Syed Ali Khayam

According to our database1, Syed Ali Khayam authored at least 80 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Diagnosing bot infections using Bayesian inference.
J. Comput. Virol. Hacking Tech., 2018

2015
BotFlex: A community-driven tool for botnet detection.
J. Netw. Comput. Appl., 2015

P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
Towards Formal Linear Cryptanalysis using HOL4.
J. Univers. Comput. Sci., 2014

Information theoretic feature space slicing for statistical anomaly detection.
J. Netw. Comput. Appl., 2014

A Taxonomy of Botnet Behavior, Detection, and Defense.
IEEE Commun. Surv. Tutorials, 2014

Stealing bandwidth from BitTorrent seeders.
Comput. Secur., 2014

Rapid and scalable isp service delivery through a programmable middlebox.
Comput. Commun. Rev., 2014

A Look at the Consequences of Internet Censorship Through an ISP Lens.
Proceedings of the 2014 Internet Measurement Conference, 2014

Who Is Going to Be the Next BitTorrent Peer Idol?
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

2013
Evaluation and improvement of CDS-based topology control for wireless sensor networks.
Wirel. Networks, 2013

Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning.
ACM Trans. Inf. Syst. Secur., 2013

Traffic analyzer for differentiating BitTorrent handshake failures from port-scans.
CoRR, 2013

BotFlex: a community-driven tool for botnetdetection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Revisiting anomaly detection system design philosophy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Accurate residual wireless channel simulation using a two-tier Markov model.
Simul., 2012

A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks.
J. Netw. Comput. Appl., 2012

Application-aware MIMO Video Rate Adaptation.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane.
Proceedings of the European Workshop on Software Defined Networking, 2012

Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Monetizing spambot activity and understanding its relation with spambot traffic features.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models.
Wirel. Pers. Commun., 2011

Joint network-host based malware detection using information-theoretic tools.
J. Comput. Virol., 2011

Determining malicious executable distinguishing attributes and low-complexity detection.
J. Comput. Virol., 2011

Accuracy improving guidelines for network anomaly detection systems.
J. Comput. Virol., 2011

Designing a cluster-based covert channel to evade disk investigation and forensics.
Comput. Secur., 2011

Poly: A reliable and energy efficient topology control protocol for wireless sensor networks.
Comput. Commun., 2011

On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications.
Ad Hoc Networks, 2011

Breaking undercover: exploiting design flaws and nonuniform human behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Revisiting Traffic Anomaly Detection Using Software Defined Networking.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Energy and distortion analysis of video compression schemes for Wireless Video Sensor Networks.
Proceedings of the MILCOM 2011, 2011

A Cross-Layer Architecture for Motion-Adaptive Video Transmission over MIMO Channels.
Proceedings of IEEE International Conference on Communications, 2011

Progressive Differential Thresholding for Network Anomaly Detection.
Proceedings of IEEE International Conference on Communications, 2011

Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks.
Sensors, 2010

On Performance Modeling of Ad Hoc Routing Protocols.
EURASIP J. Wirel. Commun. Netw., 2010

On mitigating sampling-induced accuracy loss in traffic anomaly detection systems.
Comput. Commun. Rev., 2010

What Is the Impact of P2P Traffic on Anomaly Detection?
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection.
Proceedings of IEEE International Conference on Communications, 2010

Breaking Randomized Linear Generation Functions Based Virtual Password System.
Proceedings of IEEE International Conference on Communications, 2010

An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems.
Proceedings of IEEE International Conference on Communications, 2010

An energy efficient Clique-based CDS discovery protocol for wireless sensor networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Breaking e-banking CAPTCHAs.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Comparison of Conventional and Cross-Layer Multimedia Transport Schemes for Wireless Networks.
Wirel. Pers. Commun., 2009

An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2009

Keystroke-Based User Identification on Smart Phones.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

On the Inefficient Use of Entropy for Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Embedding a Covert Channel in Active Network Connections.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

On minimum cost coverage in wireless sensor networks.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Energy efficient video compression for wireless sensor networks.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic.
Proceedings of IEEE International Conference on Communications, 2008

Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations.
Proceedings of IEEE International Conference on Communications, 2008

SRVF: An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Improving WSN Simulation and Analysis Accuracy Using Two-Tier Channel Models.
Proceedings of IEEE International Conference on Communications, 2008

Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A formal performance modeling framework for bio-inspired ad hoc routing protocols.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008

Embedded Malware Detection Using Markov n-Grams.
Proceedings of the Detection of Intrusions and Malware, 2008

Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008

2007
Maximum-Likelihood Header Estimation: A Cross-Layer Methodology for Wireless Multimedia.
IEEE Trans. Wirel. Commun., 2007

Header Detection to Improve Multimedia Quality Over Wireless Networks.
IEEE Trans. Multim., 2007

Markov and multifractal wavelet models for wireless MAC-to-MAC channels.
Perform. Evaluation, 2007

Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes.
Proceedings of IEEE International Conference on Communications, 2007

On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems.
Proceedings of IEEE International Conference on Communications, 2007

On Channel State Inference and Prediction Using Observable Variables in 802.11b Network.
Proceedings of IEEE International Conference on Communications, 2007

A Multi-Tier Model for BER Prediction over Wireless Residual Channels.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Constant-Complexity Models for Wireless Channels.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Improving Wireless Multimedia Quality using Header Detection with Priors.
Proceedings of IEEE International Conference on Communications, 2006

2005
Linear-Complexity Models for Wireless MAC-to-MAC Channels.
Wirel. Networks, 2005

A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A statistical receiver-based approach for improved throughput of multimedia communications over wireless LANs.
Proceedings of IEEE International Conference on Communications, 2005

2004
Analyzing the spread of active worms over VANET.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

2003
Performance analysis and modeling of errors and losses over 802.11b LANs for high-bit-rate real-time multimedia.
Signal Process. Image Commun., 2003

Markov-based modeling of wireless local area networks.
Proceedings of the 6th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003

Cross-layer protocol design for real-time multimedia applications over 802.11 b networks.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Analysis and modeling of errors at the 802.11b link layer.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003


  Loading...