The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Mohammad Zulkernine" ( http://dblp.L3S.de/Authors/Mohammad_Zulkernine )

  Author page on DBLP  Author page in RDF  Community of Mohammad Zulkernine in ASPL-2

Publication years (Num. hits)
2001-2006 (18) 2007-2008 (29) 2009-2010 (21) 2011-2012 (22) 2013-2014 (21) 2015-2016 (20) 2017-2018 (21) 2019 (9)
Publication types (Num. hits)
article(27) inproceedings(131) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 74 occurrences of 56 keywords

Results
Found 162 publication records. Showing 161 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Marwa Elsayed, Mohammad Zulkernine Offering security diagnosis as a service for cloud SaaS applications. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Talal Halabi, Mohammad Zulkernine Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game. Search on Bibsonomy DSN Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shahrear Iqbal, Anwar Haque, Mohammad Zulkernine Towards a Security Architecture for Protecting Connected Vehicles from Malware. Search on Bibsonomy VTC Spring The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Talal Halabi, Mohammad Zulkernine Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Md Swawibe Ul Alam, Shahrear Iqbal, Mohammad Zulkernine, Clifford Liem Securing Vehicle ECU Communications and Stored Data. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abu Faisal, Mohammad Zulkernine Graphene: A Secure Cloud Communication Architecture. Search on Bibsonomy ACNS Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Juan Wang, Karim Lounis, Mohammad Zulkernine CSKES: A Context-Based Secure Keyless Entry System. Search on Bibsonomy COMPSAC (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi STPSA 2019 Welcome Message. Search on Bibsonomy COMPSAC (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Juan Wang, Karim Lounis, Mohammad Zulkernine Security Features for Proximity Verification. Search on Bibsonomy COMPSAC (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu Protecting Internet users from becoming victimized attackers of click-fraud. Search on Bibsonomy Journal of Software: Evolution and Process The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karim Lounis, Mohammad Zulkernine Connection Dumping Vulnerability Affecting Bluetooth Availability. Search on Bibsonomy CRiSIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marwa Elsayed, Mohammad Zulkernine A Taxonomy of Security as a Service. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine A Context-Aware Privacy Scheme for Crisis Situations. Search on Bibsonomy GLOBECOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1A. B. M. Bodrul Alam, Anwar Haque, Mohammad Zulkernine CREM: A Cloud Reliability Evaluation Model. Search on Bibsonomy GLOBECOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sheikh Iqbal Ahamed, Mohammad Zulkernine Message from the STPSA 2018 Workshop Organizers. Search on Bibsonomy COMPSAC (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers Securing Web Applications with Secure Coding Practices and Integrity Verification. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein A Security Framework for ICN Traffic Management. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jia Wan, Mohammad Zulkernine, Clifford Liem A Dynamic App Anti-Debugging Approach on Android ART Runtime. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shahrear Iqbal, Mohammad Zulkernine SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android. Search on Bibsonomy MALWARE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem Towards defending connected vehicles against attacks. Search on Bibsonomy ECBS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1M. D. Siam Hasan, Thomas R. Dean, Fahim T. Imam, Francisco Garcia, Sylvain P. Leblanc, Mohammad Zulkernine A Constraint-based intrusion detection system. Search on Bibsonomy ECBS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1A. B. M. Bodrul Alam, Mohammad Zulkernine, Anwar Haque A Reliability-Based Resource Allocation Approach for Cloud Computing. Search on Bibsonomy SC² The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine Flamingo: a framework for smartphone security context management. Search on Bibsonomy SAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine A Participant Contribution Trust Scheme for Crisis Response Systems. Search on Bibsonomy GLOBECOM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem TRUST-CAP: A Trust Model for Cloud-Based Applications. Search on Bibsonomy COMPSAC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Katsuyoshi Iida, Mohammad Zulkernine Message from SEPT 2017 Organizing Committee. Search on Bibsonomy COMPSAC (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saeed Shafieian, Daniel Smith, Mohammad Zulkernine Detecting DNS Tunneling Using Ensemble Learning. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts. Search on Bibsonomy ISC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Zulkernine, Mohammad Mahfuzul Islam (eds.) International Conference on Networking, Systems and Security, NSysS 2017, Dhaka, Bangladesh, January 5-8, 2017 Search on Bibsonomy NSysS The full citation details ... 2017 DBLP  BibTeX  RDF
1Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem Defending Application Cache Integrity of Android Runtime. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, Mohammad Zulkernine Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. Search on Bibsonomy Empirical Software Engineering The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter J. Clarke, Mohammad Zulkernine Special issue on High Assurance Systems Engineering. Search on Bibsonomy Software Quality Journal The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu FCFraud: Fighting Click-Fraud from the User Side. Search on Bibsonomy HASE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saikat Das, Mohammad Zulkernine CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. Search on Bibsonomy HASE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein DACPI: A decentralized access control protocol for information centric networking. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marwa Elsayed, Mohammad Zulkernine IFCaaS: Information Flow Control as a Service for Cloud Security. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohannad A. Alswailim, Hossam S. Hassanein, Mohammad Zulkernine A Reputation System to Evaluate Participants for Participatory Sensing. Search on Bibsonomy GLOBECOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine Message from STPSA 2016 Workshop Organizers. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bhavani M. Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino Message from the SEPT Organizing Committee. Search on Bibsonomy COMPSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine SAM: A secure anti-malware framework for the smartphone operating systems. Search on Bibsonomy WCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Davari, Mohammad Zulkernine Analysing vulnerability reproducibility for Firefox browser. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine Intrusion detection in a private network by satisfying constraints. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Shahrear Iqbal, Mohammad Zulkernine Zonedroid: control your droid through application zoning. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marwa Elsayed, Mohammad Zulkernine A Classification of Intrusion Detection Systems in the Cloud. Search on Bibsonomy JIP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Hossam S. Hassanein, Mohammad Zulkernine A Survey of Security Attacks in Information-Centric Networking. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam An Empirical Evaluation of Web-Based Fingerprinting. Search on Bibsonomy IEEE Software The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein Detection and Prevention of Malicious Requests in ICN Routing and Caching. Search on Bibsonomy CIT/IUCC/DASC/PICom The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Saeed Shafieian, Mohammad Zulkernine, Anwar Haque CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud. Search on Bibsonomy CIT/IUCC/DASC/PICom The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bhavani M. Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino Message from SEPT Symposium Organizing Committee. Search on Bibsonomy COMPSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam FPGuard: Detection and Prevention of Browser Fingerprinting. Search on Bibsonomy DBSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Misiu Godfrey, Mohammad Zulkernine Preventing Cache-Based Side-Channel Attacks in a Cloud Environment. Search on Bibsonomy IEEE Trans. Cloud Computing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atef Shalan, Mohammad Zulkernine Software control flow error detection and correlation with system performance deviation. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier Effective detection of vulnerable and malicious browser extensions. Search on Bibsonomy Computers & Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaoying Bai, Atilla Elçi, Mohammad Zulkernine Special issue on "Trustworthy Software Systems for the Digital Society". Search on Bibsonomy Journal of Systems and Software The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks. Search on Bibsonomy CRiSIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam FRanC: A Ranking Framework for the Prioritization of Software Maintenance. Search on Bibsonomy SERE (Companion) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein Countermeasures for Mitigating ICN Routing Related DDoS Attacks. Search on Bibsonomy SecureComm (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Josh Marston, Komminist Weldemariam, Mohammad Zulkernine On evaluating and securing firefox for Android browser extensions. Search on Bibsonomy MOBILESoft The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fehmi Jaafar, Foutse Khomh, Yann-Gaël Guéhéneuc, Mohammad Zulkernine Anti-pattern Mutations and Fault-proneness. Search on Bibsonomy QSIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Umair Ahmed Khan, Mohammad Zulkernine A Hybrid Monitoring of Software Design-Level Security Specifications. Search on Bibsonomy QSIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohannad A. Alswailim, Mohammad Zulkernine, Hossam S. Hassanein Classification of participatory sensing privacy schemes. Search on Bibsonomy LCN Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Umme Hunny, Mohammad Zulkernine, Komminist Weldemariam OSDC: adapting ODC for developing more secure software. Search on Bibsonomy SAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam Towards a ranking framework for software components. Search on Bibsonomy SAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Misiu Godfrey, Mohammad Zulkernine A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine A Model-Based Detection of Vulnerable and Malicious Browser Extensions. Search on Bibsonomy SERE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications. Search on Bibsonomy SERE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Zulkernine Software Assurance: What Should We Do Next? Search on Bibsonomy COMPSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. Search on Bibsonomy COMPSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Atef Shalan, Mohammad Zulkernine Runtime Prediction of Failure Modes from System Error Logs. Search on Bibsonomy ICECCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anton Barua, Mohammad Zulkernine, Komminist Weldemariam Protecting Web Browser Extensions from JavaScript Injection Attacks. Search on Bibsonomy ICECCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ladan Tahvildari, Mohammad Zulkernine Quality software for quality service (QS4QS). Search on Bibsonomy CASCON The full citation details ... 2013 DBLP  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Mitigating program security vulnerabilities: Approaches and challenges. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Trustworthiness testing of phishing websites: A behavior model-based approach. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jongmoon Baik, Fabio Massacci, Mohammad Zulkernine Guest Editorial: Special section on software reliability and security. Search on Bibsonomy Information & Software Technology The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Information-Theoretic Detection of SQL Injection Attacks. Search on Bibsonomy HASE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aleem Khalid Alvi, Mohammad Zulkernine A Comparative Study of Software Security Pattern Classifications. Search on Bibsonomy ARES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atef Mohamed, Mohammad Zulkernine A Control Flow Representation for Component-Based Software Reliability Analysis. Search on Bibsonomy SERE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amatul Mohosina, Mohammad Zulkernine DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations. Search on Bibsonomy SERE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine (eds.) 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012 Search on Bibsonomy COMPSAC Workshops The full citation details ... 2012 DBLP  BibTeX  RDF
1Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine (eds.) 36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012 Search on Bibsonomy COMPSAC The full citation details ... 2012 DBLP  BibTeX  RDF
1Lorena Gutiérrez-Madronal, Hossain Shahriar, Mohammad Zulkernine, Juan José Domínguez-Jiménez, Inmaculada Medina-Bulo Mutation Testing of Event Processing Queries. Search on Bibsonomy ISSRE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Zulkernine, Mohammad Kaykobad, Mohammed Yeasin, Mohammad Ataul Karim Guest Editorial. Search on Bibsonomy JSW The full citation details ... 2011 DBLP  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. Search on Bibsonomy Journal of Systems and Software The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Istehad Chowdhury, Mohammad Zulkernine Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. Search on Bibsonomy Journal of Systems Architecture - Embedded Systems Design The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Muhammad Umair Ahmed Khan, Mohammad Zulkernine Building components with embedded security monitors. Search on Bibsonomy QoSA/ISARCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Injecting Comments to Detect JavaScript Code Injection Attacks. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiaofeng Yang, Mohammad Zulkernine Security Monitoring of Components Using Aspects and Contracts in Wrappers. Search on Bibsonomy COMPSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Anton Barua, Hossain Shahriar, Mohammad Zulkernine Server Side Detection of Content Sniffing Attacks. Search on Bibsonomy ISSRE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Information Source-Based Classification of Automatic Phishing Website Detectors. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Anti-phishing technique, information source
1Aleem Khalid Alvi, Mohammad Zulkernine A Natural Classification Scheme for Software Security Patterns. Search on Bibsonomy DASC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine S2XS2: A Server Side Approach to Automatically Detect XSS Attacks. Search on Bibsonomy DASC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atef Mohamed, Mohammad Zulkernine A Connection-Based Signature Approach for Control Flow Error Detection. Search on Bibsonomy DASC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor. Search on Bibsonomy DASC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Monitoring Buffer Overflow Attacks: A Perennial Task. Search on Bibsonomy IJSSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine Assessing Test Suites for Buffer Overflow Vulnerabilities. Search on Bibsonomy International Journal of Software Engineering and Knowledge Engineering The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Istehad Chowdhury, Mohammad Zulkernine Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, complexity, empirical study, software metrics, coupling, vulnerability, software security, cohesion
1Hossain Shahriar, Mohammad Zulkernine Classification of Buffer Overflow Vulnerability Monitors. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Program vulnerabiilty, Monitoring objective, Program state utilization, Program environment
1Hossain Shahriar, Mohammad Zulkernine Classification of Static Analysis-Based Buffer Overflow Detectors. Search on Bibsonomy SSIRI (Companion) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine PhishTester: Automatic Testing of Phishing Attacks. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting
1Atef Mohamed, Mohammad Zulkernine Failure Type-Aware Reliability Assessment with Component Failure Dependency. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF component failure dependency, multi-mode failure, fault tolerance, reliability assessment, Component-based software systems
Displaying result #1 - #100 of 161 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license