Follow
Mohammad Zulkernine
Mohammad Zulkernine
Professor, School of Computing, Queen's University
Verified email at cs.queensu.ca - Homepage
Title
Cited by
Cited by
Year
Random-forests-based network intrusion detection systems
J Zhang, M Zulkernine, A Haque
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2008
6382008
Network Intrusion Detection using Random Forests.
J Zhang, M Zulkernine
Pst, 2005
388*2005
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
I Chowdhury, M Zulkernine
Journal of Systems Architecture 57 (3), 294-313, 2011
3742011
Anomaly based network intrusion detection with unsupervised outlier detection
J Zhang, M Zulkernine
2006 IEEE International Conference on Communications 5, 2388-2393, 2006
3402006
A neural network based system for intrusion detection and classification of attacks
M Moradi, M Zulkernine
Proceedings of the IEEE international conference on advances in intelligent …, 2004
3172004
A hybrid network intrusion detection technique using random forests
J Zhang, M Zulkernine
First International Conference on Availability, Reliability and Security …, 2006
2752006
A software implementation of a genetic algorithm based approach to network intrusion detection
RH Gong, M Zulkernine, P Abolmaesumi
Sixth International Conference on Software Engineering, Artificial …, 2005
2322005
A survey of security attacks in information-centric networking
EG AbdAllah, HS Hassanein, M Zulkernine
IEEE Communications Surveys & Tutorials 17 (3), 1441-1454, 2015
2152015
Mitigating program security vulnerabilities: Approaches and challenges
H Shahriar, M Zulkernine
ACM Computing Surveys (CSUR) 44 (3), 1-46, 2012
1602012
Preventing cache-based side-channel attacks in a cloud environment
M Godfrey, M Zulkernine
IEEE transactions on cloud computing 2 (4), 395-408, 2014
1382014
MUSIC: Mutation-based SQL injection vulnerability checking
H Shahriar, M Zulkernine
2008 The Eighth International Conference on Quality Software, 77-86, 2008
1212008
Attacks and Defenses in Short-Range Wireless Technologies for IoT
K Lounis, M Zulkernine
IEEE Access 8, 88892-88932, 2020
1182020
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?
I Chowdhury, M Zulkernine
Proceedings of the 2010 ACM Symposium on Applied Computing, 1963-1969, 2010
1162010
DIDMA: A distributed intrusion detection system using mobile agents
P Kannadiga, M Zulkernine
Sixth International Conference on Software Engineering, Artificial …, 2005
1102005
Security metrics for source code structures
I Chowdhury, B Chan, M Zulkernine
Proceedings of the fourth international workshop on Software engineering for …, 2008
1042008
Trustworthiness testing of phishing websites: A behavior model-based approach
H Shahriar, M Zulkernine
Future Generation Computer Systems 28 (8), 1258-1271, 2012
932012
A server-side solution to cache-based side-channel attacks in the cloud
M Godfrey, M Zulkernine
2013 IEEE Sixth International Conference on Cloud Computing, 163-170, 2013
852013
Mutec: Mutation-based testing of cross site scripting
H Shahriar, M Zulkernine
2009 ICSE Workshop on Software Engineering for Secure Systems, 47-53, 2009
852009
CAT: a context-aware trust model for open and dynamic systems
MG Uddin, M Zulkernine, SI Ahamed
Proceedings of the 2008 ACM symposium on Applied computing, 2024-2029, 2008
832008
An anomaly intrusion detection method using the CSI-KNN algorithm
L Kuang, M Zulkernine
Proceedings of the 2008 ACM symposium on Applied computing, 921-926, 2008
802008
The system can't perform the operation now. Try again later.
Articles 1–20