|
Search the dblp DataBase
Mohammad Zulkernine:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jiong Zhang, Mohammad Zulkernine
A Hybrid Network Intrusion Detection Technique Using Random Forests. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:262-269 [Conf]
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:66-73 [Conf]
- Mohammad Feroz Raihan, Mohammad Zulkernine
Detecting Intrusions Specified in a Software Specification Language. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2005, pp:143-148 [Conf]
- Mohammad Al-Subaie, Mohammad Zulkernine
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2006, pp:325-332 [Conf]
- Mohammad Zulkernine, Rudolph E. Seviora
A Compositional Approach to Monitoring Distributed Systems. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:763-772 [Conf]
- Mohammed Hussein, Mohammad Zulkernine
UMLintr: A UML Profile for Specifying Intrusions. [Citation Graph (0, 0)][DBLP] ECBS, 2006, pp:279-288 [Conf]
- Sheikh Iqbal Ahamed, Avinash Vyas, Mohammad Zulkernine
Towards Developing Sensor Networks Monitoring as a Middleware Service. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2004, pp:465-471 [Conf]
- Mohammad Zulkernine, Rudolph E. Seviora
Assume-Guarantee Algorithms for Automatic Detection of Software Failures. [Citation Graph (0, 0)][DBLP] IFM, 2002, pp:89-108 [Conf]
- Mohammad Zulkernine, Rudolph E. Seviora
Assume-Guarantee Supervisor for Concurrent Systems. [Citation Graph (0, 0)][DBLP] IPDPS, 2001, pp:151- [Conf]
- Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] ITCC (2), 2005, pp:277-282 [Conf]
- Jiong Zhang, Mohammad Zulkernine
Network Intrusion Detection using Random Forests. [Citation Graph (0, 0)][DBLP] PST, 2005, pp:- [Conf]
- Pradeep Kannadiga, Mohammad Zulkernine
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. [Citation Graph (0, 0)][DBLP] SNPD, 2005, pp:238-245 [Conf]
- Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] SNPD, 2005, pp:246-253 [Conf]
- Mohammad Zulkernine, Rudolph E. Seviora
Towards automatic monitoring of component-based software systems. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:74, n:1, pp:15-24 [Journal]
- Zhi Jian Zhu, Mohammad Zulkernine
Towards an Aspect-Oriented Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2007, pp:637-638 [Conf]
- Mohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine
ACIR: An Aspect-Connector for Intrusion Response. [Citation Graph (0, 0)][DBLP] COMPSAC (2), 2007, pp:249-254 [Conf]
- Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
E-NIPS: An Event-Based Network Intrusion Prediction System. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:37-52 [Conf]
- Mohammad Zulkernine, Mathews Graves, Muhammad Umair Ahmed Khan
Integrating software specifications into intrusion detection. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:5, pp:345-357 [Journal]
- Mohammed Hussein, Mohammad Zulkernine
Intrusion detection aware component-based systems: A specification-based framework. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:5, pp:700-710 [Journal]
- Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe
A software-based trust framework for distributed industrial management systems. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:10, pp:1621-1630 [Journal]
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. [Citation Graph (, )][DBLP]
Towards Incorporating Discrete-Event Systems in Secure Software Development. [Citation Graph (, )][DBLP]
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. [Citation Graph (, )][DBLP]
A Distributed Defense Framework for Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP]
Classification of Buffer Overflow Vulnerability Monitors. [Citation Graph (, )][DBLP]
A Trust Framework for Pervasive Computing Environments. [Citation Graph (, )][DBLP]
Quantifying Security in Secure Software Development Phases. [Citation Graph (, )][DBLP]
Mutation-Based Testing of Buffer Overflow Vulnerabilities. [Citation Graph (, )][DBLP]
STPSA 2008 Workshop Organization. [Citation Graph (, )][DBLP]
Message from the STPSA 2008 Workshop Organizers. [Citation Graph (, )][DBLP]
Automatic Testing of Program Security Vulnerabilities. [Citation Graph (, )][DBLP]
On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software. [Citation Graph (, )][DBLP]
Secure Method Calls by Instrumenting Bytecode with Aspects. [Citation Graph (, )][DBLP]
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP]
Improving Reliability and Safety by Trading off Software Failure Criticalities. [Citation Graph (, )][DBLP]
Mutation-Based Testing of Format String Bugs. [Citation Graph (, )][DBLP]
At What Level of Granularity Should We be Componentizing for Software Reliability? [Citation Graph (, )][DBLP]
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]
Detecting Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP]
Security metrics for source code structures. [Citation Graph (, )][DBLP]
Packet Filtering Based on Source Router Marking and Hop-Count. [Citation Graph (, )][DBLP]
Bridging the gap: software specification meets intrusion detector. [Citation Graph (, )][DBLP]
On Failure Propagation in Component-Based Software Systems. [Citation Graph (, )][DBLP]
MUSIC: Mutation-based SQL Injection Vulnerability Checking. [Citation Graph (, )][DBLP]
An anomaly intrusion detection method using the CSI-KNN algorithm. [Citation Graph (, )][DBLP]
UMLtrust: towards developing trust-aware software. [Citation Graph (, )][DBLP]
CAT: a context-aware trust model for open and dynamic systems. [Citation Graph (, )][DBLP]
ATM: an automatic trust monitoring algorithm for service software. [Citation Graph (, )][DBLP]
Towards developing a trust-based security solution. [Citation Graph (, )][DBLP]
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? [Citation Graph (, )][DBLP]
Towards Model-Based Automatic Testing of Attack Scenarios. [Citation Graph (, )][DBLP]
Activity and Artifact Views of a Secure Software Development Process. [Citation Graph (, )][DBLP]
Architectural Design Decisions for Achieving Reliable Software Systems. [Citation Graph (, )][DBLP]
Failure Type-Aware Reliability Assessment with Component Failure Dependency. [Citation Graph (, )][DBLP]
PhishTester: Automatic Testing of Phishing Attacks. [Citation Graph (, )][DBLP]
Search in 0.050secs, Finished in 0.051secs
|