC 2008: 402-411 - [c28]Mohammad Gias Uddin, Mohammad Zulkernine:
UMLtrust: towards developing trust-aware software. SAC 2008: 831-836 - [c27]Liwei Kuang, Mohammad Zulkernine:
An anomaly intrusion detection method using the CSI-KNN algorithm. SAC 2008: 921-926 - [c26]Mohammad Gias Uddin, Mohammad Zulkernine, Sheikh Iqbal Ahamed:
CAT: a context-aware trust model for open and dynamic systems. SAC 2008: 2024-2029 - 2007
- [j4]Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan:
Integrating software specifications into intrusion detection. Int. J. Inf. Sec. 6(5): 345-357 (2007) - [j3]Mohammed Hussein, Mohammad Zulkernine:
Intrusion detection aware component-based systems: A specification-based framework. J. Syst. Softw. 80(5): 700-710 (2007) - [j2]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steven T. Wolfe:
A software-based trust framework for distributed industrial management systems. J. Syst. Softw. 80(10): 1621-1630 (2007) - [c25]Mohammad Feroz Raihan, Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. ARES 2007: 775-782 - [c24]Mohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine:
ACIR: An Aspect-Connector for Intrusion Response. COMPSAC (2) 2007: 249-254 - [c23]Zhi Jian Zhu, Mohammad Zulkernine:
Towards an Aspect-Oriented Intrusion Detection Framework. COMPSAC (1) 2007: 637-638 - [c22]Atef Mohamed, Mohammad Zulkernine:
Improving Reliability and Safety by Trading off Software Failure Criticalities. HASE 2007: 267-274 - [c21]Yonghua You, Mohammad Zulkernine, Anwar Haque:
Detecting Flooding-Based DDoS Attacks. ICC 2007: 1229-1234 - [c20]Mohammad Al-Subaie, Mohammad Zulkernine:
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. ICC 2007: 1391-1398 - [c19]Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque:
E-NIPS: An Event-Based Network Intrusion Prediction System. ISC 2007: 37-52 - [c18]Kashif Ali, Mohammad Zulkernine, Hossam S. Hassanein:
Packet Filtering Based on Source Router Marking and Hop-Count. LCN 2007: 1061-1068 - 2006
- [c17]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri:
A Dependable Device Discovery Approach for Pervasive Computing Middleware. ARES 2006: 66-73 - [c16]Jiong Zhang, Mohammad Zulkernine:
A Hybrid Network Intrusion Detection Technique Using Random Forests. ARES 2006: 262-269 - [c15]Steven T. Wolfe, Sheikh Iqbal Ahamed, Mohammad Zulkernine:
A Trust Framework for Pervasive Computing Environments. AICCSA 2006: 312-319 - [c14]Mohammad Al-Subaie, Mohammad Zulkernine:
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. COMPSAC (1) 2006: 325-332 - [c13]Mohammed Hussein, Mohammad Zulkernine:
UMLintr: A UML Profile for Specifying Intrusions. ECBS 2006: 279-288 - [c12]Jiong Zhang, Mohammad Zulkernine:
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection. ICC 2006: 2388-2393 - [c11]Mathew Graves, Mohammad Zulkernine:
Bridging the gap: software specification meets intrusion detector. PST 2006: 31 - 2005
- [j1]Mohammad Zulkernine, Rudolph E. Seviora:
Towards automatic monitoring of component-based software systems. J. Syst. Softw. 74(1): 15-24 (2005) - [c10]Mohammad Feroz Raihan, Mohammad Zulkernine:
Detecting Intrusions Specified in a Software Specification Language. COMPSAC (1) 2005: 143-148 - [c9]Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed:
Towards an Intrusion Detection System for Pervasive Computing Environments. ITCC (2) 2005: 277-282 - [c8]Jiong Zhang, Mohammad Zulkernine:
Network Intrusion Detection using Random Forests. PST 2005 - [c7]Pradeep Kannadiga, Mohammad Zulkernine:
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. SNPD 2005: 238-245 - [c6]Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi:
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. SNPD 2005: 246-253 - [c5]Ahmed Hasswa, Mohammad Zulkernine, Hossam S. Hassanein:
Routeguard: an intrusion detection and response system for mobile ad hoc networks. WiMob (3) 2005: 336-343 - 2004
- [c4]Sheikh Iqbal Ahamed, Avinash Vyas, Mohammad Zulkernine:
Towards Developing Sensor Networks Monitoring as a Middleware Service. ICPP Workshops 2004: 465-471 - 2002
- [c3]Mohammad Zulkernine, Rudolph E. Seviora:
A Compositional Approach to Monitoring Distributed Systems. DSN 2002: 763-772 - [c2]Mohammad Zulkernine, Rudolph E. Seviora:
Assume-Guarantee Algorithms for Automatic Detection of Software Failures. IFM 2002: 89-108 - 2001
- [c1]Mohammad Zulkernine, Rudolph E. Seviora:
Assume-Guarantee Supervisor for Concurrent Systems. IPDPS 2001: 151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint