default search action
Mohammad Zulkernine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j53]Youssef Yamout, Tashaffi Samin Yeasar, Shahrear Iqbal, Mohammad Zulkernine:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. ACM Comput. Surv. 56(2): 45:1-45:35 (2024) - [j52]Scarlett Taviss, Steven H. H. Ding, Mohammad Zulkernine, Philippe Charland, Sudipta Acharya:
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis. DTRAP 5(1): 6:1-6:25 (2024) - [j51]Weihan Ou, Steven H. H. Ding, Mohammad Zulkernine, Li Tao Li, Sarah Labrosse:
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning. ACM Trans. Priv. Secur. 27(3): 26:1-26:37 (2024) - [c186]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
Security Prediction and Forecasting for a Trust Management System in VANET. CCECE 2024: 115-116 - [c185]Ayesha Babar, Li Li, Adrian Taylor, Mohammad Zulkernine:
Towards Autonomous Network Defense: Reinforcement Learning Environment for a Defense Agent. CCECE 2024: 168-169 - [c184]Youssef Yamout, Shahrear Iqbal, Nilesh Chakraborty, Mohammad Zulkernine:
Gait-based Authentication in Smart Aging Care Systems. CCECE 2024: 174-175 - [c183]Adel Abusitta, Talal Halabi, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments. ICC 2024: 4644-4649 - [c182]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Building Secure Software for Smart Aging Care Systems: An Agile Approach. QRS 2024: 562-571 - [c181]Anika Anwar, Nilesh Chakraborty, Mohammad Zulkernine:
Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain. QRS Companion 2024: 1067-1076 - [c180]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cooperative Defense-in-Depth in Large-Scale Autonomous Vehicle Networks. QRS Companion 2024: 1077-1088 - 2023
- [j50]Karim Lounis, Mohammad Zulkernine:
Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT. DTRAP 4(2): 19:1-19:33 (2023) - [j49]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
AIM: An Android Interpretable Malware detector based on application class modeling. J. Inf. Secur. Appl. 75: 103486 (2023) - [j48]Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions. IEEE Trans. Veh. Technol. 72(4): 5079-5093 (2023) - [j47]Akib Anwar, Anika Anwar, Lama Moukahal, Mohammad Zulkernine:
Security assessment of in-vehicle communication protocols. Veh. Commun. 44: 100639 (2023) - [c179]Talal Halabi, Mohammad Zulkernine:
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. SSE 2023: 256-261 - [c178]Nilesh Chakraborty, Youssef Yamout, Mohammad Zulkernine:
The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords. CNS 2023: 1-5 - [c177]Maryam Davari, Mohammad Zulkernine:
Automatic Conversion of ABAC Policies for RBAC Systems. DSC 2023: 1-7 - [c176]Dominic Phillips, Talal Halabi, Mohammad Zulkernine:
Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. DSA 2023: 770-781 - [c175]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware. FPS (1) 2023: 269-284 - [c174]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET. ICC 2023: 3762-3767 - [c173]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective. ICDH 2023: 1-12 - [c172]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks. ISSREW 2023: 57-62 - [c171]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
A VeReMi-based Dataset for Predicting the Effect of Attacks in VANETs. MSWiM 2023: 175-179 - [c170]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks. RSSRail 2023: 22-39 - [c169]Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. UbiSec 2023: 319-334 - [e4]Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - 2022
- [j46]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory. Internet Things 20: 100631 (2022) - [j45]Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding:
CamoDroid: An Android application analysis environment resilient against sandbox evasion. J. Syst. Archit. 125: 102452 (2022) - [j44]Karim Lounis, Ziad Mansour, Michael Wrana, Marwa A. Elsayed, Steven H. H. Ding, Mohammad Zulkernine:
A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 58(6): 5586-5606 (2022) - [j43]Michael Wrana, Marwa Elsayed, Karim Lounis, Ziad Mansour, Steven H. H. Ding, Mohammad Zulkernine:
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation. ACM Trans. Cyber Phys. Syst. 6(4): 33:1-33:27 (2022) - [j42]Marwa A. Elsayed, Michael Wrana, Ziad Mansour, Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 23459-23473 (2022) - [j41]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
A coalitional security game against data integrity attacks in autonomous vehicle networks. Veh. Commun. 37: 100517 (2022) - [c168]Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. ARES 2022: 57:1-57:10 - [c167]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the Standing Committee Vice Chairs. COMPSAC 2022: xl - [c166]Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine:
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. DSC 2022: 1-8 - [c165]Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Through Diagonally Distributed Matrix Matching. DSA 2022: 390-402 - [c164]Aawista Chaudhry, Talal Halabi, Mohammad Zulkernine:
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications. DSN Workshops 2022: 1-7 - [c163]Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
Detecting Intrusions in Communication-Based Train Control Systems. ICC 2022: 4193-4198 - [c162]Yunke Liu, Jianbing Ni, Mohammad Zulkernine:
AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency. ICC 2022: 4402-4407 - [c161]Abu Faisal, Mohammad Zulkernine:
DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure. ICISS 2022: 23-43 - [c160]Maryam Davari, Mohammad Zulkernine:
Mining Attribute-Based Access Control Policies. ICISS 2022: 186-201 - [c159]Jeremy Banks, Ryan Kerr, Steven H. H. Ding, Mohammad Zulkernine:
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments. MILCOM 2022: 522-528 - [c158]Abu Faisal, Mohammad Zulkernine:
SAS-GKE: A Secure Authenticated Scalable Group Key Exchange. QRS 2022: 571-582 - [c157]Maryam Davari, Mohammad Zulkernine:
Classification-Based Anomaly Prediction in XACML Policies. SecureComm 2022: 3-19 - 2021
- [j40]Karim Lounis, Mohammad Zulkernine:
T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT. IEEE Access 9: 137384-137405 (2021) - [j39]Farnood Faghihi, Mohammad Zulkernine:
RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware. Comput. Networks 191: 108011 (2021) - [j38]Claudio Demartini, Leila De Floriani, Ji-Jiang Yang, Alfredo Cuzzocrea, Hossain Shahriar, Sorel Reisman, Mohammad Zulkernine:
IEEE COMPSAC 2022. Computer 54(12): 27 (2021) - [j37]Abu Faisal, Mohammad Zulkernine:
A secure architecture for TCP/UDP-based cloud communications. Int. J. Inf. Sec. 20(2): 161-179 (2021) - [j36]Aleem Khalid Alvi, Mohammad Zulkernine:
A security pattern detection framework for building more secure software. J. Syst. Softw. 171: 110838 (2021) - [j35]Talal Halabi, Omar Abdel Wahab, Ranwa Al Mallah, Mohammad Zulkernine:
Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game. IEEE Trans. Reliab. 70(3): 970-985 (2021) - [j34]Lama Moukahal, Mohammad Zulkernine, Martin Soukup:
Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems. IEEE Trans. Reliab. 70(4): 1422-1437 (2021) - [c156]Lama Moukahal, Mohammad Zulkernine, Martin Soukup:
AVSDA: Autonomous Vehicle Security Decay Assessment. CRiSIS 2021: 20-37 - [c155]Maryam Davari, Mohammad Zulkernine:
Policy Modeling and Anomaly Detection in ABAC Policies. CRiSIS 2021: 137-152 - [c154]Najmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine:
Reinforcement Learning-driven Attack on Road Traffic Signal Controllers. CSR 2021: 218-225 - [c153]Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine:
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3. FPS 2021: 235-252 - [c152]Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Towards a Secure Software Lifecycle for Autonomous Vehicles. ISSRE Workshops 2021: 371-377 - [c151]Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems. QRS Companion 2021: 516-527 - [c150]Dominic Phillips, Marwa A. Elsayed, Mohammad Zulkernine:
DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles. QRS Companion 2021: 528-535 - [i1]Karim Lounis, Mohammad Zulkernine:
More Lessons: Analysis of PUF-based Authentication Protocols for IoT. IACR Cryptol. ePrint Arch. 2021: 1509 (2021) - 2020
- [j33]Marwa Elsayed, Mohammad Zulkernine:
PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access 8: 45184-45197 (2020) - [j32]Karim Lounis, Mohammad Zulkernine:
Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access 8: 88892-88932 (2020) - [j31]Lama Moukahal, Marwa A. Elsayed, Mohammad Zulkernine:
Vehicle Software Engineering (VSE): Research and Practice. IEEE Internet Things J. 7(10): 10137-10149 (2020) - [j30]Joey Sun, Shahrear Iqbal, Najmeh Seifollahpour Arabi, Mohammad Zulkernine:
A classification of attacks to In-Vehicle Components (IVCs). Veh. Commun. 25: 100253 (2020) - [c149]Karim Lounis, Mohammad Zulkernine:
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs. CRiSIS 2020: 49-66 - [c148]Congwei Chen, Marwa A. Elsayed, Mohammad Zulkernine:
HBD-Authority: Streaming Access Control Model for Hadoop. DependSys 2020: 16-25 - [c147]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Reliability-based Formation of Cloud Federations Using Game Theory. GLOBECOM 2020: 1-6 - [c146]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation. ICC 2020: 1-7 - [c145]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Optimizing Virtual Machine Migration in Multi-Clouds. ISNCC 2020: 1-7 - [c144]Talal Halabi, Omar Abdel Wahab, Mohammad Zulkernine:
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems. NOMS 2020: 1-6 - [c143]Syed Akib Anwar Hridoy, Mohammad Zulkernine:
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network. SecureComm (2) 2020: 215-234 - [c142]Karim Lounis, Mohammad Zulkernine:
Exploiting Race Condition for Wi-Fi Denial of Service Attacks. SIN 2020: 2:1-2:8
2010 – 2019
- 2019
- [j29]Marwa Elsayed, Mohammad Zulkernine:
Offering security diagnosis as a service for cloud SaaS applications. J. Inf. Secur. Appl. 44: 32-48 (2019) - [c141]Abu Faisal, Mohammad Zulkernine:
Graphene: A Secure Cloud Communication Architecture. ACNS Workshops 2019: 51-69 - [c140]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi:
STPSA 2019 Welcome Message. COMPSAC (2) 2019: 567-568 - [c139]Juan Wang, Karim Lounis, Mohammad Zulkernine:
Security Features for Proximity Verification. COMPSAC (2) 2019: 592-597 - [c138]Juan Wang, Karim Lounis, Mohammad Zulkernine:
CSKES: A Context-Based Secure Keyless Entry System. COMPSAC (1) 2019: 817-822 - [c137]Karim Lounis, Mohammad Zulkernine:
WPA3 Connection Deprivation Attacks. CRiSIS 2019: 164-176 - [c136]Karim Lounis, Mohammad Zulkernine:
Bluetooth Low Energy Makes "Just Works" Not Work. CSNet 2019: 99-106 - [c135]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. CSNet 2019: 114-121 - [c134]Talal Halabi, Mohammad Zulkernine:
Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game. DSN Workshops 2019: 78-85 - [c133]Md Swawibe Ul Alam, Shahrear Iqbal, Mohammad Zulkernine, Clifford Liem:
Securing Vehicle ECU Communications and Stored Data. ICC 2019: 1-6 - [c132]Talal Halabi, Mohammad Zulkernine:
Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles. ICC 2019: 1-6 - [c131]Lama Moukahal, Mohammad Zulkernine:
Security Vulnerability Metrics for Connected Vehicles. QRS Companion 2019: 17-23 - [c130]Karim Lounis, Mohammad Zulkernine:
Bad-token: denial of service attacks on WPA3. SIN 2019: 15:1-15:8 - [c129]Shahrear Iqbal, Anwar Haque, Mohammad Zulkernine:
Towards a Security Architecture for Protecting Connected Vehicles from Malware. VTC Spring 2019: 1-5 - 2018
- [j28]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
DADI: Defending against distributed denial of service in information-centric networking routing and caching. Secur. Priv. 1(2) (2018) - [j27]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
Preventing unauthorized access in information centric networking. Secur. Priv. 1(4) (2018) - [j26]Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
Protecting Internet users from becoming victimized attackers of click-fraud. J. Softw. Evol. Process. 30(3) (2018) - [c128]Marwa Elsayed, Mohammad Zulkernine:
Towards Security Monitoring for Cloud Analytic Applications. BigDataSecurity/HPSC/IDS 2018: 69-78 - [c127]Sheikh Iqbal Ahamed, Mohammad Zulkernine:
Message from the STPSA 2018 Workshop Organizers. COMPSAC (2) 2018: 460-461 - [c126]Karim Lounis, Mohammad Zulkernine:
Connection Dumping Vulnerability Affecting Bluetooth Availability. CRiSIS 2018: 188-204 - [c125]Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein:
A Security Framework for ICN Traffic Management. DASC/PiCom/DataCom/CyberSciTech 2018: 78-85 - [c124]Jia Wan, Mohammad Zulkernine, Clifford Liem:
A Dynamic App Anti-Debugging Approach on Android ART Runtime. DASC/PiCom/DataCom/CyberSciTech 2018: 560-567 - [c123]Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers:
Securing Web Applications with Secure Coding Practices and Integrity Verification. DASC/PiCom/DataCom/CyberSciTech 2018: 618-625 - [c122]A. B. M. Bodrul Alam, Anwar Haque, Mohammad Zulkernine:
CREM: A Cloud Reliability Evaluation Model. GLOBECOM 2018: 1-6 - [c121]Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Context-Aware Privacy Scheme for Crisis Situations. GLOBECOM 2018: 1-6 - [c120]Marwa A. Elsayed, Mohammad Zulkernine:
Integrating Security in Cloud Application Development Cycle. ICSSA 2018: 13-18 - [c119]Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine:
An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. ICSSA 2018: 62-66 - [c118]Shahrear Iqbal, Mohammad Zulkernine:
SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. MALWARE 2018: 33-40 - [c117]Marwa Elsayed, Mohammad Zulkernine:
A Taxonomy of Security as a Service. OTM Conferences (2) 2018: 305-312 - 2017
- [c116]Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem:
TRUST-CAP: A Trust Model for Cloud-Based Applications. COMPSAC (2) 2017: 584-589 - [c115]Katsuyoshi Iida, Mohammad Zulkernine:
Message from SEPT 2017 Organizing Committee. COMPSAC (1) 2017: 585 - [c114]Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem:
Towards defending connected vehicles against attacks. ECBS 2017: 9:1-9:9 - [c113]M. D. Siam Hasan, Thomas R. Dean, Fahim T. Imam, Francisco Garcia, Sylvain P. Leblanc, Mohammad Zulkernine:
A Constraint-based intrusion detection system. ECBS 2017: 12:1-12:10 - [c112]Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine:
A Participant Contribution Trust Scheme for Crisis Response Systems. GLOBECOM 2017: 1-6 - [c111]Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Using Ordered Matrix Matching. ICSSA 2017: 38-43 - [c110]Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar:
An Automatic Software Vulnerability Classification Framework. ICSSA 2017: 44-49 - [c109]Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem:
Defending Application Cache Integrity of Android Runtime. ISPEC 2017: 727-746 - [c108]Md. Shahrear Iqbal, Mohammad Zulkernine:
Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts. ISC 2017: 329-347 - [c107]Saeed Shafieian, Daniel Smith, Mohammad Zulkernine:
Detecting DNS Tunneling Using Ensemble Learning. NSS 2017: 112-127 - [c106]Md. Shahrear Iqbal, Mohammad Zulkernine:
Flamingo: a framework for smartphone security context management. SAC 2017: 563-568 - [c105]A. B. M. Bodrul Alam, Mohammad Zulkernine, Anwar Haque:
A Reliability-Based Resource Allocation Approach for Cloud Computing. SC² 2017: 249-252 - [e3]Mohammad Zulkernine, Mohammad Mahfuzul Islam:
International Conference on Networking, Systems and Security, NSysS 2017, Dhaka, Bangladesh, January 5-8, 2017. IEEE 2017, ISBN 978-1-5090-3260-0 [contents] - 2016
- [j25]Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, Mohammad Zulkernine:
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. Empir. Softw. Eng. 21(3): 896-931 (2016) - [j24]Peter J. Clarke, Mohammad Zulkernine:
Special issue on High Assurance Systems Engineering. Softw. Qual. J. 24(1): 3-5 (2016) - [c104]Marwa Elsayed, Mohammad Zulkernine:
IFCaaS: Information Flow Control as a Service for Cloud Security. ARES 2016: 211-216 - [c103]Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. COMPSAC Workshops 2016: 381 - [c102]