A framework for classifying denial of service attacks A Hussain, J Heidemann, C Papadopoulos Proceedings of the 2003 conference on Applications, technologies …, 2003 | 745 | 2003 |
Cossack: Coordinated suppression of simultaneous attacks C Papadopoulos, R Lindell, J Mehringer, A Hussain, R Govindan Proceedings DARPA information survivability conference and exposition 1, 2-13, 2003 | 235 | 2003 |
In quest of benchmarking security risks to cyber-physical systems S Amin, GA Schwartz, A Hussain IEEE Network 27 (1), 19-24, 2013 | 131 | 2013 |
Effect of malicious traffic on the network K Lan, A Hussain, D Dutta Passive and Active Measurement Workshop (PAM), 2003 | 95 | 2003 |
Accurately measuring denial of service in simulation and testbed experiments J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008 | 92 | 2008 |
Towards user-centric metrics for denial-of-service measurement J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ... Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007 | 89 | 2007 |
Identification of repeated denial of service attacks A Hussain, J Heidemann, C Papadopoulos INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006 | 73* | 2006 |
Seer: A security experimentation environment for deter S Schwab, B Wilson, C Ko, A Hussain Proceedings of the DETER Community Workshop on Cyber Security …, 2007 | 65 | 2007 |
Measuring denial of service J Mirkovic, P Reiher, S Fahmy, R Thomas, A Hussain, S Schwab, C Ko Proceedings of the 2nd ACM workshop on Quality of protection, 53-58, 2006 | 62 | 2006 |
Experiences with a continuous network tracing infrastructure A Hussain, G Bartlett, Y Pryadkin, J Heidemann, C Papadopoulos, ... Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 185-190, 2005 | 52 | 2005 |
Testing a collaborative DDoS defense in a red team/blue team exercise J Mirkovic, P Reiher, C Papadopoulos, A Hussain, M Shepard, M Berg, ... IEEE Transactions on Computers 57 (8), 1098-1112, 2008 | 47 | 2008 |
Experience with heterogenous clock-skew based device fingerprinting S Sharma, A Hussain, H Saran Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012 | 35 | 2012 |
Measuring impact of dos attacks J Mirkovic, S Fahmy, P Reiher, R Thomas, A Hussain, S Schwab, C Ko Proceedings of the DETER community workshop on cyber security experimentation, 2006 | 35 | 2006 |
DDoS experiment methodology A Hussain, S Schwab, R Thomas, S Fahmy, J Mirkovic Proceedings of the DETER community workshop on cyber security experimentation 8, 2006 | 34 | 2006 |
DDoS benchmarks and experimenter's workbench for the DETER testbed J Mirkovic, S Wei, A Hussain, B Wilson, R Thomas, S Schwab, S Fahmy, ... 2007 3rd International Conference on Testbeds and Research Infrastructure …, 2007 | 31 | 2007 |
A semantic framework for data analysis in networked systems A Viswanathan, A Hussain, J Mirkovic, S Schwab, J Wroclawski 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011 | 30 | 2011 |
DETERLab and the DETER Project J Wroclawski, T Benzel, J Blythe, T Faber, A Hussain, J Mirkovic, ... The GENI Book, 35-62, 2016 | 27 | 2016 |
Automating DDoS Experimentation. J Mirkovic, B Wilson, A Hussain, S Fahmy, P Reiher, R Thomas, ... Usenix Workshop on Cyber Security Experimentation, 2007 | 25 | 2007 |
A framework for evaluating the resilience of dynamic real-time market mechanisms P Wood, D Shiltz, TR Nudell, A Hussain, AM Annaswamy IEEE Transactions on Smart Grid 7 (6), 2904-2912, 2016 | 20 | 2016 |
Distinguishing between single and multi-source attacks using signal processing A Hussain, J Heidemann, C Papadopoulos Computer Networks 46 (4), 479-503, 2004 | 20 | 2004 |