2009 |
46 | EE | Mohammad Gias Uddin,
Mohammad Zulkernine:
ATM: an automatic trust monitoring algorithm for service software.
SAC 2009: 1040-1044 |
45 | EE | Sheikh Iqbal Ahamed,
Donghyun Kim,
Chowdhury S. Hasan,
Mohammad Zulkernine:
Towards developing a trust-based security solution.
SAC 2009: 2204-2205 |
44 | EE | Mohammad Gias Uddin,
Mohammad Zulkernine,
Sheikh Iqbal Ahamed:
Collaboration through computation: incorporating trust model into service-based software systems.
Service Oriented Computing and Applications 3(1): 47-63 (2009) |
2008 |
43 | EE | Sarah-Jane Whittaker,
Mohammad Zulkernine,
Karen Rudie:
Towards Incorporating Discrete-Event Systems in Secure Software Development.
ARES 2008: 1188-1195 |
42 | EE | Yonghua You,
Mohammad Zulkernine,
Anwar Haque:
A Distributed Defense Framework for Flooding-Based DDoS Attacks.
ARES 2008: 245-252 |
41 | EE | Liwei Kuang,
Mohammad Zulkernine:
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
ARES 2008: 319-326 |
40 | EE | Sheikh Iqbal Ahamed,
Mohammad Zulkernine:
Message from the STPSA 2008 Workshop Organizers.
COMPSAC 2008: 653 |
39 | EE | Sheikh Iqbal Ahamed,
Mohammad Zulkernine:
STPSA 2008 Workshop Organization.
COMPSAC 2008: 654 |
38 | EE | Muhammad Umair Ahmed Khan,
Mohammad Zulkernine:
Quantifying Security in Secure Software Development Phases.
COMPSAC 2008: 955-960 |
37 | EE | Hossain Shahriar,
Mohammad Zulkernine:
Mutation-Based Testing of Buffer Overflow Vulnerabilities.
COMPSAC 2008: 979-984 |
36 | EE | Hossain Shahriar,
Mohammad Zulkernine:
Mutation-Based Testing of Format String Bugs.
HASE 2008: 229-238 |
35 | EE | Atef Mohamed,
Mohammad Zulkernine:
At What Level of Granularity Should We be Componentizing for Software Reliability?
HASE 2008: 273-282 |
34 | EE | Sheikh Iqbal Ahamed,
Md. Endadul Hoque,
Farzana Rahman,
Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
HASE 2008: 89-96 |
33 | EE | Atef Mohamed,
Mohammad Zulkernine:
On Failure Propagation in Component-Based Software Systems.
QSIC 2008: 402-411 |
32 | EE | Hossain Shahriar,
Mohammad Zulkernine:
MUSIC: Mutation-based SQL Injection Vulnerability Checking.
QSIC 2008: 77-86 |
31 | EE | Mohammad Gias Uddin,
Mohammad Zulkernine,
Sheikh Iqbal Ahamed:
CAT: a context-aware trust model for open and dynamic systems.
SAC 2008: 2024-2029 |
30 | EE | Mohammad Gias Uddin,
Mohammad Zulkernine:
UMLtrust: towards developing trust-aware software.
SAC 2008: 831-836 |
29 | EE | Liwei Kuang,
Mohammad Zulkernine:
An anomaly intrusion detection method using the CSI-KNN algorithm.
SAC 2008: 921-926 |
28 | EE | Istehad Chowdhury,
Brian Chan,
Mohammad Zulkernine:
Security metrics for source code structures.
SESS 2008: 57-64 |
27 | EE | Jiong Zhang,
Mohammad Zulkernine,
Anwar Haque:
Random-Forests-Based Network Intrusion Detection Systems.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(5): 649-659 (2008) |
2007 |
26 | EE | Mohammad Feroz Raihan,
Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
ARES 2007: 775-782 |
25 | EE | Zhi Jian Zhu,
Mohammad Zulkernine:
Towards an Aspect-Oriented Intrusion Detection Framework.
COMPSAC (1) 2007: 637-638 |
24 | EE | Mohammad Gias Uddin,
Hossain Shahriar,
Mohammad Zulkernine:
ACIR: An Aspect-Connector for Intrusion Response.
COMPSAC (2) 2007: 249-254 |
23 | EE | Atef Mohamed,
Mohammad Zulkernine:
Improving Reliability and Safety by Trading off Software Failure Criticalities.
HASE 2007: 267-274 |
22 | EE | Yonghua You,
Mohammad Zulkernine,
Anwar Haque:
Detecting Flooding-Based DDoS Attacks.
ICC 2007: 1229-1234 |
21 | EE | Mohammad Al-Subaie,
Mohammad Zulkernine:
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection.
ICC 2007: 1391-1398 |
20 | EE | Pradeep Kannadiga,
Mohammad Zulkernine,
Anwar Haque:
E-NIPS: An Event-Based Network Intrusion Prediction System.
ISC 2007: 37-52 |
19 | EE | Kashif Ali,
Mohammad Zulkernine,
Hossam S. Hassanein:
Packet Filtering Based on Source Router Marking and Hop-Count.
LCN 2007: 1061-1068 |
18 | EE | Mohammad Zulkernine,
Mathew Graves,
Muhammad Umair Ahmed Khan:
Integrating software specifications into intrusion detection.
Int. J. Inf. Sec. 6(5): 345-357 (2007) |
17 | EE | Sheikh Iqbal Ahamed,
Mohammad Zulkernine,
Steve Wolfe:
A software-based trust framework for distributed industrial management systems.
Journal of Systems and Software 80(10): 1621-1630 (2007) |
16 | EE | Mohammed Hussein,
Mohammad Zulkernine:
Intrusion detection aware component-based systems: A specification-based framework.
Journal of Systems and Software 80(5): 700-710 (2007) |
2006 |
15 | EE | Jiong Zhang,
Mohammad Zulkernine:
A Hybrid Network Intrusion Detection Technique Using Random Forests.
ARES 2006: 262-269 |
14 | EE | Sheikh Iqbal Ahamed,
Mohammad Zulkernine,
Suresh Anamanamuri:
A Dependable Device Discovery Approach for Pervasive Computing Middleware.
ARES 2006: 66-73 |
13 | EE | Mohammad Al-Subaie,
Mohammad Zulkernine:
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection.
COMPSAC (1) 2006: 325-332 |
12 | EE | Mohammed Hussein,
Mohammad Zulkernine:
UMLintr: A UML Profile for Specifying Intrusions.
ECBS 2006: 279-288 |
11 | EE | Mathew Graves,
Mohammad Zulkernine:
Bridging the gap: software specification meets intrusion detector.
PST 2006: 31 |
2005 |
10 | EE | Mohammad Feroz Raihan,
Mohammad Zulkernine:
Detecting Intrusions Specified in a Software Specification Language.
COMPSAC (1) 2005: 143-148 |
9 | EE | Pradeep Kannadiga,
Mohammad Zulkernine,
Sheikh Iqbal Ahamed:
Towards an Intrusion Detection System for Pervasive Computing Environments.
ITCC (2) 2005: 277-282 |
8 | EE | Jiong Zhang,
Mohammad Zulkernine:
Network Intrusion Detection using Random Forests.
PST 2005 |
7 | EE | Pradeep Kannadiga,
Mohammad Zulkernine:
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents.
SNPD 2005: 238-245 |
6 | EE | Ren Hui Gong,
Mohammad Zulkernine,
Purang Abolmaesumi:
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection.
SNPD 2005: 246-253 |
5 | EE | Mohammad Zulkernine,
Rudolph E. Seviora:
Towards automatic monitoring of component-based software systems.
Journal of Systems and Software 74(1): 15-24 (2005) |
2004 |
4 | EE | Sheikh Iqbal Ahamed,
Avinash Vyas,
Mohammad Zulkernine:
Towards Developing Sensor Networks Monitoring as a Middleware Service.
ICPP Workshops 2004: 465-471 |
2002 |
3 | EE | Mohammad Zulkernine,
Rudolph E. Seviora:
A Compositional Approach to Monitoring Distributed Systems.
DSN 2002: 763-772 |
2 | EE | Mohammad Zulkernine,
Rudolph E. Seviora:
Assume-Guarantee Algorithms for Automatic Detection of Software Failures.
IFM 2002: 89-108 |
2001 |
1 | | Mohammad Zulkernine,
Rudolph E. Seviora:
Assume-Guarantee Supervisor for Concurrent Systems.
IPDPS 2001: 151 |