Mohammad Zulkernine Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

49EEXiaofeng Yang, Mohammad Zulkernine: Secure Method Calls by Instrumenting Bytecode with Aspects. DBSec 2009: 126-141
48EEMohammad Gias Uddin, Mohammad Zulkernine: ATM: an automatic trust monitoring algorithm for service software. SAC 2009: 1040-1044
47EESheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Sharif Hasan, Mohammad Zulkernine: Towards developing a trust-based security solution. SAC 2009: 2204-2205
46EEMohammad Zulkernine, Mohammad Feroz Raihan, Mohammad Gias Uddin: Towards Model-Based Automatic Testing of Attack Scenarios. SAFECOMP 2009: 229-242
45EEMohammad Gias Uddin, Mohammad Zulkernine, Sheikh Iqbal Ahamed: Collaboration through computation: incorporating trust model into service-based software systems. Service Oriented Computing and Applications 3(1): 47-63 (2009)
44EESarah-Jane Whittaker, Mohammad Zulkernine, Karen Rudie: Towards Incorporating Discrete-Event Systems in Secure Software Development. ARES 2008: 1188-1195
43EEYonghua You, Mohammad Zulkernine, Anwar Haque: A Distributed Defense Framework for Flooding-Based DDoS Attacks. ARES 2008: 245-252
42EELiwei Kuang, Mohammad Zulkernine: An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. ARES 2008: 319-326
41EESheikh Iqbal Ahamed, Mohammad Zulkernine: Message from the STPSA 2008 Workshop Organizers. COMPSAC 2008: 653
40EESheikh Iqbal Ahamed, Mohammad Zulkernine: STPSA 2008 Workshop Organization. COMPSAC 2008: 654
39EEMuhammad Umair Ahmed Khan, Mohammad Zulkernine: Quantifying Security in Secure Software Development Phases. COMPSAC 2008: 955-960
38EEHossain Shahriar, Mohammad Zulkernine: Mutation-Based Testing of Buffer Overflow Vulnerabilities. COMPSAC 2008: 979-984
37EEHossain Shahriar, Mohammad Zulkernine: Mutation-Based Testing of Format String Bugs. HASE 2008: 229-238
36EEAtef Mohamed, Mohammad Zulkernine: At What Level of Granularity Should We be Componentizing for Software Reliability? HASE 2008: 273-282
35EESheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine: Towards Secure Trust Bootstrapping in Pervasive Computing Environment. HASE 2008: 89-96
34EEAtef Mohamed, Mohammad Zulkernine: On Failure Propagation in Component-Based Software Systems. QSIC 2008: 402-411
33EEHossain Shahriar, Mohammad Zulkernine: MUSIC: Mutation-based SQL Injection Vulnerability Checking. QSIC 2008: 77-86
32EEMohammad Gias Uddin, Mohammad Zulkernine, Sheikh Iqbal Ahamed: CAT: a context-aware trust model for open and dynamic systems. SAC 2008: 2024-2029
31EEMohammad Gias Uddin, Mohammad Zulkernine: UMLtrust: towards developing trust-aware software. SAC 2008: 831-836
30EELiwei Kuang, Mohammad Zulkernine: An anomaly intrusion detection method using the CSI-KNN algorithm. SAC 2008: 921-926
29EEIstehad Chowdhury, Brian Chan, Mohammad Zulkernine: Security metrics for source code structures. SESS 2008: 57-64
28EEJiong Zhang, Mohammad Zulkernine, Anwar Haque: Random-Forests-Based Network Intrusion Detection Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(5): 649-659 (2008)
27EEMohammad Feroz Raihan, Mohammad Zulkernine: AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. ARES 2007: 775-782
26EEZhi Jian Zhu, Mohammad Zulkernine: Towards an Aspect-Oriented Intrusion Detection Framework. COMPSAC (1) 2007: 637-638
25EEMohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine: ACIR: An Aspect-Connector for Intrusion Response. COMPSAC (2) 2007: 249-254
24EEAtef Mohamed, Mohammad Zulkernine: Improving Reliability and Safety by Trading off Software Failure Criticalities. HASE 2007: 267-274
23EEYonghua You, Mohammad Zulkernine, Anwar Haque: Detecting Flooding-Based DDoS Attacks. ICC 2007: 1229-1234
22EEMohammad Al-Subaie, Mohammad Zulkernine: The Power of Temporal Pattern Processing in Anomaly Intrusion Detection. ICC 2007: 1391-1398
21EEPradeep Kannadiga, Mohammad Zulkernine, Anwar Haque: E-NIPS: An Event-Based Network Intrusion Prediction System. ISC 2007: 37-52
20EEKashif Ali, Mohammad Zulkernine, Hossam S. Hassanein: Packet Filtering Based on Source Router Marking and Hop-Count. LCN 2007: 1061-1068
19EEMohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan: Integrating software specifications into intrusion detection. Int. J. Inf. Sec. 6(5): 345-357 (2007)
18EESheikh Iqbal Ahamed, Mohammad Zulkernine, Steven T. Wolfe: A software-based trust framework for distributed industrial management systems. Journal of Systems and Software 80(10): 1621-1630 (2007)
17EEMohammed Hussein, Mohammad Zulkernine: Intrusion detection aware component-based systems: A specification-based framework. Journal of Systems and Software 80(5): 700-710 (2007)
16EESteven T. Wolfe, Sheikh Iqbal Ahamed, Mohammad Zulkernine: A Trust Framework for Pervasive Computing Environments. AICCSA 2006: 312-319
15EEJiong Zhang, Mohammad Zulkernine: A Hybrid Network Intrusion Detection Technique Using Random Forests. ARES 2006: 262-269
14EESheikh Iqbal Ahamed, Mohammad Zulkernine, Suresh Anamanamuri: A Dependable Device Discovery Approach for Pervasive Computing Middleware. ARES 2006: 66-73
13EEMohammad Al-Subaie, Mohammad Zulkernine: Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. COMPSAC (1) 2006: 325-332
12EEMohammed Hussein, Mohammad Zulkernine: UMLintr: A UML Profile for Specifying Intrusions. ECBS 2006: 279-288
11EEMathew Graves, Mohammad Zulkernine: Bridging the gap: software specification meets intrusion detector. PST 2006: 31
10EEMohammad Feroz Raihan, Mohammad Zulkernine: Detecting Intrusions Specified in a Software Specification Language. COMPSAC (1) 2005: 143-148
9EEPradeep Kannadiga, Mohammad Zulkernine, Sheikh Iqbal Ahamed: Towards an Intrusion Detection System for Pervasive Computing Environments. ITCC (2) 2005: 277-282
8EEJiong Zhang, Mohammad Zulkernine: Network Intrusion Detection using Random Forests. PST 2005
7EEPradeep Kannadiga, Mohammad Zulkernine: DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. SNPD 2005: 238-245
6EERen Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi: A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. SNPD 2005: 246-253
5EEMohammad Zulkernine, Rudolph E. Seviora: Towards automatic monitoring of component-based software systems. Journal of Systems and Software 74(1): 15-24 (2005)
4EESheikh Iqbal Ahamed, Avinash Vyas, Mohammad Zulkernine: Towards Developing Sensor Networks Monitoring as a Middleware Service. ICPP Workshops 2004: 465-471
3EEMohammad Zulkernine, Rudolph E. Seviora: A Compositional Approach to Monitoring Distributed Systems. DSN 2002: 763-772
2EEMohammad Zulkernine, Rudolph E. Seviora: Assume-Guarantee Algorithms for Automatic Detection of Software Failures. IFM 2002: 89-108
1 Mohammad Zulkernine, Rudolph E. Seviora: Assume-Guarantee Supervisor for Concurrent Systems. IPDPS 2001: 151

Coauthor Index

1Purang Abolmaesumi [6]
2Sheikh Iqbal Ahamed [4] [9] [14] [16] [18] [32] [35] [40] [41] [45] [47]
3Mohammad Al-Subaie [13] [22]
4Kashif Ali [20]
5Suresh Anamanamuri [14]
6Brian Chan [29]
7Istehad Chowdhury [29]
8Ren Hui Gong [6]
9Mathew Graves [11] [19]
10Anwar Haque [21] [23] [28] [43]
11Chowdhury Sharif Hasan [47]
12Hossam S. Hassanein [20]
13Md. Endadul Hoque [35]
14Mohammed Hussein [12] [17]
15Pradeep Kannadiga [7] [9] [21]
16Muhammad Umair Ahmed Khan (Umair Khan) [19] [39]
17Donghyun Kim [47]
18Liwei Kuang [30] [42]
19Atef Mohamed [24] [34] [36]
20Farzana Rahman [35]
21Mohammad Feroz Raihan [10] [27] [46]
22Karen Rudie [44]
23Rudolph E. Seviora [1] [2] [3] [5]
24Hossain Shahriar [25] [33] [37] [38]
25Mohammad Gias Uddin [25] [31] [32] [45] [46] [48]
26Avinash Vyas [4]
27Sarah-Jane Whittaker [44]
28Steven T. Wolfe [16] [18]
29Xiaofeng Yang [49]
30Yonghua You [23] [43]
31Jiong Zhang [8] [15] [28]
32Zhi Jian Zhu [26]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)