Syed Ali Khayam
According to our database1,
Syed Ali Khayam
authored at least 80 papers
between 2003 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
0
5
10
15
1
1
5
3
2
7
3
2
3
1
1
1
2
2
4
8
6
6
10
4
2
2
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
J. Comput. Virol. Hacking Tech., 2018
2015
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
2014
J. Netw. Comput. Appl., 2014
IEEE Commun. Surv. Tutorials, 2014
Comput. Commun. Rev., 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014
2013
Evaluation and improvement of CDS-based topology control for wireless sensor networks.
Wirel. Networks, 2013
ACM Trans. Inf. Syst. Secur., 2013
CoRR, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Simul., 2012
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks.
J. Netw. Comput. Appl., 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane.
Proceedings of the European Workshop on Software Defined Networking, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Monetizing spambot activity and understanding its relation with spambot traffic features.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Wirel. Pers. Commun., 2011
J. Comput. Virol., 2011
Determining malicious executable distinguishing attributes and low-complexity detection.
J. Comput. Virol., 2011
J. Comput. Virol., 2011
Comput. Secur., 2011
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks.
Comput. Commun., 2011
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications.
Ad Hoc Networks, 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Energy and distortion analysis of video compression schemes for Wireless Video Sensor Networks.
Proceedings of the MILCOM 2011, 2011
A Cross-Layer Architecture for Motion-Adaptive Video Transmission over MIMO Channels.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Sensors, 2010
EURASIP J. Wirel. Commun. Netw., 2010
Comput. Commun. Rev., 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems.
Proceedings of IEEE International Conference on Communications, 2010
An energy efficient Clique-based CDS discovery protocol for wireless sensor networks.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Comparison of Conventional and Cross-Layer Multimedia Transport Schemes for Wireless Networks.
Wirel. Pers. Commun., 2009
An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of IEEE International Conference on Communications, 2008
Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations.
Proceedings of IEEE International Conference on Communications, 2008
SRVF: An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008
Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008
2007
Maximum-Likelihood Header Estimation: A Cross-Layer Methodology for Wireless Multimedia.
IEEE Trans. Wirel. Commun., 2007
IEEE Trans. Multim., 2007
Perform. Evaluation, 2007
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes.
Proceedings of IEEE International Conference on Communications, 2007
On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems.
Proceedings of IEEE International Conference on Communications, 2007
On Channel State Inference and Prediction Using Observable Variables in 802.11b Network.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007
2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of IEEE International Conference on Communications, 2006
2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
A statistical receiver-based approach for improved throughput of multimedia communications over wireless LANs.
Proceedings of IEEE International Conference on Communications, 2005
2004
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004
2003
Performance analysis and modeling of errors and losses over 802.11b LANs for high-bit-rate real-time multimedia.
Signal Process. Image Commun., 2003
Proceedings of the 6th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003