M. Faisal and M. Zulkernine, “Secure Cloud Communication Architecture,” US Patent No. 11936691, March 19, 2024.
W. Ou, S. Ding*, M. Zulkernine, S. Labrosse, and L. Li “VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning," ACM Transactions on Privacy and Security, 29 pages, to appear.
A. Anwar, T. Halabi*, and M. Zulkernine, “A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment,” ACM Journal on Autonomous Transportation Systems, 27 pages, to appear, March 2024.
A. Anwar, N. Chakraborty, and M. Zulkernine, “Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain,” IEEE International Symposium on Autonomous Vehicle Software (AVS), Cambridge, UK, July 2024.
N. Chakraborty, S. Iqbal†, and M. Zulkernine, “Building Secure Software for Smart Aging Care Systems: An Agile Approach,” The 24th IEEE International Conference on Software Quality, Reliability, and Security (QRS), Cambridge, UK, July 2024.
A. Anwar, T. Halabi*, and M. Zulkernine, “Cooperative Defense-in-Depth in Large-Scale Autonomous Vehicle Networks,” IEEE International Symposium on Autonomous Vehicle Software (AVS), Cambridge, UK, July 2024.
A. Abusitta*,
T. Halabi*, A. Bataineh,
and M. Zulkernine, “Generative
Adversarial Networks for Robust Anomaly Detection in Noisy IoT
Environments,”
IEEE International Conference on
Communications (ICC): Communication and Information System Security
Symposium, Denver, Colorado, USA, June 2024.
L. Moukahal, M. Zulkernine, and M. Soukup†, “Fuzzy Testing of a Software System,” US Patent 11,366,748, November 16, 2023.
M. Zulkernine, A Fakhereldine, and D Murdock†, “Method and Apparatus
for Detecting Attack on Train Control Systems, US Patent App.
17/979,344, 2023.
Y. Yamout, T. Yeasar, S. Iqbal†, and M. Zulkernine, “Beyond Smart Homes: An Analytical Look on Smart Aging Care System Security Issues,” ACM Computing Surveys, 35 pages, accepted, July 2023.
A. Anwar, A, Anwar, L. Moukahal, and M. Zulkernine, “Security Assessment of In-vehicle Communication Protocols,” Journal of Vehicular Communications, Article 100639, 28 pages, accepted, Elsevier, June 2023.
F. Faghihi, M. Zulkernine, and S. Ding*, “AIM: An Android Interpretable Malware Detector based on Application Class Modeling,” Journal of Security and Applications, vol. 75, Elsevier, June 2023.
S. Taviss, S. Ding*, M. Zulkernine, P. Charland, and S. Acharya, “Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis," ACM Journal Digital Threats: Research and Practice (DTRAP), March 2023.
M. Islam, A. Bataineh, and M. Zulkernine, “Detection of Cyberbullying in Social Media Texts using Explainable Artificial Intelligence,” The 3rd International Conference on Ubiquitous Security 2023 (UbiSec), 14 pages, to appear, Exeter, UK, November 2023.
F. Faghihi,
M. Zulkernine, and S. Ding*, “Unmasking
of Maskware: Detection and Prevention of Next-Generation Mobile
Crypto-Ransomware,”
The
16th International
Symposium on Foundations & Practice of Security
(FPS), Lecture Notes in Computer Science,
16 pages, Bordeaux
France, December 2023.
N. Chakraborty, Y. Yamout, and M. Zulkernine, "The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords," 2nd IEEE Conference on Communications and Network Security - Cyber Resilience Workshop, 5 pages, Florida, USA, October 2023.
M. Davari and M. Zulkernine, “Automatic Conversion of ABAC Policies for RBAC Systems,” IEEE Conference on Dependable and Secure Computing, 8 pages, Florida, USA, November 2023.
Abdelmeguid, H. Hassanein*, and M. Zulkernine, “'A VeReMi-Based Dataset for Predicting the Effect of Attacks in VANETs,” The 26th International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 5 pages, Montreal, Canada, November 2023.
A. Fakhereldine, M. Zulkernine, and D. Murdock†, “CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks," The 34th IEEE International Symposium on Software Reliability Engineering, Industry Track, 6 pages, Florence, Italy, October 2023.
N. Chakraborty, M. Shojafar†, Z. Chen†, and V. Leung†, J. Li†, and M. Zulkernine, “A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks," The 7th Cyber Security in Networking Conference (CSNet), 7 pages, Montreal, Canada 2023.
D. Phillips, T. Halabi*,
and M. Zulkernine, “Autonomous and Security-Aware Dynamic Vehicular
Platoon Formation,” The
IEEE International Symposium on Autonomous Vehicle Software (AVS), 12 pages, Tokyo, Japan,
August 2023. (Best
Paper Award)
N. Chakraborty, S. Iqbal†, M. Zulkernine, “Risk Assessment in Smart Ageing Care Systems: An Elderly-Centered Perspective,” IEEE Conference on Digital Health (ICDH), Chicago, July 2023. (Acceptance rate 24%)
T. Halabi*
and M. Zulkernine, “The Ultimate Battle Against Zero-Day Exploits:
Toward Fully Autonomous Cyber-Physical Defense,” Invited Paper, IEEE World Congress on Services, Chicago, USA, July 2023.
(Acceptance rate 25%)
M. Abdelmaguid, H. Hassanein*,
and M. Zulkernine, “Attack Endgame: Proactive Security Approach for
Predicting Attack Consequences in VANET,”
Communication and Information Systems
Security Symposium, IEEE International Conference on
Communications (ICC), Rome, Italy, June 2023. (Acceptance rate
40%)
K. Lounis, S. Ding, and M. Zulkernine, “D2D-MAP: A Drone to Drone Authentication Protocol using Physical Unclonable Functions,” IEEE Transactions on Vehicular Technology, to appear, 2022.
A. Anwar, T. Halabi, and M. Zulkernine, “Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A Hierarchical Framework based on Game Theory,” Internet of Things Journal, Elsevier, November 2022.
M. Elsayed, K. Lounis, M. Wrana, Z. Mansour, S. Ding, M. Zulkernine, "AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles," IEEE Transactions on Intelligent Transportation Systems, October 2022.
A. Anwar, T. Halabi, and M. Zulkernine, “A Coalitional Security Game Against Data Integrity Attacks in Autonomous Vehicle Networks, Journal of Vehicular Communications, Elsevier, August 2022.
A. Faisal and M. Zulkernine, “SAS-GKE: A Secure Authenticated Scalable Group Key Exchange Mechanism,” The 22nd International Conference on Software Quality, Reliability, and Security, (QRS), Guangzhou, China, December 2022. (Acceptance rate 27%)
A. Faisal and M. Zulkernine, “DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure,” International Conference on Information Systems Security (ICISS), Lecture Notes in Computer Science, Springer-Verlag, Tirupati, India, December 2022. (Acceptance rate 8/47)
J. Banks, R. Kerr, S. Ding, M. Zulkernine, “SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments,” Military Communications Conference, IEEE, Washington DC, USA, December 2022.
M. Wrana, M. Elsayed, K. Lounis, Z. Mansour, S. Ding, M. Zulkernine, "OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-Attack Simulation," ACM Transactions on Cyber-Physical Systems, July 2022.
S. Shafieian and M. Zulkernine, “Multi-layer Stacking Ensemble Learners for Low Footprint Network Intrusion Detection," Journal of Complex and Intelligent Systems, Special issue on secure learning, Springer, to appear, 2022.
K. Lounis, M. Elsayed, M. Wrana, Z. Mansour, S. Ding, and M.
Zulkernine, "A Review and Analysis of Attack Vectors on MIL-STD-1553
Communication Bus," IEEE Transactions on Aerospace and Electronic
Systems, 2022.
F. Faghihi, M. Zulkernine, and S. Ding*, “CamoDroid: An Android Application Analysis Environment Resilient Against Sandbox Evasion,” Journal of Systems Architecture, vol. 125, Article 102452, Elsevier, April 2022.
M. Davari and M. Zulkernine “Classification-Based Anomaly Prediction in XACML Policies," The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Lecture Notes in Computer Science, Kansas City, USA, October 2022
A. Alvi and M. Zulkernine, “Security Pattern Detection Through Diagonally Distributed Matrix Matching,” The 9th IEEE International Conference on Dependable Systems and Their Applications (DSA), Wulumuqi, China, August 2022. (Acceptance rate 24%)
M. Abdelmaguid, H. Hassanein, and M. Zulkernine, “SAMM: Situation
Awareness with Machine Learning for Misbehavior Detection in VANET,”
The 5th International Workshop on Emerging Network
Security (ENS 2022), Vienna, Austria, August 2022.
A. Chaudhry, T. Halabi* and M. Zulkernine, “Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications,” Proc. of the 8th International Workshop on Safety and Security of Intelligent Vehicles (SSIV), Baltimore, Maryland, USA, June 2022.
T. Halbi*, A. Chaudhury, S. Alqahtani, and M. Zulkernine, “A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments,” The IEEE Conference on Dependable and Secure Computing (DSC), Edinburgh, UK, June 2022. (Acceptance rate 28.4%)
Y. Liu, J. Ni*, and M. Zulkernine “AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency," Communication and Information Systems Security Symposium, IEEE International Conference on Communications (ICC), Seoul, South Korea, May 2022.
A. Fakhereldine,
M.
Zulkernine, and D. Murdock†,
“Detecting Intrusions in Communication-Based Train Control Systems,"
Communication and Information Systems
Security Symposium, IEEE International Conference on
Communications (ICC), Seoul, South Korea, May 2022.
L. Moukahal, M. Zulkernine, and M. Soukup, “Vulnerability-oriented fuzzy testing for connected autonomous vehicle systems,” IEEE Transactions on Reliability, vol. 70, no. 4, pp. 1422-1437, December 2021.
K. Lounis and M. Zulkernine, “T2T-MAP: A PUF-based Thing-to-Thing Mutual Authentication Protocol for IoT," IEEE Access, pp. 137384-137405, October 2021.
T. Halabi, O. Wahab, R. Mallah, and M. Zulkernine, “Protecting The Internet of Vehicles against Advanced Persistent Threats: A Bayesian Stackelberg Game,” IEEE Transactions on Reliability, vol. 70, issue 3, pp. 970-985, September 2021.
F. Faghihi and M. Zulkernine, “RansomCare: Data-Centric Detection and Mitigation Against Smartphone Crypto-Ransomware,” Special Issue on Novel Cyber-Security Paradigms for Software-defined and Virtualized Systems, Journal of Computer Networks, Elsevier, vol. 191, Article 108011, Elsevier, April 2021.
A. Faisal and M. Zulkernine, “A Secure Architecture for TCP/UDP-based Cloud Communications,” International Journal of Information Security, vol. 20, issue 2, pp. 161-179, Springer, April 2021.
A. Alvi and M. Zulkernine, “A Security Pattern Detection Framework for Building More Secure Software Journal of Systems and Software,” Journal of Systems and Software, vol. 171, Article 110838, Elsevier, January 2021.
K.
Lounis and M. Zulkernine, “Attacks
and Defenses in Short-Range Wireless Technologies for IoT,”
IEEE Access,
vol. 8, pp. 88892-88932, IEEE, May 2020.
K. Lounis and M. Zulkernine, “Exploiting Race Condition for Wi-Fi Denial of Service Attacks,” Proc. of the 13th International Conference on Security of Information and Networks (SINCONF), Turkey, November 2020.
C. Chen, M. Elsayed,
and M. Zulkernine, “HBD-Authority:
Streaming Access Control Model for Hadoop,”
Proc. of the The
6th IEEE International Conference on Dependability in Sensor, Cloud,
and Big Data Systems and Applications (DependSys),
Fizi, December
2020.
K. Lounis
and M. Zulkernine, “Frequency
Hopping Spread Spectrum to Counter Relay Attacks in PKESs,”
Proc. of the 15th
International Conference on Risks and Security of Internet and
Systems (CRISIS), Paris, France, November 2020.
M. Elsayed and M. Zulkernine, “Offering Security Diagnosis as a Service for Cloud SaaS Applications,” Journal of Information Security and Applications, vol 44, pp. 32-48, Elsevier, February 2019.
S. Anwar and M. Zulkernine, “LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Networkk,” 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm),” 16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Lecture Notes in Computer Science, Washington DC, USA, October 2020.
B.
Alam,
T. Halabi, A. Haque, and M. Zulkernine, “Reliability-based Formation
of Cloud Federations Using Game Theory,"
Proc. of The IEEE Global Communications
Conference (GLOBECOM),
Taipei, Taiwan, December 2020.
B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Optimizing Virtual Machine Migration in Multi-Clouds," Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC), Montreal, Canada, June 2020.
B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation," Proc. of the IEEE International Conference on Communications (ICC), Dublin, Ireland, June 2020.
T. Halabi and M. Zulkernine, “A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems," Proc. of the 3rd International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT), Budapest, Hungary, April 2020.
A. Anwar, T. Halabi, and M. Zulkernine, “'Cloud-based Sybil Attack Detection Scheme for Connected Vehicles, Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.
K. Lounissand M. Zulkernine,and M. Zulkernine,, “WPA3 Connection Deprivation Attacks", Proc. of the 144thhInternational Conference on Risks and Security of Internet and Systems (CRISIS),International Conference on Risks and Security of Internet and Systems (CRISIS), Hammamet, Tunisia, November 2019.
K. Lounis and M. Zulkernine, “Bluetooth Low Energy Makes Just Works Not Work,” Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.K. Lounis and M. Zulkernine, “Bluetooth Low Energy Makes Just Works Not Work,” Proc. of the 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, October 2019.
L. Moukahal and M. Zulkernine, “Security Vulnerability Metrics for Connected Vehicles,” Proc. of the IEEE International Workshop on Automobile Software Security and Safety (A3S), Sofia, Bulgaria, July 2019.
J. Wang, K. Lounis, and M. Zulkernine, “Identifying Security Features for Proximity Identification,” Proc. of the IEEE International Workshop on Security, Trust and Privacy for Software Applications (STPSA), Milwaukee, USA, July 2019.
A. Faisal and M. Zulkernine, “Graphene: A Secure Cloud Communication Architecture,” Proc. of the International Workshop on Cloud Security and Privacy, LNCS, Bogota, Colombia, June 2019.
J. Wang, K. Lounis, and M. Zulkernine, “CSKES: A Context-based Secure Keyless Entry System,” Proc. of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, USA, July 2019.
T. Halabi and M. Zulkernine, “Reliability-driven Task Assignment in Vehicular Crowdsourcing: A Matching Game,” Proc. of the 5th International Workshop on Safety and Security of Intelligent Vehicles (SSIV), Portland, USA, June 2019.
S. Iqbal, A. Haque, M. Zulkernine, “Towards a Security Architecture for Protecting Connected Vehicles from Malware,” Proc. of the IEEE 89th Vehicular Technology Conference: VTC2019-Spring, Kuala Lampur, Malaysia, May 2019.
T. Halabi and M Zulkernine, “Trust-based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles,” The IEEE International Conference on Communications (ICC, Communication and Information Systems Security Symposium), Shanghai, China, May 2019. (Acceptance rate 39%)
M. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing Vehicle ECU Communications and Protecting ECU Data Using Blockchain,” The IEEE International Conference on Communications (ICC Communication and Information Systems Security Symposium) Shanghai, China, May 2019. (Acceptance rate 39%)
E. AbdAllah,M. Zulkernine, and H. Hassanein, ““Preventing Unauthorized Access in Information Centric Networking,”” Journal of Security and Privacy, vol. 1, issue 4, pp. 1-13,Journal of Security and Privacy, vol. 1, issue 4, pp. 1-13,Willey, July 2018.
E. AbdAllah,E. AbdAllah, M. Zulkernine, and H. Hassanein, “DADI: Defending Against DDoS in ICN Routing and Caching,”” Journal of Security and Privacy,Journal of Security and Privacy,vol. 1, issue 2, pp. 1-17, Willey,, March 2018.March 2018.
M. Elsayed, M. Zulkernine, “A Taxonomy of Security as a Service,” Proc. of the 8th International Symposium on Secure Virtual Infrastructures: Cloud & Trusted Computing, LNCS, vol. 11230, pp. 305-312, Malta, October 2018. (Acceptance rate 34%)
K. Lounis, M. Zulkernine, “Connection Dumping Vulnerability Affecting Bluetooth Availability", Proc. of the 13th International Conference on Risks and Security of Internet and Systems (CRISIS), Springer, France, October 2018.
S. Iqbal, M. Zulkernine, “SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android", Proc. of the IEEE Conference on Malicious & Unwanted Software (MALCON), USA, October 2018.
M. A. Alswailim, H.S. Hassanein, M. Zulkernine, “A Context-Aware Privacy Scheme for Crisis Situations”, Proc. of The IEEE Global Communications Conference (GLOBECOM), UAE, Dec 2018. (Acceptance rate 38%)
B. Alam, M. Zulkernine, A. Haque, “CREM: A Cloud Reliability Evaluation Model”, Proc. of the IEEE Global Communications Conference (GLOBECOM), UAE, December 2018. (Acceptance rate 38%)
J. Wan, M. Zulkernine, and C. Liem, “A Dynamic App Anti-Debugging Approach on Android ART Runtime”, Proc. of the 3rd Cyber Science and Technology Congress (CyberSciTech2018), pp. 560-567, Athens, Greece, IEEE, August 2018. (Acceptance rate 39%)
E. AbdAllah, M. Zulkernine, and H. S. Hassanein, “A Security Framework for ICN Traffic Management”, Proc. of the 3rd Cyber Science and Technology Congress (CyberSciTech2018), pp. 78-85, Athens, Greece, IEEE, August 2018. (Acceptance rate 30%)
A. Anis, M. Zulkernine, S. Iqbal, C. Liem, and C. Chambers, “Securing web applications with secure coding practices and integrity verification”, Proc. of the Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 618-625, Athens, Greece, IEEE, August 2018. (Acceptance rate 39%)
M. Elsayed and M. Zulkernine, “Integrating Security in Cloud Application Development Cycle”, Proc. of the 4th International Conference on Software Security and Assurance (ICSSA), Seoul, Korea, IEEE, July 2018. (Best Paper Award)
O. Hreirati, S. Iqbal, and M. Zulkernine, “An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques,” Proc. of the 4th International Conference on Software Security and Assurance (ICSSA), IEEE, July 2018.
M. Elsayed and M. Zulkernine, “Towards Security Monitoring for Cloud Analytic Applications,” Proc. of the 4th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), Omaha, USA, May 2018. (Best Paper Award)
J. Wan, M. Zulkernine, P. Eisen, and C. Liem, "Defending Application Cache Integrity of Android Runtime," Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, December 2017. (Acceptance rate 33%)J. Wan, M. Zulkernine, P. Eisen, and C. Liem, "Defending Application Cache Integrity of Android Runtime," Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, December 2017. (Acceptance rate 33%)
B. Alam, M. Zulkernine, and A. Haque, “A Reliability-Based Resource Allocation Approach for Cloud Computing,” Proc. of the IEEE International Symposium on Cloud and Services Computing, pp. 249-252, Kanazawa, Japan, November 2017.
M. Iqbal and M. Zulkernine, “Droid Mood Swing (DMS): Automatic Security Modes Based on the Context,", Proc. of the 20th Information Security Conference (ISC), pp. 329-347, Ho Chi Minh City, Vietnam, November 2017. (Acceptance rate 25.7%).
M. Alswailim, M. Zulkernine, and H. Hassanein, “A Participant Contribution Trust Scheme for Crisis Response Systems,” Proc. of the the IEEE GLOBECOM, Singapore, December 2017.
A. Alvi and M. Zulkernine, "Security Pattern Detection Using Ordered Matrix Matching," Proc. of the IEEE International Conference on Software Security and Assurance (ICSSA), Altoona, Pennsylvania, USA, July 2017.
M. Davari and M. Zulkernine, “An Automatic Software Vulnerability Classification Framework,” Proc. of the IEEE International Conference on Software Security and Assurance (ICSSA), Altoona, Pennsylvania, USA, July 2017.
M. Hasan, T. Dean, F. Imam, F. Garcia, S. Leblanc and M. Zulkernine, “A Constraint-based Intrusion Detection System,” Proc. of the 5th European Conference on the Engineering of Computer Based Systems (ECBS), Cyprus, August 2017.
E. AbdAllah, M. Zulkernine, Y. Gu, and C. Liem, "Towards Defending Connected Vehicles Against Attacks," Proc. of the 5th European Conference on the Engineering of Computer Based Systems (ECBS), Cyprus, August 2017.
S. Shafieian, D. Smith, M. Zulkernine, "Detecting DNS Tunneling Using Ensemble Learning", Proc. of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August, 2017. (Acceptance rate 28.9%).
E. AbdAllah, M. Zulkernine, Y. Gu, and C. Liem, "TRUST-CAP: A Trust Model for Cloud-based Applications," Proc. of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP), Turin, Italy, July 2017.
M. Iqbal, M. Zulkernine, F. Jaafar, and Y. Gu, "Protecting Internet Users from Becoming Victimized Attackers of Click-fraud", Journal of Software: Evolution and Process, Willey, 2017.
M. Iqbal and M. Zulkernine, “Flamingo: A framework for smartphone security context management", Proc. of the 32nd ACM Symposium on Applied Computing (ACM SAC), pp. 563-568, Morocco, April 2017.
M. Hasan, A. ElShakankiry, T. Dean, and M. Zulkernine, “Intrusion Detection in a Private Network by Satisfying Constraints”, Proc. of the 14th Annual Conference on Privacy, Security and Trust (PST), pp. 623-628, Auckland, New Zealand, IEEE, December 2016.
M. Davari and M. Zulkernine, “Analysing Vulnerability Reproducibility for Firefox Browser”, Proc. of the 14th Annual Conference on Privacy, Security and Trust (PST), pp. 674-681, Auckland, New Zealand, IEEE, December 2016.
M. Alswailim, M. Zulkernine, and H. Hassanein, “A Reputation System to Evaluate Participants for Participatory Sensing,” Proc. of the the IEEE GLOBECOM, Washington DC, USA, December 2016.
M. Iqbal and M. Zulkernine, “'ZoneDroid: Control Your Droid Through Application Zoning," Proc. of the 11th International Conference on Malicious and Unwanted Software (MALCON), pp. 113-120, Puerto Rico, USA, October 2016.
M. Elsayed and M. Zulkernine, “IFCaaS: Information Flow Control as a Service for Cloud Security,” Proc. of the International Conference on Availability, Reliability and Security (AReS), pp. 211-216, IEEE CS, Salzburg, Austria, August 2016.
E. AbdAllah, M. Zulkernine, and H. Hassanein, “DACPI: A Decentralized Access Control Protocol for Information Centric Networking,” Proc. of the IEEE ICC 2016 Communication and Information Systems Security Symposium, pp. 1-6, Kuala Lumpur, Malaysia, May 2016.
M. Iqbal and M. Zulkernine, “SAM: A Secure Anti-Malware Framework for the Smartphone Operating Systems," Proc. of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Doha, Qatar, April 2016.
S. Das and M. Zulkernine, “CLOUBEX: A Cloud-based Security Analysis Framework for Browser Extensions," Proc. of the 17th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 268-275, Orlando, Florida, USA, January 2016.
M. Iqbal, M. Zulkernine, F. Jaafar, and Y. Gu "FCFraud: Fighting Click-Fraud from User Side," Proc. of the 17th IEEE International Symposium on High Assurance System Engineering (HASE), pp. 157-164, Orlando, Florida, USA, January 2016.
A. Khademi, M. Zulkernine, and K. Weldemariam, "Empirical Evaluation of Web-based Fingerprinting," Special issue on Security and Privacy on the Web, IEEE Software, vol. 32, no. 4, pp. 46-52, 2015.
M. Elsayed and M. Zulkernine, “A Classification of Intrusion Detection Systems in the Cloud,” IPSJ Journal of Information Processing, vol. 23, no. 4, pp. 392-401, 2015.
E. AbdAllah, H. Hassanein, and M. Zulkernine, "A Survey of Security Attacks in Information-Centric Networking", The IEEE Communications Surveys and Tutorials, vol 17, no. 3, pp. 1441-1454, 2015.
M. Godfrey and M. Zulkernine "Preventing Side-Channel Attacks in a Cloud Environment," The IEEE Transactions on Cloud Computing, vol. 2, issue 4, pp. 395-408, December 2014.
H. Shahriar, K. Weldemariam, M. Zulkernine, and T. Lutellierd, “Effective Detection of Vulnerable and Malicious Browser Extensions” Journal of Computers & Security, vol. 47, pp. 66-84, Elsevier Science, November 2014.
M. Atefand M. Zulkernine, "Software Control Flow Error Detection and Correlation with System Performance Deviation,” Special issue onn “Dependable and Secure Computing,”“Dependable and Secure Computing,” Journal of Computer and System Sciences, vol. 80, issue 5,,pp. 953-972, Elsevier Science,pp. 953-972, Elsevier Science, August 2014.
S. Shafieian, M. Zulkernine, and A. Haque, “Attacks in Public Clouds: Can They Hinder Rise of the Cloud?” in Z. Mahmood, Cloud Computing, Computer Communications and Networks, Springer, pp. 3-22, October 2014.S. Shafieian, M. Zulkernine, and A. Haque, “Attacks in Public Clouds: Can They Hinder Rise of the Cloud?” in Z. Mahmood, Cloud Computing, Computer Communications and Networks, Springer, pp. 3-22, October 2014.
E. AbdAllah, M. Zulkernine, and H. Hassanein, “Detection and Prevention of Malicious Requests in ICN Routing and Caching,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015. (Best Paper Award)
S. Shafieian, M. Zulkernine, and A. Haque, “CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015.S. Shafieian, M. Zulkernine, and A. Haque, “CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud,” Proc. of the 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015), Liverpool, UK, October 2015.
A. Khademi, M. Zulkernine, and K. Weldemariam, "FPGuard: FPGuard: Detection and Prevention of Browser Fingerprinting," Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), pp. 293-308, Fairfax, VA, USA, July 2015.
H. Hashemi, M. Zulkernine, and K. Weldemariam, "TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks," Proc. of the 9th International Conference on Risks and Security of Internet and Systems (CRiSIS), Trento, Italy, August 2014. (Acceptance rate 29%).
E. AbdAllah, M. Zulkernine, and H. Hassanein, “Countermeasures for Mitigating ICN Routing Related DDoS Attacks,” Proc. of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Beijing, China, September 2014.
U. Khan and M. Zulkernine, “A Hybrid Monitoring of Software Design-Level Security Specifications,” Proc. of the 14th International Conference on Quality Software (QSIC), pp. 111-116, IEEE CS, Dallas Texas, USA, October 2014.
M. Alswailim, M. Zulkernine, and H. Hassanein, “Classification of Participatory Sensing Privacy Schemes,” The 14th IEEE International Workshop on Wireless Local Networks (WLN), pp. 761-767, Edmonton, Canada, September 2014.