Selected Publications
- M. Safarzadehvahed, and M. Zulkernine, “DSADA: Detecting Spoofing Attacks in Driver Assistance Systems Using Objects’ Spatial Shapes.,” ACM Transactions on Autonomous and Adaptive Systems, pp. 1–26, Feb. 2025.
- A. S. Bataineh, M. Zulkernine, A. Abusitta, and T. Halabi, “Detecting Poisoning Attacks in Collaborative IDSs of Vehicular Networks Using XAI and Shapley Value,” ACM Journal on Autonomous Transportation Systems, vol. 2, no. 3, pp. 1–21, Sep. 2025.
- A. Anwar, T. Halabi, and M. Zulkernine, “A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment,” ACM Journal on Autonomous Transportation Systems, vol. 1, no. 4, pp. 1–28, Dec. 2024.
- S. Taviss, S. H. H. Ding, M. Zulkernine, P. Charland, and S. Acharya, “Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis,” Digital Threats: Research and Practice, vol. 5, no. 1, pp. 1–25, Mar. 2024.
- Y. Yamout, T. S. Yeasar, S. Iqbal, and M. Zulkernine, “Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security,” ACM Computing Surveys, vol. 56, no. 2, pp. 1–35, Feb. 2024.
- Z. Mansour, W. Ou, S. H. H. Ding, M. Zulkernine, and P. Charland, “NeuroYara: Learning to Rank for Yara Rules Generation through Deep Language Modeling and Discriminative N-gram Encoding,” IEEE Transactions on Dependable and Secure Computing, pp. 1–17, 2024.
- H. Yu, S. Acharya, S. H. H. Ding, and M. Zulkernine, “PulseAnomaly: Unsupervised Anomaly Detection on Avionic Platforms with Seasonality and Trend Modeling in Transformer Networks,” IEEE Transactions on Dependable and Secure Computing, pp. 1–16, 2024.
- W. Ou, S. Ding, M. Zulkernine, L. T. Li, and S. Labrosse, “VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning,” ACM Transactions on Privacy and Security, vol. 27, no. 3, pp. 1–37, Aug. 2024.
- F. Faghihi, M. Zulkernine, and S. Ding, “AIM: An Android Interpretable Malware detector based on application class modeling,” Journal of Information Security and Applications, vol. 75, p. 103486, Jun. 2023.
- K. Lounis, S. H. H. Ding, and M. Zulkernine, “D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions,” IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5079–5093, Apr. 2023.
- K. Lounis and M. Zulkernine, “Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT,” Digital Threats: Research and Practice, vol. 4, no. 2, pp. 1–33, Jun. 2023.
- S. Shafieian and M. Zulkernine, “Multi-layer stacking ensemble learners for low footprint network intrusion detection,” Complex & Intelligent Systems, vol. 9, no. 4, pp. 3787–3799, Aug. 2023.
- A. Anwar, A. Anwar, L. Moukahal, and M. Zulkernine, “Security assessment of in-vehicle communication protocols,” Vehicular Communications, vol. 44, p. 100639, Dec. 2023.
- A. Anwar, T. Halabi, and M. Zulkernine, “A coalitional security game against data integrity attacks in autonomous vehicle networks,” Vehicular Communications, vol. 37, p. 100517, Oct. 2022.
- K. Lounis, Z. Mansour, M. Wrana, M. A. Elsayed, S. H. H. Ding, and M. Zulkernine, “A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus,” IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 6, pp. 5586–5606, Dec. 2022.
- M. A. Elsayed, M. Wrana, Z. Mansour, K. Lounis, S. H. H. Ding, and M. Zulkernine, “AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 23459–23473, Dec. 2022.
- F. Faghihi, M. Zulkernine, and S. Ding, “CamoDroid: An Android application analysis environment resilient against sandbox evasion,” Journal of Systems Architecture, vol. 125, p. 102452, Apr. 2022.
- M. M. Wrana, M. Elsayed, K. Lounis, Z. Mansour, S. Ding, and M. Zulkernine, “OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation,” ACM Transactions on Cyber-Physical Systems, vol. 6, no. 4, pp. 1–27, Oct. 2022.
- A. Anwar, T. Halabi, and M. Zulkernine, “Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory,” Internet of Things, vol. 20, p. 100631, Nov. 2022.
- A. Faisal and M. Zulkernine, “A secure architecture for TCP/UDP-based cloud communications,” International Journal of Information Security, vol. 20, no. 2, pp. 161–179, Apr. 2021.
- A. K. Alvi and M. Zulkernine, “A security pattern detection framework for building more secure software,” Journal of Systems and Software, vol. 171, p. 110838, Jan. 2021.
- T. Halabi, O. A. Wahab, R. Al Mallah, and M. Zulkernine, “Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game,” IEEE Transactions on Reliability, vol. 70, no. 3, pp. 970–985, Sep. 2021.
- F. Faghihi and M. Zulkernine, “RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware,” Computer Networks, vol. 191, p. 108011, May 2021.
- K. Lounis and M. Zulkernine, “T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT,” IEEE Access, vol. 9, pp. 137384–137405, 2021.
- L. J. Moukahal, M. Zulkernine, and M. Soukup, “Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems,” IEEE Transactions on Reliability, vol. 70, no. 4, pp. 1422–1437, Dec. 2021.
- J. Sun, S. Iqbal, N. Seifollahpour Arabi, and M. Zulkernine, “A classification of attacks to In-Vehicle Components (IVCs),” Vehicular Communications, vol. 25, p. 100253, Oct. 2020.
- K. Lounis and M. Zulkernine, “Attacks and Defenses in Short-Range Wireless Technologies for IoT,” IEEE Access, vol. 8, pp. 88892–88932, 2020.
- M. A. Elsayed and M. Zulkernine, “PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction,” IEEE Access, vol. 8, pp. 45184–45197, 2020.
- L. J. Moukahal, M. A. Elsayed, and M. Zulkernine, “Vehicle Software Engineering (VSE): Research and Practice,” IEEE Internet Things Journal, vol. 7, no. 10, pp. 10137–10149, Oct. 2020.
- M. Elsayed and M. Zulkernine, “Offering security diagnosis as a service for cloud SaaS applications,” Journal of Information Security and Applications, vol. 44, pp. 32–48, Feb. 2019.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “DADI: Defending against distributed denial of service in information‐centric networking routing and caching,” Security and Privacy, vol. 1, no. 2, p. e16, Mar. 2018.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “Preventing unauthorized access in information centric networking,” Security and Privacy, vol. 1, no. 4, p. e33, Jul. 2018.
- M. S. Iqbal, M. Zulkernine, F. Jaafar, and Y. Gu, “Protecting Internet users from becoming victimized attackers of click‐fraud,” Journal of Software: Evolution and Process, vol. 30, no. 3, p. e1871, Mar. 2018.
- F. Jaafar, Y.-G. Guéhéneuc, S. Hamel, F. Khomh, and M. Zulkernine, “Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults,” Empirical Software Engineering, vol. 21, no. 3, pp. 896–931, Jun. 2016.
- P. J. Clarke and M. Zulkernine, “Special issue on High Assurance Systems Engineering,” Software Quality Journal, vol. 24, no. 1, pp. 3–5, Mar. 2016.
- M. Elsayed and M. Zulkernine, “A Classification of Intrusion Detection Systems in the Cloud,” Journal of Information Processing, vol. 23, no. 4, pp. 392–401, 2015.
- E. G. AbdAllah, H. S. Hassanein, and M. Zulkernine, “A Survey of Security Attacks in Information-Centric Networking,” IEEE Communications Surveys & Tutorial, vol. 17, no. 3, pp. 1441–1454, 2015.
- A. F. Khademi, M. Zulkernine, and K. Weldemariam, “An Empirical Evaluation of Web-Based Fingerprinting,” IEEE Software, vol. 32, no. 4, pp. 46–52, Jul. 2015.
- H. Shahriar, K. Weldemariam, M. Zulkernine, and T. Lutellier, “Effective detection of vulnerable and malicious browser extensions,” Computers & Security, vol. 47, pp. 66–84, Nov. 2014.
- M. Godfrey and M. Zulkernine, “Preventing cache-based side-channel attacks in a cloud environment,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 395–408, Oct. 2014.
- A. Shalan and M. Zulkernine, “Software control flow error detection and correlation with system performance deviation,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 953–972, Aug. 2014.
- X. Bai, A. Elci, and M. Zulkernine, “Special issue on ‘Trustworthy Software Systems for the Digital Society,’” Journal of Systems and Software, vol. 89, pp. 1–2, Mar. 2014.
- H. Shahriar and M. Zulkernine, “Mitigating program security vulnerabilities: Approaches and challenges,” ACM Computing Surveys, vol. 44, no. 3, pp. 1–46, Jun. 2012.
- H. Shahriar and M. Zulkernine, “Trustworthiness testing of phishing websites: A behavior model-based approach,” Future Generation Computer Systems, vol. 28, no. 8, pp. 1258–1271, Oct. 2012.
- H. Shahriar and M. Zulkernine, “Taxonomy and classification of automatic monitoring of program security vulnerability exploitations,” Journal of Systems and Software, vol. 84, no. 2, pp. 250–269, Feb. 2011.
- I. Chowdhury and M. Zulkernine, “Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities,” Journal of Systems Architecture, vol. 57, no. 3, pp. 294–313, Mar. 2011.
- H. Shahriar and M. Zulkernine, “Assessing Test Suites for Buffer Overflow Vulnerabilities,” International Journal of Software Engineering and Knowledge Engineering, vol. 20, no. 01, pp. 73–101, Feb. 2010.
- Z. J. Zhu and M. Zulkernine, “A model-based aspect-oriented framework for building intrusion-aware software systems,” Information and Software Technology, vol. 51, no. 5, pp. 865–875, May 2009.
- M. G. Uddin, M. Zulkernine, and S. I. Ahamed, “Collaboration through computation: incorporating trust model into service-based software systems,” Service Oriented Computing and Applications, vol. 3, no. 1, pp. 47–63, Mar. 2009.
- A. Mohamed and M. Zulkernine, “Quantifying Safety in Software Architectural Designs,” 2009.
- Jiong Zhang, M. Zulkernine, and A. Haque, “Random-Forests-Based Network Intrusion Detection Systems,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 38, no. 5, pp. 649–659, Sep. 2008.
- S. I. Ahamed, M. Zulkernine, and S. Wolfe, “A software-based trust framework for distributed industrial management systems,” Journal of Systems and Software, vol. 80, no. 10, pp. 1621–1630, Oct. 2007.
- M. Zulkernine, M. Graves, and M. U. A. Khan, “Integrating software specifications into intrusion detection,” International Journal of Information Security, vol. 6, no. 5, pp. 345–357, Aug. 2007.
- M. Hussein and M. Zulkernine, “Intrusion detection aware component-based systems: A specification-based framework,” Journal of Systems and Software, vol. 80, no. 5, pp. 700–710, May 2007.
Best Paper Awards: IEEE AVS 2024, CSNet 2023, IEEE AVS 2023, IEEE ICDH 2023 (runner up), IEEE ISSRE 2021 (nomination), DependSys 2020, ICCSA 2018, IEEE BigData Security 2018, IEEE, DASC 2015, IEEE DASC 2011, TWUC 2007.
- N. Chakraborty, S. Iqbal, and M. Zulkernine, “Building Secure Software for Smart Aging Care Systems: An Agile Approach,” in 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS), Cambridge, United Kingdom: IEEE, Jul. 2024, pp. 562–571. (Best Paper Award)
- A. Anwar, T. Halabi, and M. Zulkernine, “Cooperative Defense-in-Depth in Large-Scale Autonomous Vehicle Networks,” in 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, United Kingdom: IEEE, Jul. 2024, pp. 1077–1088.
- Y. Yamout, S. Iqbal, N. Chakraborty, and M. Zulkernine, “Gait-based Authentication in Smart Aging Care Systems,” in 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Kingston, ON, Canada: IEEE, Aug. 2024, pp. 174–175.
- A. Abusitta, T. Halabi, A. S. Bataineh, and M. Zulkernine, “Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments,” in ICC 2024 – IEEE International Conference on Communications, Denver, CO, USA: IEEE, Jun. 2024, pp. 4644–4649.
- A. Anwar, N. Chakraborty, and M. Zulkernine, “Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain,” in 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, United Kingdom: IEEE, Jul. 2024, pp. 1067–1076.
- M. A. Abdelmaguid, H. S. Hassanein, and M. Zulkernine, “Security Prediction and Forecasting for a Trust Management System in VANET,” in 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Kingston, ON, Canada: IEEE, Aug. 2024, pp. 115–116.
- A. Babar, L. Li, A. Taylor, and M. Zulkernine, “Towards Autonomous Network Defense: Reinforcement Learning Environment for a Defense Agent,” in 2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Kingston, ON, Canada: IEEE, Aug. 2024, pp. 168–169.
- F. Faghihi, M. Zulkernine, and S. Ding, “Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware,” in Foundations and Practice of Security, vol. 14551, M. Mosbah, F. Sèdes, N. Tawbi, T. Ahmed, N. Boulahia-Cuppens, and J. Garcia-Alfaro, Eds., in Lecture Notes in Computer Science, vol. 14551. , Cham: Springer Nature Switzerland, 2024, pp. 269–284.
- M. R. Islam, A. S. Bataineh, and M. Zulkernine, “Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence,” in Ubiquitous Security, vol. 2034, G. Wang, H. Wang, G. Min, N. Georgalas, and W. Meng, Eds., in Communications in Computer and Information Science, vol. 2034. , Singapore: Springer Nature Singapore, 2024, pp. 319–334.
- M. A. Abdelmaguid, H. S. Hassanein, and M. Zulkernine, “A VeReMi-based Dataset for Predicting the Effect of Attacks in VANETs,” in Proceedings of the Int’l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, Montreal Quebec Canada: ACM, Oct. 2023, pp. 175–179.
- M. A. Abdelmaguid, H. S. Hassanein, and M. Zulkernine, “Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET,” in ICC 2023 – IEEE International Conference on Communications, Rome, Italy: IEEE, May 2023, pp. 3762–3767.
- M. Davari and M. Zulkernine, “Automatic Conversion of ABAC Policies for RBAC Systems,” in 2023 IEEE Conference on Dependable and Secure Computing (DSC), Tampa, FL, USA: IEEE, Nov. 2023, pp. 1–7.
- D. Phillips, T. Halabi, and M. Zulkernine, “Autonomous and Security-Aware Dynamic Vehicular Platoon Formation,” in 2023 10th International Conference on Dependable Systems and Their Applications (DSA), Tokyo, Japan: IEEE, Aug. 2023, pp. 770–781.
- A. Fakhereldine, M. Zulkernine, and D. Murdock, “CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks,” in 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW), Florence, Italy: IEEE, Oct. 2023, pp. 57–62.
- M. Davari and M. Zulkernine, “Classification-Based Anomaly Prediction in XACML Policies,” in Security and Privacy in Communication Networks, vol. 462, F. Li, K. Liang, Z. Lin, and S. K. Katsikas, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 462. , Cham: Springer Nature Switzerland, 2023, pp. 3–19.
- N. Chakraborty, M. Shojafar, Z. Chen, V. C. M. Leung, J. Li, and M. Zulkernine, “NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks,” in 2023 7th Cyber Security in Networking Conference (CSNet), Montreal, QC, Canada: IEEE, Oct. 2023, pp. 226–232. (Best Paper Award)
- N. Chakraborty, S. Iqbal, and M. Zulkernine, “Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective,” in 2023 IEEE International Conference on Digital Health (ICDH), Chicago, IL, USA: IEEE, Jul. 2023, pp. 1–12. (Best Paper Award)
- N. Chakraborty, Y. Yamout, and M. Zulkernine, “The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords,” in 2023 IEEE Conference on Communications and Network Security (CNS), Orlando, FL, USA: IEEE, Oct. 2023, pp. 1–5.
- T. Halabi and M. Zulkernine, “The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense,” in 2023 IEEE International Conference on Software Services Engineering (SSE), Chicago, IL, USA: IEEE, Jul. 2023, pp. 256–261.
- A. Fakhereldine, M. Zulkernine, and D. Murdock, “TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks,” in Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, vol. 14198, B. Milius, S. Collart-Dutilleul, and T. Lecomte, Eds., in Lecture Notes in Computer Science, vol. 14198. , Cham: Springer Nature Switzerland, 2023, pp. 22–39.
- T. Halabi, A. Chaudhry, S. Alqahtani, and M. Zulkernine, “A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments,” in 2022 IEEE Conference on Dependable and Secure Computing (DSC), Edinburgh, United Kingdom: IEEE, Jun. 2022, pp. 1–8.
- Y. Liu, J. Ni, and M. Zulkernine, “AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency,” in ICC 2022 – IEEE International Conference on Communications, Seoul, Korea, Republic of: IEEE, May 2022, pp. 4402–4407.
- K. Lounis, S. H. H. Ding, and M. Zulkernine, “Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3,” in Foundations and Practice of Security, vol. 13291, E. Aïmeur, M. Laurent, R. Yaich, B. Dupont, and J. Garcia-Alfaro, Eds., in Lecture Notes in Computer Science, vol. 13291. , Cham: Springer International Publishing, 2022, pp. 235–252.
- A. Fakhereldine, M. Zulkernine, and D. Murdock, “Detecting Intrusions in Communication-Based Train Control Systems,” in ICC 2022 – IEEE International Conference on Communications, Seoul, Korea, Republic of: IEEE, May 2022, pp. 4193–4198.
- A. Faisal and M. Zulkernine, “DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure,” in Information Systems Security, vol. 13784, V. R. Badarla, S. Nepal, and R. K. Shyamasundar, Eds., in Lecture Notes in Computer Science, vol. 13784. , Cham: Springer Nature Switzerland, 2022, pp. 23–43.
- M. A. Abdelmaguid, H. S. Hassanein, and M. Zulkernine, “SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET,” in Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna Austria: ACM, Aug. 2022, pp. 1–10.
- A. Faisal and M. Zulkernine, “SAS-GKE: A Secure Authenticated Scalable Group Key Exchange,” in 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China: IEEE, Dec. 2022, pp. 571–582.
- A. K. Alvi and M. Zulkernine, “Security Pattern Detection Through Diagonally Distributed Matrix Matching,” in 2022 9th International Conference on Dependable Systems and Their Applications (DSA), Wulumuqi, China: IEEE, Aug. 2022, pp. 390–402.
- A. Chaudhry, T. Halabi, and M. Zulkernine, “Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications,” in 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Baltimore, MD, USA: IEEE, Jun. 2022, pp. 1–7.
- J. Banks, R. Kerr, S. Ding, and M. Zulkernine, “SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments,” in MILCOM 2022 – 2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA: IEEE, Nov. 2022, pp. 522–528.
- L. Moukahal, M. Zulkernine, and M. Soukup, “AVSDA: Autonomous Vehicle Security Decay Assessment,” in Risks and Security of Internet and Systems, vol. 13204, B. Luo, M. Mosbah, F. Cuppens, L. Ben Othmane, N. Cuppens, and S. Kallel, Eds., in Lecture Notes in Computer Science, vol. 13204. , Cham: Springer International Publishing, 2022, pp. 20–37.
- M. Davari and M. Zulkernine, “Policy Modeling and Anomaly Detection in ABAC Policies,” in Risks and Security of Internet and Systems, vol. 13204, B. Luo, M. Mosbah, F. Cuppens, L. Ben Othmane, N. Cuppens, and S. Kallel, Eds., in Lecture Notes in Computer Science, vol. 13204. , Cham: Springer International Publishing, 2022, pp. 137–152.
- L. J. Moukahal, M. Zulkernine, and M. Soukup, “Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems,” in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), Hainan, China: IEEE, Dec. 2021, pp. 516–527.
- D. Phillips, M. A. Elsayed, and M. Zulkernine, “DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles,” in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), Hainan, China: IEEE, Dec. 2021, pp. 528–535.
- K. Lounis and M. Zulkernine, “Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs,” in Risks and Security of Internet and Systems, vol. 12528, J. Garcia-Alfaro, J. Leneutre, N. Cuppens, and R. Yaich, Eds., in Lecture Notes in Computer Science, vol. 12528. , Cham: Springer International Publishing, 2021, pp. 49–66.
- N. S. Arabi, T. Halabi, and M. Zulkernine, “Reinforcement Learning-driven Attack on Road Traffic Signal Controllers,” in 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece: IEEE, Jul. 2021, pp. 218–225.
- L. J. Moukahal, M. Zulkernine, and M. Soukup, “Towards a Secure Software Lifecycle for Autonomous Vehicles,” in 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Wuhan, China: IEEE, Oct. 2021, pp. 371–377. (Nominated for the Best Industry Paper Award)
- T. Halabi, O. A. Wahab, and M. Zulkernine, “A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems,” in NOMS 2020 – 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary: IEEE, Apr. 2020, pp. 1–6.
- K. Lounis and M. Zulkernine, “Exploiting Race Condition for Wi-Fi Denial of Service Attacks,” in 13th International Conference on Security of Information and Networks, Merkez Turkey: ACM, Nov. 2020, pp. 1–8.
- C. Chen, M. A. Elsayed, and M. Zulkernine, “HBD-Authority: Streaming Access Control Model for Hadoop,” in 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), Nadi, Fiji: IEEE, Dec. 2020, pp. 16–25. (Best Paper Award)
- S. A. A. Hridoy and M. Zulkernine, “LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network,” in Security and Privacy in Communication Networks, vol. 336, N. Park, K. Sun, S. Foresti, K. Butler, and N. Saxena, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 336. , Cham: Springer International Publishing, 2020, pp. 215–234.
- A. B. M. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation,” in ICC 2020 – 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland: IEEE, Jun. 2020, pp. 1–7.
- A. B. M. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Optimizing Virtual Machine Migration in Multi-Clouds,” in 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada: IEEE, Oct. 2020, pp. 1–7.
- W. E. Wong et al., “Panel on Safety, Security, and Reliability of Autonomous Vehicles,” in 2020 Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modeling (APARM), Vancouver, BC, Canada: IEEE, Aug. 2020, pp. 1–3.
- A. B. M. B. Alam, T. Halabi, A. Haque, and M. Zulkernine, “Reliability-based Formation of Cloud Federations Using Game Theory,” in GLOBECOM 2020 – 2020 IEEE Global Communications Conference, Taipei, Taiwan: IEEE, Dec. 2020, pp. 1–6.
- K. Lounis and M. Zulkernine, “WPA3 Connection Deprivation Attacks,” in Risks and Security of Internet and Systems, vol. 12026, S. Kallel, F. Cuppens, N. Cuppens-Boulahia, and A. Hadj Kacem, Eds., in Lecture Notes in Computer Science, vol. 12026. , Cham: Springer International Publishing, 2020, pp. 164–176.
- K. Lounis and M. Zulkernine, “Bad-token: denial of service attacks on WPA3,” in Proceedings of the 12th International Conference on Security of Information and Networks, Sochi Russia: ACM, Sep. 2019, pp. 1–8.
- K. Lounis and M. Zulkernine, “Bluetooth Low Energy Makes ‘Just Works’ Not Work,” in 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador: IEEE, Oct. 2019, pp. 99–106.
- A. Anwar, T. Halabi, and M. Zulkernine, “Cloud-based Sybil Attack Detection Scheme for Connected Vehicles,” in 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador: IEEE, Oct. 2019, pp. 114–121.
- K. Lounis and M. Zulkernine, “Connection Dumping Vulnerability Affecting Bluetooth Availability,” in Risks and Security of Internet and Systems, vol. 11391, A. Zemmari, M. Mosbah, N. Cuppens-Boulahia, and F. Cuppens, Eds., in Lecture Notes in Computer Science, vol. 11391. , Cham: Springer International Publishing, 2019, pp. 188–204.
- J. Wang, K. Lounis, and M. Zulkernine, “CSKES: A Context-Based Secure Keyless Entry System,” in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA: IEEE, Jul. 2019, pp. 817–822.
- A. Faisal and M. Zulkernine, “Graphene: A Secure Cloud Communication Architecture,” in Applied Cryptography and Network Security Workshops, vol. 11605, J. Zhou, R. Deng, Z. Li, S. Majumdar, W. Meng, L. Wang, and K. Zhang, Eds., in Lecture Notes in Computer Science, vol. 11605. , Cham: Springer International Publishing, 2019, pp. 51–69.
- T. Halabi and M. Zulkernine, “Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game,” in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Portland, OR, USA: IEEE, Jun. 2019, pp. 78–85.
- M. S. U. Alam, S. Iqbal, M. Zulkernine, and C. Liem, “Securing Vehicle ECU Communications and Stored Data,” in ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China: IEEE, May 2019, pp. 1–6.
- J. Wang, K. Lounis, and M. Zulkernine, “Security Features for Proximity Verification,” in 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA: IEEE, Jul. 2019, pp. 592–597.
- L. Moukahal and M. Zulkernine, “Security Vulnerability Metrics for Connected Vehicles,” in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria: IEEE, Jul. 2019, pp. 17–23.
- S. Iqbal, A. Haque, and M. Zulkernine, “Towards a Security Architecture for Protecting Connected Vehicles from Malware,” in 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia: IEEE, Apr. 2019, pp. 1–5.
- T. Halabi and M. Zulkernine, “Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles,” in ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China: IEEE, May 2019, pp. 1–6.
- M. A. Alswailim, H. S. Hassanein, and M. Zulkernine, “A Context-Aware Privacy Scheme for Crisis Situations,” in 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates: IEEE, Dec. 2018, pp. 1–6.
- J. Wan, M. Zulkernine, and C. Liem, “A Dynamic App Anti-Debugging Approach on Android ART Runtime,” in 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Athens: IEEE, Aug. 2018, pp. 560–567.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “A Security Framework for ICN Traffic Management,” in 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Athens: IEEE, Aug. 2018, pp. 78–85.
- M. Elsayed and M. Zulkernine, “A Taxonomy of Security as a Service,” in On the Move to Meaningful Internet Systems. OTM 2018 Conferences, vol. 11230, H. Panetto, C. Debruyne, H. A. Proper, C. A. Ardagna, D. Roman, and R. Meersman, Eds., in Lecture Notes in Computer Science, vol. 11230. , Cham: Springer International Publishing, 2018, pp. 305–312.
- O. Hreirati, S. Iqbal, and M. Zulkernine, “An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques,” in 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea (South): IEEE, Jul. 2018, pp. 62–66.
- A. B. M. B. Alam, A. Haque, and M. Zulkernine, “CREM: A Cloud Reliability Evaluation Model,” in 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates: IEEE, Dec. 2018, pp. 1–6.
- M. A. Elsayed and M. Zulkernine, “Integrating Security in Cloud Application Development Cycle,” in 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Korea (South): IEEE, Jul. 2018, pp. 13–18. (Best Paper Award)
- A. Anis, M. Zulkernine, S. Iqbal, C. Liem, and C. Chambers, “Securing Web Applications with Secure Coding Practices and Integrity Verification,” in 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Athens: IEEE, Aug. 2018, pp. 618–625.
- S. Iqbal and M. Zulkernine, “SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android,” in 2018 13th International Conference on Malicious and Unwanted Software (MALWARE), Nantucket, MA, USA: IEEE, Oct. 2018, pp. 1–8.
- M. Elsayed and M. Zulkernine, “Towards Security Monitoring for Cloud Analytic Applications,” in 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE: IEEE, May 2018, pp. 69–78. (Best Paper Award)
- M. S. Hasan, T. Dean, F. T. Imam, F. Garcia, S. P. Leblanc, and M. Zulkernine, “A Constraint-based intrusion detection system,” in Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, Larnaca Cyprus: ACM, Aug. 2017, pp. 1–10.
- M. A. Alswailim, H. S. Hassanein, and M. Zulkernine, “A Participant Contribution Trust Scheme for Crisis Response Systems,” in GLOBECOM 2017 – 2017 IEEE Global Communications Conference, Singapore: IEEE, Dec. 2017, pp. 1–6.
- A. B. M. B. Alam, M. Zulkernine, and A. Haque, “A Reliability-Based Resource Allocation Approach for Cloud Computing,” in 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2), Kanazawa: IEEE, Nov. 2017, pp. 249–252.
- M. Davari, M. Zulkernine, and F. Jaafar, “An Automatic Software Vulnerability Classification Framework,” in 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA: IEEE, Jul. 2017, pp. 44–49.
- J. Wan, M. Zulkernine, P. Eisen, and C. Liem, “Defending Application Cache Integrity of Android Runtime,” in Information Security Practice and Experience, vol. 10701, J. K. Liu and P. Samarati, Eds., in Lecture Notes in Computer Science, vol. 10701. , Cham: Springer International Publishing, 2017, pp. 727–746.
- S. Shafieian, D. Smith, and M. Zulkernine, “Detecting DNS Tunneling Using Ensemble Learning,” in Network and System Security, vol. 10394, Z. Yan, R. Molva, W. Mazurczyk, and R. Kantola, Eds., in Lecture Notes in Computer Science, vol. 10394. , Cham: Springer International Publishing, 2017, pp. 112–127.
- M. S. Iqbal and M. Zulkernine, “Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts,” in Information Security, vol. 10599, P. Q. Nguyen and J. Zhou, Eds., in Lecture Notes in Computer Science, vol. 10599. , Cham: Springer International Publishing, 2017, pp. 329–347.
- M. S. Iqbal and M. Zulkernine, “Flamingo: a framework for smartphone security context management,” in Proceedings of the Symposium on Applied Computing, Marrakech Morocco: ACM, Apr. 2017, pp. 563–568.
- A. K. Alvi and M. Zulkernine, “Security Pattern Detection Using Ordered Matrix Matching,” in 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA: IEEE, Jul. 2017, pp. 38–43.
- E. G. AbdAllah, M. Zulkernine, Y. X. Gu, and C. Liem, “Towards defending connected vehicles against attacks,” in Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, Larnaca Cyprus: ACM, Aug. 2017, pp. 1–9.
- E. G. Abdallah, M. Zulkernine, Y. X. Gu, and C. Liem, “TRUST-CAP: A Trust Model for Cloud-Based Applications,” in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin: IEEE, Jul. 2017, pp. 584–589.
- M. A. Alswailim, H. S. Hassanein, and M. Zulkernine, “A Reputation System to Evaluate Participants for Participatory Sensing,” in 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA: IEEE, Dec. 2016, pp. 1–6.
- M. Davari and M. Zulkernine, “Analysing vulnerability reproducibility for Firefox browser,” in 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand: IEEE, Dec. 2016, pp. 674–681.
- S. Das and M. Zulkernine, “CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions,” in 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE), Orlando, FL, USA: IEEE, Jan. 2016, pp. 268–275.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “DACPI: A decentralized access control protocol for information centric networking,” in 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia: IEEE, May 2016, pp. 1–6.
- M. Elsayed and M. Zulkernine, “IFCaaS: Information Flow Control as a Service for Cloud Security,” in 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria: IEEE, Aug. 2016, pp. 211–216.
- M. S. Hasan, A. ElShakankiry, T. Dean, and M. Zulkernine, “Intrusion detection in a private network by satisfying constraints,” in 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand: IEEE, Dec. 2016, pp. 623–628.
- M. S. Iqbal and M. Zulkernine, “SAM: A secure anti-malware framework for the smartphone operating systems,” in 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar: IEEE, Apr. 2016, pp. 1–6.
- S. Iqbal and M. Zulkernine, “Zonedroid: control your droid through application zoning,” in 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA: IEEE, Oct. 2016, pp. 1–8.
- S. Shafieian, M. Zulkernine, and A. Haque, “CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud,” in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, LIVERPOOL, United Kingdom: IEEE, Oct. 2015, pp. 1733–1740.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “Countermeasures for Mitigating ICN Routing Related DDoS Attacks,” in International Conference on Security and Privacy in Communication Networks, vol. 153, J. Tian, J. Jing, and M. Srivatsa, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 153. , Cham: Springer International Publishing, 2015, pp. 84–92.
- E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “Detection and Prevention of Malicious Requests in ICN Routing and Caching,” in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, LIVERPOOL, United Kingdom: IEEE, Oct. 2015, pp. 1741–1748. (Best Paper Award)
- A. FaizKhademi, M. Zulkernine, and K. Weldemariam, “FPGuard: Detection and Prevention of Browser Fingerprinting,” in Data and Applications Security and Privacy XXIX, vol. 9149, P. Samarati, Ed., in Lecture Notes in Computer Science, vol. 9149. , Cham: Springer International Publishing, 2015, pp. 293–308.
- H. F. Hashemi, M. Zulkernine, and K. Weldemariam, “TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks,” in Risks and Security of Internet and Systems, vol. 8924, J. Lopez, I. Ray, and B. Crispo, Eds., in Lecture Notes in Computer Science, vol. 8924. , Cham: Springer International Publishing, 2015, pp. 196–212.
- M. U. Khan and M. Zulkernine, “A Hybrid Monitoring of Software Design-Level Security Specifications,” in 2014 14th International Conference on Quality Software, Allen, TX, USA: IEEE, Oct. 2014, pp. 111–116.
- F. Jaafar, F. Khomh, Y.-G. Gueheneuc, and M. Zulkernine, “Anti-pattern Mutations and Fault-proneness,” in 2014 14th International Conference on Quality Software, Allen, TX, USA: IEEE, Oct. 2014, pp. 246–255.
- S. Shafieian, M. Zulkernine, and A. Haque, “Attacks in Public Clouds: Can They Hinder the Rise of the Cloud?,” in Cloud Computing, Z. Mahmood, Ed., in Computer Communications and Networks. , Cham: Springer International Publishing, 2014, pp. 3–22.
- M. A. Alswailim, M. Zulkernine, and H. S. Hassanein, “Classification of participatory sensing privacy schemes,” in 39th Annual IEEE Conference on Local Computer Networks Workshops, Edmonton, AB, Canada: IEEE, Sep. 2014, pp. 761–767.
- D. Chaudhari, M. Zulkernine, and K. Weldemariam, “FRanC: A Ranking Framework for the Prioritization of Software Maintenance,” in 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA: IEEE, Jun. 2014, pp. 31–40.
- “Message from the Program Chairs,” in 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, Miami Beach, FL: IEEE, Jan. 2014, pp. x–x.
- J. Marston, K. Weldemariam, and M. Zulkernine, “On evaluating and securing firefox for Android browser extensions,” in Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, Hyderabad India: ACM, Jun. 2014, pp. 27–36.
- H. Shahriar, K. Weldemariam, T. Lutellier, and M. Zulkernine, “A Model-Based Detection of Vulnerable and Malicious Browser Extensions,” in 2013 IEEE 7th International Conference on Software Security and Reliability, Gaithersburg, MD, USA: IEEE, Jun. 2013, pp. 198–207.
- M. Godfrey and M. Zulkernine, “A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud,” in 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA: IEEE, Jun. 2013, pp. 163–170.
- B. Eshete, A. Villafiorita, K. Weldemariam, and M. Zulkernine, “Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications,” in 2013 IEEE 7th International Conference on Software Security and Reliability, Gaithersburg, MD, USA: IEEE, Jun. 2013, pp. 188–197.
- B. Eshete, A. Villafiorita, K. Weldemariam, and M. Zulkernine, “EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages,” in 2013 IEEE 37th Annual Computer Software and Applications Conference, Kyoto, Japan: IEEE, Jul. 2013, pp. 375–380.
- U. Hunny, M. Zulkernine, and K. Weldemariam, “OSDC: adapting ODC for developing more secure software,” in Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra Portugal: ACM, Mar. 2013, pp. 1131–1136.
- A. Barua, M. Zulkernine, and K. Weldemariam, “Protecting Web Browser Extensions from JavaScript Injection Attacks,” in 2013 18th International Conference on Engineering of Complex Computer Systems, Singapore, Singapore: IEEE, Jul. 2013, pp. 188–197.
- A. Shalan and M. Zulkernine, “Runtime Prediction of Failure Modes from System Error Logs,” in 2013 18th International Conference on Engineering of Complex Computer Systems, Singapore, Singapore: IEEE, Jul. 2013, pp. 232–241.
- M. Zulkernine, “Software Assurance: What Should We Do Next?,” in 2013 IEEE 37th Annual Computer Software and Applications Conference, Kyoto, Japan: IEEE, Jul. 2013, pp. 478–478.
- D. Chaudhari, M. Zulkernine, and K. Weldemariam, “Towards a ranking framework for software components,” in Proceedings of the 28th Annual ACM Symposium on Applied Computing, Coimbra Portugal: ACM, Mar. 2013, pp. 495–498.
- A. K. Alvi and M. Zulkernine, “A Comparative Study of Software Security Pattern Classifications,” in 2012 Seventh International Conference on Availability, Reliability and Security, Prague, TBD, Czech Republic: IEEE, Aug. 2012, pp. 582–589.
- A. Mohamed and M. Zulkernine, “A Control Flow Representation for Component-Based Software Reliability Analysis,” in 2012 IEEE Sixth International Conference on Software Security and Reliability, Gaithersburg, MD, USA: IEEE, Jun. 2012, pp. 1–10.
- “Cover Art,” in 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, Izmir, Turkey: IEEE, Jul. 2012, pp. C4–C4.
- A. Mohosina and M. Zulkernine, “DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations,” in 2012 IEEE Sixth International Conference on Software Security and Reliability, Gaithersburg, MD, USA: IEEE, Jun. 2012, pp. 98–107.
- H. Shahriar and M. Zulkernine, “Information-Theoretic Detection of SQL Injection Attacks,” in 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, Omaha, NE, USA: IEEE, Oct. 2012, pp. 40–47.
- L. Gutierrez-Madronal, H. Shahriar, M. Zulkernine, J. J. Dominguez-Jimenez, and I. Medina-Bulo, “Mutation Testing of Event Processing Queries,” in 2012 IEEE 23rd International Symposium on Software Reliability Engineering, Dallas, TX, USA: IEEE, Nov. 2012, pp. 21–30.
- A. Mohamed and M. Zulkernine, “A Connection-Based Signature Approach for Control Flow Error Detection,” in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia: IEEE, Dec. 2011, pp. 129–136.
- H. Shahriar and M. Zulkernine, “A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor,” in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia: IEEE, Dec. 2011, pp. 137–144. (Best Paper Award)
- A. K. Alvi and M. Zulkernine, “A Natural Classification Scheme for Software Security Patterns,” in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia: IEEE, Dec. 2011, pp. 113–120.
- M. U. A. Khan and M. Zulkernine, “Building components with embedded security monitors,” in Proceedings of the joint ACM SIGSOFT conference — QoSA and ACM SIGSOFT symposium — ISARCS on Quality of software architectures — QoSA and architecting critical systems — ISARCS, Boulder Colorado USA: ACM, Jun. 2011, pp. 133–142.
- H. Shahriar and M. Zulkernine, “Information Source-Based Classification of Automatic Phishing Website Detectors,” in 2011 IEEE/IPSJ International Symposium on Applications and the Internet, Munich, Germany: IEEE, Jul. 2011, pp. 190–195.
- H. Shahriar and M. Zulkernine, “Injecting Comments to Detect JavaScript Code Injection Attacks,” in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops, Munich, Germany: IEEE, Jul. 2011, pp. 104–109.
- H. Shahriar and M. Zulkernine, “S2XS2: A Server Side Approach to Automatically Detect XSS Attacks,” in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia: IEEE, Dec. 2011, pp. 7–14.
- X. Yang and M. Zulkernine, “Security Monitoring of Components Using Aspects and Contracts in Wrappers,” in 2011 IEEE 35th Annual Computer Software and Applications Conference, Munich, Germany: IEEE, Jul. 2011, pp. 566–575.
- A. Barua, H. Shahriar, and M. Zulkernine, “Server Side Detection of Content Sniffing Attacks,” in 2011 IEEE 22nd International Symposium on Software Reliability Engineering, Hiroshima, Japan: IEEE, Nov. 2011, pp. 20–29.
- A. Mohamed and M. Zulkernine, “A taxonomy of software architecture-based reliability efforts,” in Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, Cape Town South Africa: ACM, May 2010, pp. 44–51.
- A. Mohamed and M. Zulkernine, “Architectural Design Decisions for Achieving Reliable Software Systems,” in Architecting Critical Systems, vol. 6150, H. Giese, Ed., in Lecture Notes in Computer Science, vol. 6150. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 19–32.
- I. Chowdhury and M. Zulkernine, “Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?,” in Proceedings of the 2010 ACM Symposium on Applied Computing, Sierre Switzerland: ACM, Mar. 2010, pp. 1963–1969.
- H. Shahriar and M. Zulkernine, “Classification of Buffer Overflow Vulnerability Monitors,” in 2010 International Conference on Availability, Reliability and Security, Krakow, Poland: IEEE, Feb. 2010, pp. 519–524.
- H. Shahriar and M. Zulkernine, “Classification of Static Analysis-Based Buffer Overflow Detectors,” in 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion, Singapore, Singapore: IEEE, Jun. 2010, pp. 94–101.
- H. Shahriar and M. Zulkernine, “Client-Side Detection of Cross-Site Request Forgery Attacks,” in 2010 IEEE 21st International Symposium on Software Reliability Engineering, San Jose, CA, USA: IEEE, Nov. 2010, pp. 358–367.
- A. Mohamed and M. Zulkernine, “Failure Type-Aware Reliability Assessment with Component Failure Dependency,” in 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement, Singapore, Singapore: IEEE, 2010, pp. 98–105.
- H. Shahriar and M. Zulkernine, “PhishTester: Automatic Testing of Phishing Attacks,” in 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement, Singapore, Singapore: IEEE, 2010, pp. 198–207.
- A. Mohamed and M. Zulkernine, “The Level of Decomposition Impact on Component Fault Tolerance,” in 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, Seoul, Korea (South): IEEE, Jul. 2010, pp. 57–62.
- M. G. Uddin and M. Zulkernine, “A Trust Monitoring Architecture for Service-Based Software,” in High Assurance Services Computing, L.-J. Zhang, R. Paul, and J. Dong, Eds., Boston, MA: Springer US, 2009, pp. 45–63.
- M. U. A. Khan and M. Zulkernine, “Activity and Artifact Views of a Secure Software Development Process,” in 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada: IEEE, 2009, pp. 399–404.
- M. Gias Uddin and M. Zulkernine, “ATM: an automatic trust monitoring algorithm for service software,” in Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu Hawaii: ACM, Mar. 2009, pp. 1040–1044.
- H. Shahriar and M. Zulkernine, “Automatic Testing of Program Security Vulnerabilities,” in 2009 33rd Annual IEEE International Computer Software and Applications Conference, Seattle, Washington, USA: IEEE, 2009, pp. 550–555.
- H. Shahriar and M. Zulkernine, “MUTEC: Mutation-based testing of Cross Site Scripting,” in 2009 ICSE Workshop on Software Engineering for Secure Systems, Vancouver, BC, Canada: IEEE, May 2009, pp. 47–53.
- X. Yang and M. Zulkernine, “Secure Method Calls by Instrumenting Bytecode with Aspects,” in Data and Applications Security XXIII, vol. 5645, E. Gudes and J. Vaidya, Eds., in Lecture Notes in Computer Science, vol. 5645. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 126–141.
- S. I. Ahamed, D. Kim, C. S. Hasan, and M. Zulkernine, “Towards developing a trust-based security solution,” in Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu Hawaii: ACM, Mar. 2009, pp. 2204–2205.
- M. Zulkernine, M. F. Raihan, and M. G. Uddin, “Towards Model-Based Automatic Testing of Attack Scenarios,” in Computer Safety, Reliability, and Security, vol. 5775, B. Buth, G. Rabe, and T. Seyfarth, Eds., in Lecture Notes in Computer Science, vol. 5775. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 229–242.
- Y. You, M. Zulkernine, and A. Haque, “A Distributed Defense Framework for Flooding-Based DDoS Attacks,” in 2008 Third International Conference on Availability, Reliability and Security, IEEE, Mar. 2008, pp. 245–252.
- L. Kuang and M. Zulkernine, “An anomaly intrusion detection method using the CSI-KNN algorithm,” in Proceedings of the 2008 ACM symposium on Applied computing, Fortaleza, Ceara Brazil: ACM, Mar. 2008, pp. 921–926.
- L. Kuang and M. Zulkernine, “An Intrusion-Tolerant Mechanism for Intrusion Detection Systems,” in 2008 Third International Conference on Availability, Reliability and Security, IEEE, Mar. 2008, pp. 319–326.
- A. Mohamed and M. Zulkernine, “At What Level of Granularity Should We be Componentizing for Software Reliability?,” in 2008 11th IEEE High Assurance Systems Engineering Symposium, Nanjing, China: IEEE, Dec. 2008, pp. 273–282.
- M. G. Uddin, M. Zulkernine, and S. I. Ahamed, “CAT: a context-aware trust model for open and dynamic systems,” in Proceedings of the 2008 ACM symposium on Applied computing, Fortaleza, Ceara Brazil: ACM, Mar. 2008, pp. 2024–2029.
- H. Shahriar and M. Zulkernine, “MUSIC: Mutation-based SQL Injection Vulnerability Checking,” in 2008 The Eighth International Conference on Quality Software, Oxford, United Kingdom: IEEE, Aug. 2008, pp. 77–86.
- H. Shahriar and M. Zulkernine, “Mutation-Based Testing of Buffer Overflow Vulnerabilities,” in 2008 32nd Annual IEEE International Computer Software and Applications Conference, Turku, Finland: IEEE, 2008, pp. 979–984.
- H. Shahriar and M. Zulkernine, “Mutation-Based Testing of Format String Bugs,” in 2008 11th IEEE High Assurance Systems Engineering Symposium, Nanjing, China: IEEE, Dec. 2008, pp. 229–238.
- A. Mohamed and M. Zulkernine, “On Failure Propagation in Component-Based Software Systems,” in 2008 The Eighth International Conference on Quality Software, Oxford, United Kingdom: IEEE, Aug. 2008, pp. 402–411.
- M. U. A. Khan and M. Zulkernine, “Quantifying Security in Secure Software Development Phases,” in 2008 32nd Annual IEEE International Computer Software and Applications Conference, Turku, Finland: IEEE, 2008, pp. 955–960.
- I. Chowdhury, B. Chan, and M. Zulkernine, “Security metrics for source code structures,” in Proceedings of the fourth international workshop on Software engineering for secure systems, Leipzig Germany: ACM, May 2008, pp. 57–64.
- S. Whittaker, M. Zulkernine, and K. Rudie, “Towards Incorporating Discrete-Event Systems in Secure Software Development,” in 2008 Third International Conference on Availability, Reliability and Security, IEEE, Mar. 2008, pp. 1188–1195.
- S. I. Ahamed, E. Hoque, F. Rahman, and M. Zulkernine, “Towards Secure Trust Bootstrapping in Pervasive Computing Environment,” in 2008 11th IEEE High Assurance Systems Engineering Symposium, Nanjing, China: IEEE, Dec. 2008, pp. 89–96.
- M. G. Uddin and M. Zulkernine, “UMLtrust: towards developing trust-aware software,” in Proceedings of the 2008 ACM symposium on Applied computing, Fortaleza, Ceara Brazil: ACM, Mar. 2008, pp. 831–836.
- M. G. Uddin, H. Shahriar, and M. Zulkernine, “ACIR: An Aspect-Connector for Intrusion Response,” in 31st Annual International Computer Software and Applications Conference – Vol. 2 – (COMPSAC 2007), Beijing, China: IEEE, Jul. 2007, pp. 249–254.
- M. Raihan and M. Zulkernine, “AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification,” in The Second International Conference on Availability, Reliability and Security (ARES’07), Vienna, Austria: IEEE, Apr. 2007, pp. 775–782.
- Y. You, M. Zulkernine, and A. Haque, “Detecting Flooding-Based DDoS Attacks,” in 2007 IEEE International Conference on Communications, Glasgow, Scotland: IEEE, Jun. 2007, pp. 1229–1234.
- P. Kannadiga, M. Zulkernine, and A. Haque, “E-NIPS: An Event-Based Network Intrusion Prediction System,” in Information Security, vol. 4779, J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, Eds., in Lecture Notes in Computer Science, vol. 4779. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 37–52.
- A. Mohamed and M. Zulkernine, “Improving Reliability and Safety by Trading off Software Failure Criticalities,” in 10th IEEE High Assurance Systems Engineering Symposium (HASE’07), Plano, TX, USA: IEEE, Nov. 2007, pp. 267–274.
- K. Ali, M. Zulkernine, and H. Hassanein, “Packet Filtering Based on Source Router Marking and Hop-Count,” in 32nd IEEE Conference on Local Computer Networks (LCN 2007), Dublin, Ireland: IEEE, Oct. 2007, pp. 1061–1068.
- M. Al-Subaie and M. Zulkernine, “The Power of Temporal Pattern Processing in Anomaly Intrusion Detection,” in 2007 IEEE International Conference on Communications, Glasgow, Scotland: IEEE, Jun. 2007, pp. 1391–1398.
- Z. J. Zhu and M. Zulkernine, “Towards an Aspect-Oriented Intrusion Detection Framework,” in 31st Annual International Computer Software and Applications Conference – Vol. 1- (COMPSAC 2007), Beijing, China: IEEE, Jul. 2007, pp. 637–638.
- S. I. Ahamed, M. Zulkernine, and S. Anamanamuri, “A dependable device discovery approach for pervasive computing middleware,” in First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria: IEEE, 2006, p. 8 pp. – 73.
- J. Zhang and M. Zulkernine, “A hybrid network intrusion detection technique using random forests,” in First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria: IEEE, 2006, p. 8 pp. – 269.
- S. T. Wolfe, S. I. Ahamed, and M. Zulkernine, “A Trust Framework for Pervasive Computing Environments,” in IEEE International Conference on Computer Systems and Applications, 2006., IEEE, 2006, pp. 312–319.
- J. Zhang and M. Zulkernine, “Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection,” in 2006 IEEE International Conference on Communications, Istanbul: IEEE, 2006, pp. 2388–2393.
- M. Graves and M. Zulkernine, “Bridging the gap: software specification meets intrusion detector,” in Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, Markham Ontario Canada: ACM, Oct. 2006, pp. 1–8.
- M. Al-Subaie and M. Zulkernine, “Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection,” in 30th Annual International Computer Software and Applications Conference (COMPSAC’06), Chicago, IL: IEEE, Sep. 2006, pp. 325–332.
- M. Hussein and M. Zulkernine, “UMLintr: a UML profile for specifying intrusions,” in 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS’06), Potsdam, Germany: IEEE, 2006, p. 8 pp. – 288.
- Ren Hui Gong, M. Zulkernine, and P. Abolmaesumi, “A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection,” in Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN’05), Towson, MD, USA: IEEE, 2005, pp. 246–253.
- M. F. Raihan and M. Zulkernine, “Detecting intrusions specified in a software specification language,” in 29th Annual International Computer Software and Applications Conference (COMPSAC’05), Edinburgh, UK: IEEE, 2005, pp. 143-148 Vol. 2.
- P. Kannadiga and M. Zulkernine, “DIDMA: A Distributed Intrusion Detection System Using Mobile Agents,” in Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN’05), Towson, MD, USA: IEEE, 2005, pp. 238–245.
- A. Hasswa, M. Zulkernine, and H. Hassanein, “Routeguard: an intrusion detection and response system for mobile ad hoc networks,” in WiMob’2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., Montreal, Canada: IEEE, 2005, pp. 336–343.
- P. Kannadiga, M. Zulkernine, and S. I. Ahamed, “Towards an intrusion detection system for pervasive computing environments,” in International Conference on Information Technology: Coding and Computing (ITCC’05) – Volume II, Las Vegas, NV, USA: IEEE, 2005, pp. 277-282 Vol. 2.
- S. I. Ahamed, A. Vyas, and M. Zulkernine, “Towards developing sensor networks monitoring as a middleware service,” in Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compile and Run Time Techniques for Parallel Computing ICPP 2004, Montreal, QC, Canada: IEEE, 2004, pp. 465–471.
- S. Shafieian, M. Zulkernine, and A. Haque†, “Attacks in Public Clouds: Can They Hinder Rise of the Cloud?” in Z. Mahmood, Cloud Computing, Computer Communications and Networks, Springer, pp. 3-22, October 2014.
- M. Uddin and M. Zulkernine, “A Trust Monitoring Architecture for Service-Based Software,” in J. Dong, R. Paul, and L. Zhang (editors), High Assurance Service Computing, pp. 45-64, Springer, 2009.
- M. Zulkernine and S. Ahamed*, “Software Security Engineering: Towards Unifying Software Engineering and Security Engineering,” in Hamid Nemati (editor), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Chapter 2.19, pp. 927-942, Information Science Reference, 2008, USA.
- M. Hussein, M. Raihan, and M. Zulkernine, “Classification and Extension of Software Specification and Attack Description Languages,” in D. Khadraoui and F. Herrmann (editors), Advances in Enterprise IT Security, pp. 285-301, Idea Group, 2007.
- S. Ahamed*, M. Zulkernine, and M. Haque, “Security, Privacy, and Trust for Pervasive Computing Applications,” in G. Karmakar and L. Dooley (editors), Mobile Multimedia Communications: Concepts, Applications and Challenges, pp. 326-341, Idea Group, 2007.
- Faisal, Md Abu, and Mohammad Zulkernine. “Secure cloud communication architecture.” U.S. Patent No. 11,936,691. 19 Mar. 2024.
- Soukup, M., Murdock, D., Moukahal, L., & Zulkernine, M. “Fuzzy testing a software system.” U.S. Patent Application No. 18/144,949.
- Zulkernine, Mohammad, Amin Fakhereldine, and Dan Murdock. “Method and apparatus for detecting attack on train control systems.” U.S. Patent Application No. 17/979,344.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
- Faisal, Md Abu, and Mohammad Zulkernine. “Secure cloud communication architecture.” U.S. Patent No. 11,936,691. 19 Mar. 2024.
- Soukup, M., Murdock, D., Moukahal, L., & Zulkernine, M. “Fuzzy testing a software system.” U.S. Patent Application No. 18/144,949.
- Zulkernine, Mohammad, Amin Fakhereldine, and Dan Murdock. “Method and apparatus for detecting attack on train control systems.” U.S. Patent Application No. 17/979,344.
- Moukahal, Lama, and Mohammad Zulkernine. “Fuzzy testing a software system.” U.S. Patent No. 11,366,748. 21 Jun. 2022.
- Faisal, Md Abu, and Mohammad Zulkernine. “Secure cloud communication architecture.” U.S. Patent No. 11,936,691. 19 Mar. 2024.
- Soukup, M., Murdock, D., Moukahal, L., & Zulkernine, M. “Fuzzy testing a software system.” U.S. Patent Application No. 18/144,949.
- Zulkernine, Mohammad, Amin Fakhereldine, and Dan Murdock. “Method and apparatus for detecting attack on train control systems.” U.S. Patent Application No. 17/979,344.
- Moukahal, Lama, and Mohammad Zulkernine. “Fuzzy testing a software system.” U.S. Patent No. 11,366,748. 21 Jun. 2022.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
