LTEInspector: A systematic approach for adversarial testing of 4G LTE S Hussain, O Chowdhury, S Mehnaz, E Bertino Network and Distributed Systems Security (NDSS) Symposium 2018, 2018 | 240 | 2018 |
Privacy attacks to the 4G and 5G cellular paging protocols using side channel information SR Hussain, M Echeverria, O Chowdhury, N Li, E Bertino Network and distributed systems security (NDSS) symposium2019, 2019 | 166 | 2019 |
5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol SR Hussain, M Echeverria, I Karim, O Chowdhury, E Bertino Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 142 | 2019 |
Dictionary based secure provenance compression for wireless sensor networks C Wang, SR Hussain, E Bertino IEEE transactions on parallel and distributed systems 27 (2), 405-418, 2015 | 56 | 2015 |
Insecure connection bootstrapping in cellular networks: the root of all evil SR Hussain, M Echeverria, A Singla, O Chowdhury, E Bertino Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 55 | 2019 |
DBSAFE—an anomaly detection system to protect databases from exfiltration attempts A Sallam, E Bertino, SR Hussain, D Landers, RM Lefler, D Steiner IEEE Systems Journal 11 (2), 483-493, 2015 | 50 | 2015 |
SAAMAN: scalable address autoconfiguration in mobile ad hoc networks SR Hussain, S Saha, A Rahman Journal of Network and Systems Management 19, 394-426, 2011 | 48 | 2011 |
Secure seamless bluetooth low energy connection migration for unmodified iot devices SR Hussain, S Mehnaz, S Nirjon, E Bertino IEEE Transactions on Mobile Computing 17 (4), 927-944, 2017 | 46 | 2017 |
Detanom: Detecting anomalous database transactions by insiders SR Hussain, AM Sallam, E Bertino Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 46 | 2015 |
Secure data provenance compression using arithmetic coding in wireless sensor networks SR Hussain, C Wang, S Sultana, E Bertino 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 46 | 2014 |
A system for profiling and monitoring database access patterns by application programs for anomaly detection L Bossi, E Bertino, SR Hussain IEEE Transactions on software engineering 43 (5), 415-431, 2016 | 33 | 2016 |
Look before you leap: Secure connection bootstrapping for 5g networks to defend against fake base-stations A Singla, R Behnia, SR Hussain, A Yavuz, E Bertino Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 30 | 2021 |
Protecting the 4G and 5G cellular paging protocols against security and privacy attacks A Singla, SR Hussain, O Chowdhury, E Bertino, N Li Proceedings on Privacy Enhancing Technologies, 2020 | 30 | 2020 |
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices SR Hussain, I Karim, AA Ishtiaq, O Chowdhury, E Bertino Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
Prochecker: An automated security and privacy analysis framework for 4g lte protocol implementations I Karim, SR Hussain, E Bertino 2021 IEEE 41st International Conference on Distributed Computing Systems …, 2021 | 24 | 2021 |
Phoenix: Device-centric cellular network protocol monitoring using runtime verification M Echeverria, Z Ahmed, B Wang, MF Arif, SR Hussain, O Chowdhury arXiv preprint arXiv:2101.00328, 2021 | 20 | 2021 |
Metrics for sustainability in data centers A Gandhi, D Lee, Z Liu, S Mu, E Zadok, K Ghose, K Gopalan, YD Liu, ... ACM SIGENERGY Energy Informatics Review 3 (3), 40-46, 2023 | 14 | 2023 |
PatrIoT: Policy Assisted Resilient Programmable IoT System M Yahyazadeh, SR Hussain, E Hoque, O Chowdhury Runtime Verification: 20th International Conference, RV 2020, Los Angeles …, 2020 | 13 | 2020 |
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy W Wang, F Cicala, SR Hussain, E Bertino, N Li Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 12 | 2020 |
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. SR Hussain, S Mehnaz, S Nirjon, E Bertino EWSN, 132-143, 2017 | 12 | 2017 |