The SCEAS System
Navigation Menu

Search the dblp DataBase


Mohammad Zulkernine: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jiong Zhang, Mohammad Zulkernine
    A Hybrid Network Intrusion Detection Technique Using Random Forests. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:262-269 [Conf]
  2. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri
    A Dependable Device Discovery Approach for Pervasive Computing Middleware. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:66-73 [Conf]
  3. Mohammad Feroz Raihan, Mohammad Zulkernine
    Detecting Intrusions Specified in a Software Specification Language. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:143-148 [Conf]
  4. Mohammad Al-Subaie, Mohammad Zulkernine
    Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2006, pp:325-332 [Conf]
  5. Mohammad Zulkernine, Rudolph E. Seviora
    A Compositional Approach to Monitoring Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:763-772 [Conf]
  6. Mohammed Hussein, Mohammad Zulkernine
    UMLintr: A UML Profile for Specifying Intrusions. [Citation Graph (0, 0)][DBLP]
    ECBS, 2006, pp:279-288 [Conf]
  7. Sheikh Iqbal Ahamed, Avinash Vyas, Mohammad Zulkernine
    Towards Developing Sensor Networks Monitoring as a Middleware Service. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:465-471 [Conf]
  8. Mohammad Zulkernine, Rudolph E. Seviora
    Assume-Guarantee Algorithms for Automatic Detection of Software Failures. [Citation Graph (0, 0)][DBLP]
    IFM, 2002, pp:89-108 [Conf]
  9. Mohammad Zulkernine, Rudolph E. Seviora
    Assume-Guarantee Supervisor for Concurrent Systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:151- [Conf]
  10. Pradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed
    Towards an Intrusion Detection System for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:277-282 [Conf]
  11. Jiong Zhang, Mohammad Zulkernine
    Network Intrusion Detection using Random Forests. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  12. Pradeep Kannadiga, Mohammad Zulkernine
    DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:238-245 [Conf]
  13. Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi
    A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:246-253 [Conf]
  14. Mohammad Zulkernine, Rudolph E. Seviora
    Towards automatic monitoring of component-based software systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:74, n:1, pp:15-24 [Journal]
  15. Zhi Jian Zhu, Mohammad Zulkernine
    Towards an Aspect-Oriented Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:637-638 [Conf]
  16. Mohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine
    ACIR: An Aspect-Connector for Intrusion Response. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:249-254 [Conf]
  17. Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
    E-NIPS: An Event-Based Network Intrusion Prediction System. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:37-52 [Conf]
  18. Mohammad Zulkernine, Mathews Graves, Muhammad Umair Ahmed Khan
    Integrating software specifications into intrusion detection. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:5, pp:345-357 [Journal]
  19. Mohammed Hussein, Mohammad Zulkernine
    Intrusion detection aware component-based systems: A specification-based framework. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:5, pp:700-710 [Journal]
  20. Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe
    A software-based trust framework for distributed industrial management systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:10, pp:1621-1630 [Journal]

  21. AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. [Citation Graph (, )][DBLP]

  22. Towards Incorporating Discrete-Event Systems in Secure Software Development. [Citation Graph (, )][DBLP]

  23. An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  24. A Distributed Defense Framework for Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP]

  25. Classification of Buffer Overflow Vulnerability Monitors. [Citation Graph (, )][DBLP]

  26. A Trust Framework for Pervasive Computing Environments. [Citation Graph (, )][DBLP]

  27. Quantifying Security in Secure Software Development Phases. [Citation Graph (, )][DBLP]

  28. Mutation-Based Testing of Buffer Overflow Vulnerabilities. [Citation Graph (, )][DBLP]

  29. STPSA 2008 Workshop Organization. [Citation Graph (, )][DBLP]

  30. Message from the STPSA 2008 Workshop Organizers. [Citation Graph (, )][DBLP]

  31. Automatic Testing of Program Security Vulnerabilities. [Citation Graph (, )][DBLP]

  32. On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software. [Citation Graph (, )][DBLP]

  33. Secure Method Calls by Instrumenting Bytecode with Aspects. [Citation Graph (, )][DBLP]

  34. Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP]

  35. Improving Reliability and Safety by Trading off Software Failure Criticalities. [Citation Graph (, )][DBLP]

  36. Mutation-Based Testing of Format String Bugs. [Citation Graph (, )][DBLP]

  37. At What Level of Granularity Should We be Componentizing for Software Reliability? [Citation Graph (, )][DBLP]

  38. The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]

  39. Detecting Flooding-Based DDoS Attacks. [Citation Graph (, )][DBLP]

  40. Security metrics for source code structures. [Citation Graph (, )][DBLP]

  41. Packet Filtering Based on Source Router Marking and Hop-Count. [Citation Graph (, )][DBLP]

  42. Bridging the gap: software specification meets intrusion detector. [Citation Graph (, )][DBLP]

  43. On Failure Propagation in Component-Based Software Systems. [Citation Graph (, )][DBLP]

  44. MUSIC: Mutation-based SQL Injection Vulnerability Checking. [Citation Graph (, )][DBLP]

  45. An anomaly intrusion detection method using the CSI-KNN algorithm. [Citation Graph (, )][DBLP]

  46. UMLtrust: towards developing trust-aware software. [Citation Graph (, )][DBLP]

  47. CAT: a context-aware trust model for open and dynamic systems. [Citation Graph (, )][DBLP]

  48. ATM: an automatic trust monitoring algorithm for service software. [Citation Graph (, )][DBLP]

  49. Towards developing a trust-based security solution. [Citation Graph (, )][DBLP]

  50. Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? [Citation Graph (, )][DBLP]

  51. Towards Model-Based Automatic Testing of Attack Scenarios. [Citation Graph (, )][DBLP]

  52. Activity and Artifact Views of a Secure Software Development Process. [Citation Graph (, )][DBLP]

  53. Architectural Design Decisions for Achieving Reliable Software Systems. [Citation Graph (, )][DBLP]

  54. Failure Type-Aware Reliability Assessment with Component Failure Dependency. [Citation Graph (, )][DBLP]

  55. PhishTester: Automatic Testing of Phishing Attacks. [Citation Graph (, )][DBLP]

Search in 0.022secs, Finished in 0.025secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002