关注
Syed Ali Khayam
Syed Ali Khayam
Amazon Web Services
在 seecs.edu.pk 的电子邮件经过验证
标题
引用次数
引用次数
年份
The discrete cosine transform (DCT): theory and application
SA Khayam
Michigan State University 114 (1), 31, 2003
5352003
Revisiting traffic anomaly detection using software defined networking
SA Mehdi, J Khalid, SA Khayam
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
4982011
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan, AA Syed, SA Khayam
IEEE communications surveys & tutorials 16 (2), 898-924, 2013
2492013
Keystroke-based user identification on smart phones
S Zahid, M Shahzad, SA Khayam, M Farooq
International Workshop on Recent advances in intrusion detection, 224-243, 2009
1712009
Embedded Malware Detection Using Markov n-Grams
MZ Shafiq, SA Khayam, M Farooq
International conference on detection of intrusions and malware, and …, 2008
1482008
Performance analysis and modeling of errors and losses over 802.11 b LANs for high-bit-rate real-time multimedia
SA Khayam, S Karande, H Radha, D Loguinov
Signal Processing: Image Communication 18 (7), 575-595, 2003
1122003
Markov-based modeling of wireless local area networks
SA Khayam, H Radha
Proceedings of the 6th ACM international workshop on Modeling analysis and …, 2003
1032003
Breaking e-banking CAPTCHAs
S Li, SAH Shah, MAU Khan, SA Khayam, AR Sadeghi, R Schmitz
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
872010
Energy efficient video compression for wireless sensor networks
JJ Ahmad, HA Khan, SA Khayam
2009 43rd Annual Conference on Information Sciences and Systems, 629-634, 2009
872009
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks
S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan
Journal of Network and Computer Applications 35 (2), 597-605, 2012
852012
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
592011
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
582012
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
572008
A topologically-aware worm propagation model for wireless sensor networks
SA Khayam, H Radha
25th IEEE international conference on distributed computing systems …, 2005
572005
Method and system for adaptive anomaly-based intrusion detection
SA Khayam, MQ Ali
US Patent 8,800,036, 2014
552014
A look at the consequences of Internet censorship through an ISP lens
S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014
502014
Analyzing the spread of active worms over VANET
SA Khayam, H Radha
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
492004
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks
SA Khayam, S Karande, M Krappel, H Radha
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
482003
Using signal processing techniques to model worm propagation over wireless sensor networks
SA Khayam, H Radha
IEEE Signal Processing Magazine 23 (2), 164-169, 2006
472006
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks
HK Qureshi, S Rizvi, M Saleem, SA Khayam, V Rakocevic, M Rajarajan
Computer Communications 34 (10), 1235-1242, 2011
442011
系统目前无法执行此操作,请稍后再试。
文章 1–20