QRST Queens university QRST

Selected Publications - QRST GROUP

  1. Y. Yamout, T. Yeasar, S. Iqbal†, and M. Zulkernine, “Beyond Smart Homes: An Analytical Look on Smart Aging Care System Security Issues,” ACM Computing Surveys, 35 pages, accepted, July 2023.

  2. A. Anwar, A, Anwar, L. Moukahal, and M. Zulkernine, “Security Assessment of In-vehicle Communication Protocols,” Journal of Vehicular Communications, Article 100639, 28 pages, accepted, Elsevier, June 2023.

  3. F. Faghihi, M. Zulkernine, and S. Ding*, “AIM: An Android Interpretable Malware Detector based on Application Class Modeling,” Journal of Security and Applications, vol. 75, Elsevier, June 2023.

  4. S. Taviss, S. Ding*, M. Zulkernine, P. Charland, and S. Acharya, “Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis," ACM Journal Digital Threats: Research and Practice (DTRAP), March 2023.

  5. M. Islam, A. Bataineh, and M. Zulkernine, Detection of Cyberbullying in Social Media Texts using Explainable Artificial Intelligence,” The 3rd International Conference on Ubiquitous Security 2023 (UbiSec), 14 pages, to appear, Exeter, UK, November 2023.

  6. F. Faghihi, M. Zulkernine, and S. Ding*, “Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware,” The 16th International Symposium on Foundations & Practice of Security (FPS), Lecture Notes in Computer Science, 16 pages, Bordeaux France, December 2023.

  7. N. Chakraborty, Y. Yamout, and M. Zulkernine, "The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords," 2nd IEEE Conference on Communications and Network Security - Cyber Resilience Workshop, 5 pages, Florida, USA, October 2023.

  8. M. Davari and M. Zulkernine, “Automatic Conversion of ABAC Policies for RBAC Systems,” IEEE Conference on Dependable and Secure Computing, 8 pages, Florida, USA, November 2023.

  9. Abdelmeguid, H. Hassanein*, and M. Zulkernine, “'A VeReMi-Based Dataset for Predicting the Effect of Attacks in VANETs,” The 26th International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 5 pages, Montreal, Canada, November 2023.

  10. A. Fakhereldine, M. Zulkernine, and D. Murdock, “CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks," The 34th IEEE International Symposium on Software Reliability Engineering, Industry Track, 6 pages, Florence, Italy, October 2023.

  11. N. Chakraborty, M. Shojafar, Z. Chen, and V. Leung, J. Li†, and M. Zulkernine, “A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks," The 7th Cyber Security in Networking Conference (CSNet), 7 pages, Montreal, Canada 2023.

  12. D. Phillips, T. Halabi*, and M. Zulkernine, “Autonomous and Security-Aware Dynamic Vehicular Platoon Formation,” The IEEE International Symposium on Autonomous Vehicle Software (AVS), 12 pages, Tokyo, Japan, August 2023. (Best Paper Award)

  13. A. Fakhereldine, M. Zulkernine, and D. Murdock†, “TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks," The 5th International Conference on Reliability, Safety and Security of Railway Systems (RSSRAIL), 18 pages, Berlin, Germany, October 2023.

  14. N. Chakraborty, S. Iqbal, M. Zulkernine, “Risk Assessment in Smart Ageing Care Systems: An Elderly-Centered Perspective,” IEEE Conference on Digital Health (ICDH), Chicago, July 2023. (Acceptance rate 24%)

  15. T. Halabi* and M. Zulkernine, “The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense,” Invited Paper, IEEE World Congress on Services, Chicago, USA, July 2023. (Acceptance rate 25%)

  16. M. Abdelmaguid, H. Hassanein*, and M. Zulkernine, “Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET,” Communication and Information Systems Security Symposium, IEEE International Conference on Communications (ICC), Rome, Italy, June 2023. (Acceptance rate 40%)

  17. K. Lounis, S. Ding, and M. Zulkernine, “D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions,” IEEE Transactions on Vehicular Technology, to appear, 2022.

  18. A. Anwar, T. Halabi, and M. Zulkernine, “Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A Hierarchical Framework based on Game Theory,” Internet of Things Journal, Elsevier, November 2022.

  19. M. Elsayed, K. Lounis, M. Wrana, Z. Mansour, S. Ding, M. Zulkernine, "AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles," IEEE Transactions on Intelligent Transportation Systems, October 2022.

  20. A. Anwar, T. Halabi, and M. Zulkernine, “A Coalitional Security Game Against Data Integrity Attacks in Autonomous Vehicle Networks, Journal of Vehicular Communications, Elsevier, August 2022.

  21. A. Faisal and M. Zulkernine, “SAS-GKE: A Secure Authenticated Scalable Group Key Exchange Mechanism,” The 22nd International Conference on Software Quality, Reliability, and Security, (QRS), Guangzhou, China, December 2022. (Acceptance rate 27%)

  22. A. Faisal and M. Zulkernine, “DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure,” International Conference on Information Systems Security (ICISS), Lecture Notes in Computer Science, Springer-Verlag, Tirupati, India, December 2022. (Acceptance rate 8/47)

  23. M. Davari and M. Zulkernine, "Mining Attribute-Based Access Control Policies," International Conference on Information Systems Security (ICISS), Lecture Notes in Computer Science, Springer-Verlag, Tirupati, India, December 2022. (Acceptance rate 16/47)

  24. J. Banks, R. Kerr, S. Ding, M. Zulkernine, “SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments,” Military Communications Conference, IEEE, Washington DC, USA, December 2022.

  25. M. Wrana, M. Elsayed, K. Lounis, Z. Mansour, S. Ding, M. Zulkernine, "OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-Attack Simulation," ACM Transactions on Cyber-Physical Systems, July 2022.

  26. S. Shafieian and M. Zulkernine, “Multi-layer Stacking Ensemble Learners for Low Footprint Network Intrusion Detection," Journal of Complex and Intelligent Systems, Special issue on secure learning, Springer, to appear, 2022.

  27. K. Lounis, M. Elsayed, M. Wrana, Z. Mansour, S. Ding, and M. Zulkernine, "A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus," IEEE Transactions on Aerospace and Electronic Systems, 2022.

  28.  F. Faghihi, M. Zulkernine, and S. Ding*, “CamoDroid: An Android Application Analysis Environment Resilient Against Sandbox Evasion,” Journal of Systems Architecture, vol. 125, Article 102452, Elsevier, April 2022.

  29. M. Davari and M. Zulkernine “Classification-Based Anomaly Prediction in XACML Policies," The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Lecture Notes in Computer Science, Kansas City, USA, October 2022

  30. A. Alvi and M. Zulkernine, “Security Pattern Detection Through Diagonally Distributed Matrix Matching,” The 9th IEEE International Conference on Dependable Systems and Their Applications (DSA), Wulumuqi, China, August 2022. (Acceptance rate 24%)

  31. M. Abdelmaguid, H. Hassanein, and M. Zulkernine, “SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET,” The 5th International Workshop on Emerging Network Security (ENS 2022), Vienna, Austria, August 2022.

  32. A. Chaudhry, T. Halabi* and M. Zulkernine, “Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications,” Proc. of the 8th International Workshop on Safety and Security of Intelligent Vehicles (SSIV), Baltimore, Maryland, USA, June 2022.

  33. T. Halbi*, A. Chaudhury, S. Alqahtani, and M. Zulkernine, “A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments,” The IEEE Conference on Dependable and Secure Computing (DSC), Edinburgh, UK, June 2022. (Acceptance rate 28.4%)

  34. Y. Liu, J. Ni*, and M. Zulkernine “AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency," Communication and Information Systems Security Symposium, IEEE International Conference on Communications (ICC), Seoul, South Korea, May 2022.

  35. A. Fakhereldine, M. Zulkernine, and D. Murdock, “Detecting Intrusions in Communication-Based Train Control Systems," Communication and Information Systems Security Symposium, IEEE International Conference on Communications (ICC), Seoul, South Korea, May 2022.

  36. L. Moukahal, M. Zulkernine, M. Soukup, “Fuzzy Testing of a Software System,” U.S. Patent No. 17/191791, U.S. Patent and Trademark Office, 2021.

  37. L. Moukahal, M. Zulkernine, and M. Soukup, “Vulnerability-oriented fuzzy testing for connected autonomous vehicle systems,” IEEE Transactions on Reliability, vol. 70, no. 4, pp. 1422-1437, December 2021.

  38. K. Lounis and M. Zulkernine, “T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT," IEEE Access, pp. 137384-137405, October 2021.

  39. T. Halabi, O. Wahab, R. Mallah, and M. Zulkernine, “Protecting The Internet of Vehicles against Advanced Persistent Threats: A Bayesian Stackelberg Game,” IEEE Transactions on Reliability, vol. 70, issue 3, pp. 970-985, September 2021.

  40. F. Faghihi and M. Zulkernine, “RansomCare: Data-Centric Detection and Mitigation Against Smartphone Crypto-Ransomware,” Special Issue on Novel Cyber-Security Paradigms for Software-defined and Virtualized Systems, Journal of Computer Networks, Elsevier, vol. 191, Article 108011, Elsevier, April 2021.

  41. A. Faisal and M. Zulkernine, “A Secure Architecture for TCP/UDP-based Cloud Communications,” International Journal of Information Security, vol. 20, issue 2, pp. 161-179, Springer, April 2021.

  42. A. Alvi and M. Zulkernine, “A Security Pattern Detection Framework for Building More Secure Software Journal of Systems and Software,” Journal of Systems and Software, vol. 171, Article 110838, Elsevier, January 2021.

  43. K. Lounis, S. Ding, and M. Zulkernine, “Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3,” Proc. of the 14th International Symposium on Foundations & Practice of Security (FPS), Lecture Notes in Computer Science, Paris, France, December 2021.

  44. D. Phillips, M. Elsayed, and M. Zulkernine, "DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles,” Proc. of the IEEE International Symposium on Autonomous Vehicle Software (AVS), Hainan Island, China, December 2021.

  45. L. Moukahal, M. Zulkernine, and M. Soukup†, " Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems," Proc. of the IEEE International Symposium on Autonomous Vehicle Software (AVS), Hainan Island, China, December 2021.

  46. M. Davari and M. Zulkernine, "Policy Modeling and Anomaly Detection in ABAC Policies," Proc. of the 16th International Conference on Risks and Security of Internet and Systems (CRISIS), Lecture Notes in Computer Science, Ames, Iowa, USA, November 2021. (Acceptance rate 39%)

  47. L. Moukahal, M. Zulkernine, and M. Soukup†, "AVSDA: Autonomous Vehicle Security Decay Assessment," Proc. of the 16th International Conference on Risks and Security of Internet and Systems (CRISIS), Lecture Notes in Computer Science, Ames, Iowa, USA, November 2021. (Acceptance rate 39%)

  48. L. Moukahal, M. Zulkernine, and M. Soukup† “Towards a Secure Software Lifecycle for Autonomous Vehicles,” Proc. of the 32nd IEEE Intl Symposium on Software Reliability Engineering (ISSRE) – Industry Track, Wuhan, China, October 2021. (Nominated for the Best Industry Paper Award)

  49. K. Lounis and M. Zulkernine, "Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT" in ACM Journal Digital Threats: Research and Practice, Pages 1-35, September 2021.

  50. N. Seifollahpour, T. Halabi, and M. Zulkernine, “Reinforcement Learning-driven Attack on Road Traffic Signal Controllers,” Proc. of the IEEE International Conference on Cyber Security and Resilience (CSR), pp. 218-225, July 2021. (Acceptance rate 49.72%)

  51. J. Sun, N. Seifollahpour, S. Iqbal, and M. Zulkernine, “A Classification of Attacks to In-Vehicle Components (IVCs),Journal of Vehicular Communications, Elsevier, vol. 25, Article 100253, Pages 1-16, Elsevier, October 2020.

  52. L. Moukahal, M. Elsayed, and M. Zulkernine, “Vehicle Software Engineering: Research and Practice,” Special issue on “Software Engineering Research and Practices for the Internet of Things,” IEEE Internet of Things Journal, vol. 7, issue 10, pp. 10137-10149, IEEE, June 2020.

  53. K. Lounis and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” IEEE Access, vol. 8, pp. 88892-88932, IEEE, May 2020.

  54. M. Elsayed and M. Zulkernine, “PredictDeep: Security Analytics for Anomaly Detection and Prediction,” IEEE Access, vol. 8, pp. 45184-45197, IEEE, March 2020.

  55. K. Lounis and M. Zulkernine, “Exploiting Race Condition for Wi-Fi Denial of Service Attacks,” Proc. of the 13th International Conference on Security of Information and Networks (SINCONF), Turkey, November 2020.

  56. C. Chen, M. Elsayed, and M. Zulkernine, “HBD-Authority: Streaming Access Control Model for Hadoop,” Proc. of the The 6th IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys), Fizi, December 2020. (Best Paper Award)

  57. K. Lounis and M. Zulkernine, Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs,” Proc. of the 15th International Conference on Risks and Security of Internet and Systems (CRISIS), Paris, France, November 2020.

  58. M. Elsayed and M. Zulkernine, “Offering Security Diagnosis as a Service for Cloud SaaS Applications,” Journal of Information Security and Applications, vol 44, pp. 32-48, Elsevier, February 2019.

  59. S. Anwar and M. Zulkernine, “LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Networkk,” 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm),” 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Lecture Notes in Computer Science, Washington DC, USA, October 2020.

  60. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Reliability-based Formation of Cloud Federations Using Game Theory," Proc. of The IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, December 2020.

  61. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Optimizing Virtual Machine Migration in Multi-Clouds," Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC), Montreal, Canada, June 2020.

  62. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation," Proc. of the IEEE International Conference on Communications (ICC), Dublin, Ireland, June 2020.

  63. T. Halabi and M. Zulkernine, “A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems," Proc. of the 3rd International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT), Budapest, Hungary, April 2020.

  64. A. Anwar, T. Halabi, and M. Zulkernine, “'Cloud-based Sybil Attack Detection Scheme for Connected Vehicles, Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.

  65. K. Lounissand M. Zulkernine,and M. Zulkernine,, WPA3 Connection Deprivation Attacks", Proc. of the 144thhInternational Conference on Risks and Security of Internet and Systems (CRISIS),International Conference on Risks and Security of Internet and Systems (CRISIS), Hammamet, Tunisia, November 2019.

  66. K. Lounis and M. Zulkernine, “Bluetooth Low Energy Makes Just Works Not Work,” Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.K. Lounis and M. Zulkernine, “Bluetooth Low Energy Makes Just Works Not Work,” Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.

  67. L. Moukahal and M. Zulkernine, “Security Vulnerability Metrics for Connected Vehicles,” Proc. of the IEEE International Workshop on Automobile Software Security and Safety (A3S), Sofia, Bulgaria, July 2019.

  68. J. Wang, K. Lounis, and M. Zulkernine, “Identifying Security Features for Proximity Identification,” Proc. of the IEEE International Workshop on Security, Trust and Privacy for Software Applications (STPSA), Milwaukee, USA, July 2019.

  69. A. Faisal and M. Zulkernine, “Graphene: A Secure Cloud Communication Architecture,” Proc. of the International Workshop on Cloud Security and Privacy, LNCS, Bogota, Colombia, June 2019.

  70. J. Wang, K. Lounis, and M. Zulkernine, “CSKES: A Context-based Secure Keyless Entry System,” Proc. of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, USA, July 2019.

  71. T. Halabi and M. Zulkernine, “Reliability-driven Task Assignment in Vehicular Crowdsourcing: A Matching Game,” Proc. of the 5th International Workshop on Safety and Security of Intelligent Vehicles (SSIV), Portland, USA, June 2019.

  72. S. Iqbal, A. Haque, M. Zulkernine, “Towards a Security Architecture for Protecting Connected Vehicles from Malware,” Proc. of the IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lampur, Malaysia, May 2019.

  73. T. Halabi and M Zulkernine, “Trust-based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles,” The IEEE International Conference on Communications (ICC, Communication and Information Systems Security Symposium), Shanghai, China, May 2019. (Acceptance rate 39%)

  74. M. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing Vehicle ECU Communications and Protecting ECU Data Using Blockchain,” The IEEE International Conference on Communications (ICC Communication and Information Systems Security Symposium) Shanghai, China, May 2019. (Acceptance rate 39%)

  75. E. AbdAllah,M. Zulkernine, and H. Hassanein, ““Preventing Unauthorized Access in Information Centric Networking,”” Journal of Security and Privacy, vol. 1, issue 4, pp. 1-13,Journal of Security and Privacy, vol. 1, issue 4, pp. 1-13,Willey, July 2018.

  76. E. AbdAllah,E. AbdAllah, M. Zulkernine, and H. Hassanein, “DADI: Defending Against DDoS in ICN Routing and Caching,”” Journal of Security and Privacy,Journal of Security and Privacy,vol. 1, issue 2, pp. 1-17, Willey,, March 2018.March 2018.

  77. M. Elsayed, M. Zulkernine, “A Taxonomy of Security as a Service,” Proc. of the 8th International Symposium on Secure Virtual Infrastructures: Cloud & Trusted Computing, LNCS, vol. 11230, pp. 305-312, Malta, October 2018. (Acceptance rate 34%)

  78. K. Lounis, M. Zulkernine, “Connection Dumping Vulnerability Affecting Bluetooth Availability", Proc. of the 13th International Conference on Risks and Security of Internet and Systems (CRISIS), Springer, France, October 2018.

  79. S. Iqbal, M. Zulkernine, “SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android", Proc. of the IEEE Conference on Malicious & Unwanted Software (MALCON), USA, October 2018.

  80. M. A. Alswailim, H.S. Hassanein, M. Zulkernine, “A Context-Aware Privacy Scheme for Crisis Situations”, Proc. of The IEEE Global Communications Conference (GLOBECOM), UAE, Dec 2018. (Acceptance rate 38%)

  81. B. Alam, M. Zulkernine, A. Haque, “CREM: A Cloud Reliability Evaluation Model”, Proc. of the IEEE Global Communications Conference (GLOBECOM), UAE, December 2018. (Acceptance rate 38%)

  82. J. Wan, M. Zulkernine, and C. Liem, “A Dynamic App Anti-Debugging Approach on Android ART Runtime”, Proc. of the 3rd Cyber Science and Technology Congress (CyberSciTech2018), pp. 560-567, Athens, Greece, IEEE, August 2018. (Acceptance rate 39%)

  83. E. AbdAllah, M. Zulkernine, and H. S. Hassanein, “A Security Framework for ICN Traffic Management”, Proc. of the 3rd Cyber Science and Technology Congress (CyberSciTech2018), pp. 78-85, Athens, Greece, IEEE, August 2018. (Acceptance rate 30%)

  84. A. Anis, M. Zulkernine, S. Iqbal, C. Liem, and C. Chambers, “Securing web applications with secure coding practices and integrity verification”, Proc. of the Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 618-625, Athens, Greece, IEEE, August 2018. (Acceptance rate 39%)

  85. M. Elsayed and M. Zulkernine, “Integrating Security in Cloud Application Development Cycle”, Proc. of the 4th International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, IEEE, July 2018. (Best Paper Award)

  86. O. Hreirati, S. Iqbal, and M. Zulkernine, “An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques,” Proc. of the 4th International Conference on Software Security and Assurance (ICSSA), IEEE, July 2018.

  87. M. Elsayed and M. Zulkernine, “Towards Security Monitoring for Cloud Analytic Applications,” Proc. of the 4th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), Omaha, USA, May 2018. (Best Paper Award)

  88. J. Wan, M. Zulkernine, P. Eisen, and C. Liem, "Defending Application Cache Integrity of Android Runtime," Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, December 2017. (Acceptance rate 33%)J. Wan, M. Zulkernine, P. Eisen, and C. Liem, "Defending Application Cache Integrity of Android Runtime," Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, December 2017. (Acceptance rate 33%)

  89. B. Alam, M. Zulkernine, and A. Haque, “A Reliability-Based Resource Allocation Approach for Cloud Computing,” Proc. of the IEEE International Symposium on Cloud and Services Computing, pp. 249-252, Kanazawa, Japan, November 2017.

  90. M. Iqbal and M. Zulkernine, “Droid Mood Swing (DMS): Automatic Security Modes Based on the Context,", Proc. of the 20th Information Security Conference (ISC), pp. 329-347, Ho Chi Minh City, Vietnam, November 2017. (Acceptance rate 25.7%).

  91. M. Alswailim, M. Zulkernine, and H. Hassanein, “A Participant Contribution Trust Scheme for Crisis Response Systems,” Proc. of the the IEEE GLOBECOM, Singapore, December 2017.

  92. A. Alvi and M. Zulkernine, "Security Pattern Detection Using Ordered Matrix Matching," Proc. of the IEEE International Conference on Software Security and Assurance (ICSSA), Altoona, Pennsylvania, USA, July 2017.

  93. M. Davari and M. Zulkernine, “An Automatic Software Vulnerability Classification Framework,” Proc. of the IEEE International Conference on Software Security and Assurance (ICSSA), Altoona, Pennsylvania, USA, July 2017.

  94. M. Hasan, T. Dean, F. Imam, F. Garcia, S. Leblanc and M. Zulkernine, “A Constraint-based Intrusion Detection System,” Proc. of the 5th European Conference on the Engineering of Computer Based Systems (ECBS), Cyprus, August 2017.

  95. E. AbdAllah, M. Zulkernine, Y. Gu, and C. Liem, "Towards Defending Connected Vehicles Against Attacks," Proc. of the 5th European Conference on the Engineering of Computer Based Systems (ECBS), Cyprus, August 2017.

  96. S. Shafieian, D. Smith, M. Zulkernine, "Detecting DNS Tunneling Using Ensemble Learning", Proc. of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August, 2017. (Acceptance rate 28.9%).

  97. E. AbdAllah, M. Zulkernine, Y. Gu, and C. Liem, "TRUST-CAP: A Trust Model for Cloud-based Applications," Proc. of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP), Turin, Italy, July 2017.

  98. M. Iqbal, M. Zulkernine, F. Jaafar, and Y. Gu, "Protecting Internet Users from Becoming Victimized Attackers of Click-fraud", Journal of Software: Evolution and Process, Willey, 2017.

  99. M. Iqbal and M. Zulkernine, “Flamingo: A framework for smartphone security context management", Proc. of the 32nd ACM Symposium on Applied Computing (ACM SAC), pp. 563-568, Morocco, April 2017.

  100. M. Hasan, A. ElShakankiry, T. Dean, and M. Zulkernine, “Intrusion Detection in a Private Network by Satisfying Constraints”, Proc. of the 14th Annual Conference on Privacy, Security and Trust (PST), pp. 623-628, Auckland, New Zealand, IEEE, December 2016.

  101. M. Davari and M. Zulkernine, “Analysing Vulnerability Reproducibility for Firefox Browser”, Proc. of the 14th Annual Conference on Privacy, Security and Trust (PST), pp. 674-681, Auckland, New Zealand, IEEE, December 2016.

  102. M. Alswailim, M. Zulkernine, and H. Hassanein, “A Reputation System to Evaluate Participants for Participatory Sensing,” Proc. of the the IEEE GLOBECOM, Washington DC, USA, December 2016.

  103. M. Iqbal and M. Zulkernine, “'ZoneDroid: Control Your Droid Through Application Zoning," Proc. of the 11th International Conference on Malicious and Unwanted Software (MALCON), pp. 113-120, Puerto Rico, USA, October 2016.

  104. M. Elsayed and M. Zulkernine, “IFCaaS: Information Flow Control as a Service for Cloud Security,” Proc. of the International Conference on Availability, Reliability and Security (AReS), pp. 211-216, IEEE CS, Salzburg, Austria, August 2016.

  105. E. AbdAllah, M. Zulkernine, and H. Hassanein, “DACPI: A Decentralized Access Control Protocol for Information Centric Networking,” Proc. of the IEEE ICC 2016 Communication and Information Systems Security Symposium, pp. 1-6, Kuala Lumpur, Malaysia, May 2016.

  106. M. Iqbal and M. Zulkernine, “SAM: A Secure Anti-Malware Framework for the Smartphone Operating Systems," Proc. of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Doha, Qatar, April 2016.

  107. S. Das and M. Zulkernine, “CLOUBEX: A Cloud-based Security Analysis Framework for Browser Extensions," Proc. of the 17th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 268-275, Orlando, Florida, USA, January 2016.

  108. M. Iqbal, M. Zulkernine, F. Jaafar, and Y. Gu "FCFraud: Fighting Click-Fraud from User Side," Proc. of the 17th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 157-164, Orlando, Florida, USA, January 2016.

  109. A. Khademi, M. Zulkernine, and K. Weldemariam, "Empirical Evaluation of Web-based Fingerprinting," Special issue on Security and Privacy on the Web, IEEE Software, vol. 32, no. 4, pp. 46-52, 2015.

  110. M. Elsayed and M. Zulkernine, “A Classification of Intrusion Detection Systems in the Cloud,” IPSJ Journal of Information Processing, vol. 23, no. 4, pp. 392-401, 2015.

  111. E. AbdAllah, H. Hassanein, and M. Zulkernine, "A Survey of Security Attacks in Information-Centric Networking", The IEEE Communications Surveys and Tutorials, vol 17, no. 3, pp. 1441-1454, 2015.

  112. M. Godfrey and M. Zulkernine "Preventing Side-Channel Attacks in a Cloud Environment," The IEEE Transactions on Cloud Computing, vol. 2, issue 4, pp. 395-408, December 2014.

  113. H. Shahriar, K. Weldemariam, M. Zulkernine, and T. Lutellierd, “Effective Detection of Vulnerable and Malicious Browser Extensions” Journal of Computers & Security, vol. 47, pp. 66-84, Elsevier Science, November 2014.

  114. M. Atefand M. Zulkernine, "Software Control Flow Error Detection and Correlation with System Performance Deviation,” Special issue onn “Dependable and Secure Computing,”“Dependable and Secure Computing,” Journal of Computer and System Sciences, vol. 80, issue 5,,pp. 953-972, Elsevier Science,pp. 953-972, Elsevier Science, August 2014.

  115. S. Shafieian, M. Zulkernine, and A. Haque, “Attacks in Public Clouds: Can They Hinder Rise of the Cloud?” in Z. Mahmood, Cloud Computing, Computer Communications and Networks, Springer, pp. 3-22, October 2014.S. Shafieian, M. Zulkernine, and A. Haque, “Attacks in Public Clouds: Can They Hinder Rise of the Cloud?” in Z. Mahmood, Cloud Computing, Computer Communications and Networks, Springer, pp. 3-22, October 2014.

  116. E. AbdAllah, M. Zulkernine, and H. Hassanein, “Detection and Prevention of Malicious Requests in ICN Routing and Caching,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015. (Best Paper Award)

  117. S. Shafieian, M. Zulkernine, and A. Haque, “CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015.S. Shafieian, M. Zulkernine, and A. Haque, “CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015.

  118. A. Khademi, M. Zulkernine, and K. Weldemariam, "FPGuard: FPGuard: Detection and Prevention of Browser Fingerprinting," Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), pp. 293-308, Fairfax, VA, USA, July 2015.

  119. H. Hashemi, M. Zulkernine, and K. Weldemariam, "TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks," Proc. of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS), Trento, Italy, August 2014. (Acceptance rate 29%).

  120. E. AbdAllah, M. Zulkernine, and H. Hassanein, “Countermeasures for Mitigating ICN Routing Related DDoS Attacks,” Proc. of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Beijing, China, September 2014.

  121. U. Khan and M. Zulkernine, “A Hybrid Monitoring of Software Design-Level Security Specifications,” Proc. of the 14th International Conference on Quality Software (QSIC), pp. 111-116, IEEE CS, Dallas Texas, USA, October 2014.

  122. M. Alswailim, M. Zulkernine, and H. Hassanein, “Classification of Participatory Sensing Privacy Schemes,” The 14th IEEE International Workshop on Wireless Local Networks (WLN), pp. 761-767, Edmonton, Canada, September 2014.

  123. H. Hashemi, M. Zulkernine, and K. Weldemariam, "TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks," Proc. of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 196-212, Trento, Italy, August 2014. (Acceptance rate 29%).
  124. D. Chaudhary, M. Zulkernine, and K. Weldemariam†, “FRanC: A Ranking Framework for the Prioritization of Software Maintenance,” Proc. of the 3rd IEEE Workshop on Information Assurance, pp. 31-40, San Francisco, California, USA, July 2014.
  125. J. Marston, K. Weldemariam, M. Zulkernine, “Evaluating and Securing Firefox for Android Browser Extensions,” 1st ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), pp. 27-36, Hyderabad, India, June 2014.
  126. M. Atef and M. Zulkernine, “Runtime Prediction of Failure Modes from System Error Logs," Proc. of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 232-241, Singapore, July 2013. (Acceptance rate 25%).
  127. B. Eshete, A. Villafiorita, K. Weldemariam, and M. Zulkernine, “EINSPECT: Evolution- Guided Analysis and Detection of Malicious Web Pages,” Proc. of the 37th Annual International Computer Software and Applications Conference (COMPSAC), pp. 375-380, Kyoto, Japan, July 2013.
  128. A. Barua, M. Zulkernine, and K. Weldemariam, “Protecting Web Browser Extensions from JavaScript Injection Attacks,” Proc. of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 188-197, Singapore, July 2013. (Acceptance rate 25%).
  129. H. Shahriar, K. Weldemariam, T. Lutellier, and M. Zulkernine, “A Model-Based Detection of Vulnerable and Malicious Browser Extensions,” Proc. of 7th Intl Conference on Software Security and Reliability (SERE), pp. 198-207, Washington, D.C., USA, June 2013. (Acceptance rate 30%).
  130. M. Godfrey and M. Zulkernine, “A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud,” Proc.of the IEEE 6th International Conference on Cloud Computing (CLOUD), pp. 163-170, Santa Clara, USA, June 2013. (Acceptance rate 19%).
  131. B. Eshete, K. Weldemariam, A. Villafiorita, and M. Zulkernine, “Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications,” Proc. of the 7th Intl Conf on Software Security and Reliability (SERE), pp. 188-197, Washington, D.C., USA, June 2013. (Acceptance rate 30%).
  132. U. Hunny, M. Zulkernine, and K. Weldemariam, "OSDC: Adapting ODC for Developing More Secure Software," Proc. of the 28th Annual ACM Symposium on Applied Computing (SAC): Software Engineering Track, pp. 1131-1136, Coimbra, Portugal, March 2013. (Acceptance rate 24%).
  133. L. Gutiérrez-Madroñal, H. Shahriar, M. Zulkernine, J. Domínguez-Jiménez, and I. Medina-Bulo, "Mutation Testing of Event Processing Queries," Proc. of the 23rd IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 21-30, Dallas, Texas, USA, November 2012. (Acceptance rate 30%)
  134. H. Shahriar and M. Zulkernine, "Information Theoretic Detection of SQL Injection Attacks," Proc. of the 14th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 40-47, IEEE CS Press, Omaha, USA, October 2012. (Acceptance rate 43%)
  135. A. Alvi and M. Zulkernine, "A Comparative Study of Security Pattern Classifications," Proc. of the 6th International Workshop on Secure Software Engineering (SecSE), pp. 582-589, IEEE CS Press, Prague, Czech Republic, August 2012.
  136. H. Shahriar and M. Zulkernine, “Mitigating Program Security Vulnerabilities: Approaches and Challenges,” ACM Computing Surveys, ACM, Vol. 44, No. 3, Article 11, pp. 1-46, May 2012.
  137. H. Shahriar and M. Zulkernine, “Trustworthiness Testing of Phishing Websites: A Behavior Model-Based Approach,” , Special issue on “Trusting Software Behavior,” Journal of Future Generation of Computer Systems, Vol. 28, Issue 8, October 2012, pp. 1258-1271.
  138. M. Atef and M. Zulkernine, “A Control Flow Representation for Component-Based Software Reliability Analysis,” Proc. of the 6th IEEE International Conference on Software Security and Reliability (SERE), pp. 1-10, Washington DC, USA, June 2012. (Acceptance rate 30%)
  139. A. Mohsina and M. Zulkernine, “DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations,” Proc. of the 6th IEEE International Conference on Software Security and Reliability (SERE), pp. 98-107, Washington DC, USA, June 2012. (Acceptance rate 30%)
  140. A Barua, H. Shahriar, and M. Zulkernine, “Server Side Detection of Content Sniffing Attacks,” Proc. of the 22nd IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 20-29, Hiroshima, Japan, November 2011. (Acceptance rate 25%)
  141. H. Shahriar and M. Zulkernine, “A Fuzzy Logic-based Buffer Overflow Vulnerability Auditor,” Proc. of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2011), pp. 137-144, Sydney, Australia, December 2011. (Acceptance rate 35%, Best Paper Award)
  142. H. Shahriar and M. Zulkernine, “S2XS2: A Server Side Approach to Automatically Detect XSS Attacks,” Proc. of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2011), pp. 7-14, Sydney, Australia, December 2011. (Acceptance rate 35%)
  143. M. Atef and M. Zulkernine, “A Connection-Based Signature Approach for Control Flow Error Detection,” Proc. of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2011), pp. 129-136, Sydney, Australia, December 2011. (Acceptance rate 35%)
  144. A. Alvi and M. Zulkernine, “A Natural Classification Scheme for Software Security Patterns,” Proc. of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2011), pp. 113-119, Sydney, Australia, December 2011. (Acceptance rate 35%)
  145. X. Young and M. Zulkernine, “Security Monitoring of Components Using Aspects and Contracts in Wrappers,” Proc. of the 35th Annual International Computer Software and Applications Conference (COMPSAC), pp. 566-575, IEEE CS, Munich, Germany, July 2011. (Acceptance rate 20%)
  146. H. Shahriar and M. Zulkernine, “Information Source-based Classification of Automatic Phishing Website Detectors,” Proc. of the 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), pp. 190-195, IEEE CS, Munich, Germany, July 2011.
  147. H. Shahriar and M. Zulkernine, “Injecting Comments to Detect JavaScript Code Injection Attacks,” Proc. of the 6th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA), pp. 104-109,  IEEE CS, Munich, Germany, July 2011.
  148. U. Khan and M. Zulkernine, "Building Components with Embedded Security Monitors," Proceedings of the 2nd ACM SigSoft International Symposium on Architecting Critical Systems (ISARCS), Boulder, Colorado, USA, ACM Press, pp. 133-142, June 2011.
  149. I. Chowdhury and M. Zulkernine, “Using Complexity, Coupling, and Cohesion Metrics as Early Indicators of Vulnerabilities," Special Issue on "Security and Dependability Assurance of Software Architectures," Journal of Systems Architecture, vol. 57, issue 3, pp. 294-313, Elsevier Science, March 2011.
  150. H. Shahriar and M. Zulkernine, “Taxonomy and Classification of Automatic Monitoring of Program Security Vulnerability Exploitations,” Journal of Systems and Software, vol.84, issue 2, pp. 250-269, Elsevier Science, February 2011.
  151. H. Shahriar and M. Zulkernine, “Client-Side Detection of Cross-Site Request Forgery Attacks,” Proc. of the 21st IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 358-367, San Jose, CA, USA, November 2010. (Acceptance rate 32%)
  152. H. Shahriar and M. Zulkernine, “Monitoring Buffer Overflow Attacks: A Perennial Task,” International Journal of Secure Software Engineering (IJSSE), IGI Global, Vol. 1, Issue 3, pp. 18-40, July-September 2010.
  153. M. Atef and M. Zulkernine, “The Level of Decomposition Impact on Component Fault Tolerance,” Proc. of the Fifth Workshop on Quality Oriented Reuse of Software (QUROS), pp. 57-62, EEE CS Press, Seoul, Korea, July 2010.
  154. H. Shahriar and M. Zulkernine, “PhishTester: Automatic Testing of Phishing Attacks,” Proc. of the 4th IEEE International Conference on Secure System Integration and Reliability Improvement (SSIRI), pp. 198-207, IEEE CS Press, Singapore, June 2010. (Acceptance rate 33%)
  155. M. Atef and M. Zulkernine, “Architectural Design Decisions for Achieving Reliable Software Systems,” Proc. of the International Symposium on Architecting Critical Systems (ISARCS), Lecture Notes in Computer Science, vol. 6150, pp. 19-32, Prague, Czech Republic, June 2010.
  156. M. Atef and M. Zulkernine, “Failure Type-Aware Reliability Assessment with Component Failure Dependency,” Proc. of the 4th IEEE International Conference on Secure System Integration and Reliability Improvement (SSIRI), pp. 98-105, IEEE CS Press, Singapore, June 2010. (Acceptance rate 33%)
  157. H. Shahriar and M. Zulkernine, “Classification of Static Analysis-Based Buffer Overflow Detectors,” Proc. of the 1st International Workshop on Modeling Secure and Reliable Systems, pp. 94-101, IEEE CS Press, Singapore, June 2010.
  158. M. Atef and M. Zulkernine, “A Taxonomy of Software Architecture-Based Reliability Efforts,” Proc. of the Fifth ICSE Workshop on SHAring and Reusing architectural Knowledge (SHARK), pp. 44-51, ACM, Cape Town, South Africa, May 2010. (Acceptance rate 53%)
  159. I. Chowdhury and M. Zulkernine, “Can Complexity, Coupling, and Cohesion Metrics be Used as Early Indicators of Vulnerabilities?” Proc. of the 25th Annual ACM Symposium on Applied Computing (SAC): Computer Security Track, pp. 1963-1969, Sierre, Switzerland, March 2010.(Acceptance rate 15%)
  160. H. Shahriar and M. Zulkernine, “Classification of Automatic Monitors for Buffer Overflow Vulnerabilities,” Proc. of the 4th International Workshop on Secure Software Engineering (SecSE), pp. 519-524, IEEE CS Press, Krakow, Poland, February 2010.
  161.  H. Shahriar and M. Zulkernine, “Assessing Test Suites for Buffer Overflow Vulnerabilities,” International Journal of Software Engineering and Knowledge Engineering (IJSEKE), Special Issue on Security Engineering Practices & Methodology based on Software & Knowledge Engineering, vol. 20, issue 1, pp. 73-101, World Scientific. February, 2010.
  162. M. Zulkernine, M. Raihan, and M. Uddin, “Towards Model-Based Automatic Testing of Attack Scenarios,” Proc. of the 28th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Lecture Notes in Computer Science, vol. 5775, pp. 229-242, Springer, Hamburg, Germany, September 2009. (Acceptance rate 34%)
  163. M. Atef and M. Zulkernine, “Quantifying Safety in Software Architectural Designs,” Proc. of the International Workshop on Design of Dependable Critical Systems (DDCS), pp. 68-75, Hamburg, Germany, September 2009.
  164. M. Uddin and M. Zulkernine, “A Trust Monitoring Architecture for Service-Based Software,” in J. Dong, R. Paul, and L. Zhang (editors), High Assurance Service Computing, pp. 45-64, Springer, 2009.
  165. U. Khan and M. Zulkernine, “Activity and Artifact Views of a Secure Software Development Process,” Proc. of the International Workshop on Software Security Process (SSP), pp. 399-404, IEEE, Vancouver, Canada, August 2009.
  166. X. Yang and M. Zulkernine, “Secure Method Calls by Instrumenting Bytecode with Aspects,” Proc. of the 23rd Annual IFIP WG Working Conference on Data and Applications Security, (DBSec ’09), Lecture Notes in Computer Science, vol. 5645, pp. 126-141, Springer, Montreal, Canada, July 2009. (Acceptance rate 26%)
  167. H. Shahriar and M. Zulkernine, “Automatic Testing of Program Security Vulnerabilities," Proc. of the 1st IEEE International Workshop on Test Automation, pp. 550-555, IEEE CS Press, Seattle, USA, July 2009.
  168. U. Khan and M. Zulkernine, “On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software,” Proc. of the 4th IEEE International Workshop on Privacy, Security, and Trust for Software Applications, pp. 353-358, IEEE CS Press, Seattle, USA, July 2009.
  169. H. Shahriar and M. Zulkernine, “MUTEC: Mutation-based Testing of Cross Site Scripting,” Proc. of the Fifth ICSE International Workshop on Software Engineering for Secure Systems (SESS), pp. 47-53, IEEE, Vancouver, Canada, May 2009. (Acceptance ratio 10/23)
  170. Z. Zhu and M. Zulkernine, “A Model-Based Aspect-Oriented Framework for Building Intrusion-Aware Software Systems,” Special Issue on Model Based Development for Secure Information Systems, Information and Software Technology Journal, vol. 51, issue 5, pp. 865-875, Elsevier Science, May 2009.
  171. M. Uddin and M. Zulkernine, “ATM: An Automatic Trust Monitoring Algorithm for Service Software,” Proc. of the 24th Annual ACM Symposium on Applied Computing (SAC): Dependable and Adaptive Distributed Systems, pp. 1040-1044, Hawaii, USA, March 2009. (Acceptance rate 29%)
  172. M. Uddin, M. Zulkernine, and S. Ahamed, “Collaboration Through Computation: Incorporating Trust Model into Service-Based Software Systems,” Service Computing and Applications Journal, vol. 3, no. 1, pp. 47-63, Springer, March 2009.
  173. M. Atef and M. Zulkernine “At What Level of Granularity Should We be Componentizing for Software Reliability?” Proc. of the 11th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 273-282, IEEE CS Press, Nanjing, China, December 2008. (Acceptance rate 20%)
  174. H. Shahriar and M. Zulkernine, “Mutation-Based Testing of Format String Bugs,” Proc. of the 11th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 229-238, IEEE CS Press, Nanjing, China, December 2008. (Acceptance rate 20%)
  175. J. Zhang, M. Zulkernine, and A. Haque, “Random Forest-Based Network Intrusion Detection Systems,” IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, vol. 38, no. 5, pp. 648-658, September 2008.
  176. H. Shahriar and M. Zulkernine, “MUSIC: Mutation-based SQL Injection Vulnerability Checking,” Proc. of the 8th International Conference on Quality Software (QSIC), pp. 77-86, IEEE CS Press, Oxford, UK, August 2008. (Acceptance. rate 30%)
  177. M. Atef and M. Zulkernine, “On Failure Propagation in Component-Based Software Systems,” Proc. of the 8th International Conference on Quality Software (QSIC), pp. 402-411, IEEE CS Press, Oxford, UK, August 2008. (Acceptance rate 30%)
  178. U. Khan and M. Zulkernine, “Quantifying Security Vulnerabilities in Secure Software Development,” Proc. of the Second IEEE International Workshop on Security in Software Engineering, pp. 955-960, IEEE CS Press, Turku, Finland, July 2008.
  179. H. Shahriar and M. Zulkernine, “Mutation-Based Testing of Buffer Overflow Vulnerabilities,” Proc. of the Second IEEE International Workshop on Security in Software Engineering, pp. 979-984, IEEE CS Press, Turku, Finland, July 2008.
  180.  I. Chowdhury, B. Chan, and M. Zulkernine, “Security Metrics for Source Code Structures,” Proc. of the Fourth ICSE International Workshop on Software Engineering for Secure Systems (SESS), ACM, pp. 57-64, Leipzig, Germany, May 2008.
  181.  M. Uddin and M. Zulkernine, “UMLtrust: Towards Developing Trust-Aware Software,” Proc. of the 23rd Annual ACM Symposium on Applied Computing (SAC), pp. 831-836, Fortaleza Brazil, March 2008. (Acceptance rate 29%)
  182.  M. Uddin, M. Zulkernine, and S. Ahamed*, “CAT: A Context-Aware Trust Model for Open and Dynamic Systems,” Proc. of the 23rd Annual ACM Symposium on Applied Computing (SAC), pp. 2024-2029, Fortaleza, Brazil, March 2008. (Acceptance rate 29%)
  183.  L. Kuang and M. Zulkernine, “An Anomaly Intrusion Detection Method Using the CSI-KNN Algorithm,” Proc. of the 23rd Annual ACM Symposium on Applied Computing (SAC), pp. 921-926, Fortaleza, Brazil, March 2008. (Acceptance rate 29%)
  184.  Y. You, M. Zulkernine, and A. Haque, “A Distributed Defense Framework for Flooding-Based DDoS Attacks,” Proc. of the International Conference on Availability, Reliability and Security (AReS), pp. 245-252, IEEE CS Press, Barcelona, Spain, March 2008. (Acceptance rate 22%)
  185.  L. Kuang and M. Zulkernine, “An Intrusion-Tolerant Mechanism for Intrusion Detection Systems,” Proc. of the International Conference on Availability, Reliability and Security (AReS), pp. 921-926, IEEE CS Press, Barcelona, Spain, March 2008. (Acceptance rate 22%)
  186. M. Atef and M. Zulkernine, “Improving Reliability and Safety by Trading Off Software Failure Criticalities,” Proc. of the 10th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 267-274, Dallas, Texas, USA, November 2007. (Acceptance rate 30%)
  187. P. Kannadiga, M. Zulkernine, and A. Haque, “E-NIPS: An Event-Based Network Intrusion Prediction System,” Proc. of the 10th Information Security Conference (ISC), Lecture Notes in Computer Science, vol. 4779, pp.37-52, Springer Verlag, Chile, October 2007. (Acceptance rate 25%)
  188. S. Ahamed, M. Zulkernine, and S. Wolfe, “A Software-Based Trust Management System for Distributed Industrial Management Systems,” Journal of Systems and Software, vol. 80, issue 10, pp. 1621-1630, Elsevier Science, October 2007.
  189. M. Zulkernine, M. Graves, and U. Khan, “Integrating Software Specifications into Intrusion Detection,” International Journal of Information Security (IJIS), pp. 345-357, Springer, September, 2007.
  190. M. Hussein, M. Raihan, and M. Zulkernine, “Classification and Extension of Software Specification and Attack Description Languages,” in D. Khadraoui and F. Herrmann (editors), Advances in Enterprise IT Security, pp. 285-301, Idea Group, 2007.
  191. M. Uddin, H. Shahriar, and M. Zulkernine, “ACIR: An Aspect-Connector for Intrusion Response,” Proc. of the First IEEE International Workshop on Security in Software Engineering, pp. 249-254, IEEE CS Press, Beijing, China, July 2007.
  192. M. Al-Subaie and M. Zulkernine, “The Power of Recurrent Neural Networks in Anomaly Intrusion Detection,” Proc. of the IEEE Symposium on Computer and Communications Network Security – ICC '07, pp. 1391-1398, Glasgow, Scotland, June 2007. (Acceptance rate 39%)
  193. Y. You, M. Zulkernine, and A. Haque, “Detecting Flooding-Based DDoS Attacks,” Proc. of the IEEE Symposium on Computer and Communications Network Security – ICC '07, pp. 1239-1234, Glasgow, Scotland, June 2007. (Acceptance rate 39%)
  194. M. Hussein and M. Zulkernine, “Intrusion Detection Aware Component-Based Systems: A Specification-Based Approach,” Journal of Systems and Software, vol. 80, issue 5, pp. 700-710, Elsevier Science, May 2007.
  195. M. Raihan and M. Zulkernine, “AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification,” Proc. of the IEEE International Conference on Availability, Reliability and Security (AReS), IEEE CS Press, pp. 775-782, Vienna, Austria, April 2007.(Acceptance rate 28%)
  196. M. Graves and M. Zulkernine, “Bridging the Gap: Software Specification Meets Intrusion Detector,” Proc. of the Fourth Annual Conference on Privacy, Security and Trust (PST), pp. 265-274, Toronto, Canada, McGraw Hill Press, October 2006.
  197. M. Al-Subaie and M. Zulkernine, “Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection,” Proc. of the 30th Annual International Computer Software and Applications Conference (COMPSAC), pp. 325-332, IEEE CS Press, Chicago, USA, September 2006. (Acceptance rate 29%)
  198. J. Zhang and M. Zulkernine, “Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection,” Symposium on Network Security and Information Assurance – Proc. of the IEEE International Conference on Communications (ICC), pp. 2388-2393, Istanbul, Turkey, June 2006. (Acceptance rate 39%)
  199. J. Zhang and M. Zulkernine, “A Hybrid Network Intrusion Detection Technique Using Random Forests,” Proc. of the International Conference on Availability, Reliability and Security (AReS), IEEE CS Press, pp. 262-269, Vienna, Austria, April 2006. (Acceptance rate 36%)
  200.  M. Hussein and M. Zulkernine, “UMLintr: A UML Profile for Specifying Intrusions,” Proc. of the 13th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), pp. 279-286, IEEE CS Press, Potsdam, Germany, March 2006.
  201. J. Zhang and M. Zulkernine, “Network Intrusion Detection Using Random Forests,” Proc. of the third Annual Conference on Privacy, Security and Trust (PST), pp. 53-61, St. Andrews, New Brunswick, Canada, October 2005. (Acceptance rate 38%)
  202. M. Raihan and M. Zulkernine, “Detecting Intrusions Specified in a Software Specification Language,” Proc. of the 29th Annual International Computer Software and Applications Conference (COMPSAC), pp. 143-148, IEEE CS Press, Edinburgh, Scotland, July 2005. (Acceptance rate 25%)
  203. P. Kannadiga and M. Zulkernine, “DIDMA: A Distributed Intrusion Detection System Using Mobile Agents,” Proc. of the ACIS 6th International Conference on Software Engineering, Networking and Parallel/Distributed Computing (SNPD), pp. 238-245, IEEE CS Press, Maryland, USA, May 2005.
QRST Lab | 631 Goodwin Hall | School of Computing | Queen's University, Kingston, Ontario, Canada. K7L 3N6