default search action
Salmin Sultana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]David Schrammel, Martin Unterguggenberger, Lukas Lamster, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Stefan Mangard:
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs. EuroS&P 2024: 311-326 - 2023
- [c18]Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard:
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. HOST 2023: 24-35 - [c17]David Schrammel, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Martin Unterguggenberger, Pascal Nasahl, Stefan Mangard:
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware. SECRYPT 2023: 25-36 - [i2]Pascal Nasahl, Salmin Sultana, Hans Liljestrand, Karanvir Grewal, Michael LeMay, David M. Durham, David Schrammel, Stefan Mangard:
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. CoRR abs/2301.13760 (2023) - 2021
- [c16]Michael LeMay, Joydeep Rakshit, Sergej Deutsch, David M. Durham, Santosh Ghosh, Anant Nori, Jayesh Gaur, Andrew Weiler, Salmin Sultana, Karanvir Grewal, Sreenivas Subramoney:
Cryptographic Capability Computing. MICRO 2021: 253-267
2010 – 2019
- 2019
- [c15]Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee:
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. ISC 2019: 341-359 - 2018
- [c14]Li Chen, Salmin Sultana, Ravi Sahita:
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection. IEEE Symposium on Security and Privacy Workshops 2018: 109-115 - [i1]Li Chen, Salmin Sultana, Ravi Sahita:
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection. CoRR abs/1801.02318 (2018) - 2017
- [j6]Daniele Midi, Salmin Sultana, Elisa Bertino:
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks. ACM Trans. Sens. Networks 13(1): 1:1-1:38 (2017) - 2015
- [j5]Salmin Sultana, Elisa Bertino:
A Distributed System for The Management of Fine-grained Provenance. J. Database Manag. 26(2): 32-47 (2015) - [j4]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 12(3): 256-269 (2015) - [j3]Seung-Hyun Seo, Jongho Won, Salmin Sultana, Elisa Bertino:
Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 10(2): 371-383 (2015) - 2014
- [b1]Salmin Sultana:
Digital provenance - models, systems, and applications. Purdue University, USA, 2014 - [j2]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [c13]Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. IPCCC 2014: 1-10 - [c12]Salmin Sultana, Daniele Midi, Elisa Bertino:
Kinesis: a security incident response and prevention system for wireless sensor networks. SenSys 2014: 148-162 - 2013
- [j1]Salmin Sultana, Mohamed Shehab, Elisa Bertino:
Secure Provenance Transmission for Streaming Data. IEEE Trans. Knowl. Data Eng. 25(8): 1890-1903 (2013) - [c11]Salmin Sultana, Elisa Bertino:
A file provenance system. CODASPY 2013: 153-156 - [c10]S. M. Iftekharul Alam, Salmin Sultana, Y. Charlie Hu, Sonia Fahmy:
SYREN: Synergistic Link Correlation-Aware and Network Coding-Based Dissemination in Wireless Sensor Networks. MASCOTS 2013: 485-494 - 2012
- [c9]Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino:
Demonstrating a lightweight data provenance for sensor networks. CCS 2012: 1022-1024 - [c8]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. ER Workshops 2012: 121-130 - [c7]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. ICPADS 2012: 101-108 - [c6]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. IPAW 2012: 243-245 - [c5]S. M. Iftekharul Alam, Salmin Sultana, Y. Charlie Hu, Sonia Fahmy:
Link correlation and network coding in broadcast protocols for wireless sensor networks. SECON 2012: 59-61 - 2011
- [c4]Salmin Sultana, Elisa Bertino, Mohamed Shehab:
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338 - 2010
- [c3]Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino:
A selective encryption approach to fine-grained access control for P2P file sharing. CollaborateCom 2010: 1-10 - [c2]Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saurabh Bagchi:
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian. ISSRE 2010: 249-258
2000 – 2009
- 2008
- [c1]Salmin Sultana, Rezwana Karim, Md. Mostofa Akbar, Sheikh Iqbal Ahamed:
Ubicomp secretary: a web service based ubiquitous computing application. SAC 2008: 1935-1939
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint