Random-forests-based network intrusion detection systems J Zhang, M Zulkernine, A Haque IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2008 | 695 | 2008 |
Network Intrusion Detection using Random Forests. J Zhang, M Zulkernine Pst, 2005 | 407* | 2005 |
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities I Chowdhury, M Zulkernine Journal of Systems Architecture 57 (3), 294-313, 2011 | 402 | 2011 |
Anomaly based network intrusion detection with unsupervised outlier detection J Zhang, M Zulkernine 2006 IEEE International Conference on Communications 5, 2388-2393, 2006 | 373 | 2006 |
A neural network based system for intrusion detection and classification of attacks M Moradi, M Zulkernine Proceedings of the IEEE international conference on advances in intelligent …, 2004 | 326 | 2004 |
A hybrid network intrusion detection technique using random forests J Zhang, M Zulkernine First International Conference on Availability, Reliability and Security …, 2006 | 292 | 2006 |
A software implementation of a genetic algorithm based approach to network intrusion detection RH Gong, M Zulkernine, P Abolmaesumi Sixth International Conference on Software Engineering, Artificial …, 2005 | 239 | 2005 |
A survey of security attacks in information-centric networking EG AbdAllah, HS Hassanein, M Zulkernine IEEE Communications Surveys & Tutorials 17 (3), 1441-1454, 2015 | 229 | 2015 |
Mitigating program security vulnerabilities: Approaches and challenges H Shahriar, M Zulkernine ACM Computing Surveys (CSUR) 44 (3), 1-46, 2012 | 186 | 2012 |
Attacks and Defenses in Short-Range Wireless Technologies for IoT K Lounis, M Zulkernine IEEE Access 8, 88892-88932, 2020 | 148 | 2020 |
Preventing cache-based side-channel attacks in a cloud environment M Godfrey, M Zulkernine IEEE transactions on cloud computing 2 (4), 395-408, 2014 | 143 | 2014 |
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? I Chowdhury, M Zulkernine Proceedings of the 2010 ACM Symposium on Applied Computing, 1963-1969, 2010 | 122 | 2010 |
MUSIC: Mutation-based SQL injection vulnerability checking H Shahriar, M Zulkernine 2008 The Eighth International Conference on Quality Software, 77-86, 2008 | 120 | 2008 |
DIDMA: A distributed intrusion detection system using mobile agents P Kannadiga, M Zulkernine Sixth International Conference on Software Engineering, Artificial …, 2005 | 111 | 2005 |
Security metrics for source code structures I Chowdhury, B Chan, M Zulkernine Proceedings of the fourth international workshop on Software engineering for …, 2008 | 110 | 2008 |
Trustworthiness testing of phishing websites: A behavior model-based approach H Shahriar, M Zulkernine Future Generation Computer Systems 28 (8), 1258-1271, 2012 | 95 | 2012 |
A server-side solution to cache-based side-channel attacks in the cloud M Godfrey, M Zulkernine 2013 IEEE Sixth International Conference on Cloud Computing, 163-170, 2013 | 86 | 2013 |
Mutec: Mutation-based testing of cross site scripting H Shahriar, M Zulkernine 2009 ICSE Workshop on Software Engineering for Secure Systems, 47-53, 2009 | 86 | 2009 |
CAT: a context-aware trust model for open and dynamic systems MG Uddin, M Zulkernine, SI Ahamed Proceedings of the 2008 ACM symposium on Applied computing, 2024-2029, 2008 | 85 | 2008 |
An anomaly intrusion detection method using the CSI-KNN algorithm L Kuang, M Zulkernine Proceedings of the 2008 ACM symposium on Applied computing, 921-926, 2008 | 84 | 2008 |