Mohammad Zulkernine
Orcid: 0000-0003-1697-4101
According to our database1,
Mohammad Zulkernine
authored at least 240 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
ACM Trans. Priv. Secur., August, 2024
ACM Comput. Surv., February, 2024
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis.
DTRAP, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024
Towards Autonomous Network Defense: Reinforcement Learning Environment for a Defense Agent.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2024
2023
Veh. Commun., December, 2023
J. Inf. Secur. Appl., June, 2023
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.
Proceedings of the Ubiquitous Security, 2023
TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2023
Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2023
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023
Proceedings of the IEEE International Conference on Digital Health, 2023
Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET.
Proceedings of the IEEE International Conference on Communications, 2023
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023
2022
A coalitional security game against data integrity attacks in autonomous vehicle networks.
Veh. Commun., 2022
IEEE Trans. Intell. Transp. Syst., 2022
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022
IEEE Trans. Aerosp. Electron. Syst., 2022
CamoDroid: An Android application analysis environment resilient against sandbox evasion.
J. Syst. Archit., 2022
Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory.
Internet Things, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IEEE Trans. Reliab., 2021
Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game.
IEEE Trans. Reliab., 2021
J. Syst. Softw., 2021
Int. J. Inf. Sec., 2021
IACR Cryptol. ePrint Arch., 2021
RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware.
Comput. Networks, 2021
IEEE Access, 2021
DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
2020
IEEE Internet Things J., 2020
IEEE Access, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network.
Proceedings of the Security and Privacy in Communication Networks, 2020
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems.
Proceedings of the NOMS 2020, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
J. Inf. Secur. Appl., 2019
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019
Proceedings of the 12th International Conference on Security of Information and Networks, 2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
J. Softw. Evol. Process., 2018
DADI: Defending against distributed denial of service in information-centric networking routing and caching.
Secur. Priv., 2018
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
2017
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults.
Empir. Softw. Eng., 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IEEE Commun. Surv. Tutorials, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
IEEE Trans. Cloud Comput., 2014
J. Syst. Softw., 2014
Software control flow error detection and correlation with system performance deviation.
J. Comput. Syst. Sci., 2014
Comput. Secur., 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 14th International Conference on Quality Software, 2014
Proceedings of the 2014 14th International Conference on Quality Software, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Inf. Softw. Technol., 2012
Future Gener. Comput. Syst., 2012
ACM Comput. Surv., 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
J. Syst. Softw., 2011
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities.
J. Syst. Archit., 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Int. J. Secur. Softw. Eng., 2010
Int. J. Softw. Eng. Knowl. Eng., 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010
Proceedings of the Architecting Critical Systems, First International Symposium, 2010
Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the ARES 2010, 2010
2009
Collaboration through computation: incorporating trust model into service-based software systems.
Serv. Oriented Comput. Appl., 2009
A model-based aspect-oriented framework for building intrusion-aware software systems.
Inf. Softw. Technol., 2009
Proceedings of the Computer Safety, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
IEEE Trans. Syst. Man Cybern. Part C, 2008
J. Mobile Multimedia, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Eighth International Conference on Quality Software, 2008
Proceedings of the Eighth International Conference on Quality Software, 2008
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
J. Syst. Softw., 2007
J. Syst. Softw., 2007
Int. J. Inf. Sec., 2007
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
Proceedings of the The First International Conference on Availability, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
J. Syst. Softw., 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005
Proceedings of the Third Annual Conference on Privacy, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004
2002
Proceedings of the Integrated Formal Methods, Third International Conference, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001