Mohammad Zulkernine
#175,708
Most Influential Person Now
Canadian computer scientist
Mohammad Zulkernine's AcademicInfluence.com Rankings
Mohammad Zulkerninecomputer-science Degrees
Computer Science
#10882
World Rank
#11473
Historical Rank
Database
#7872
World Rank
#8194
Historical Rank

Download Badge
Computer Science
Mohammad Zulkernine's Degrees
- PhD Computer Science Queen's University at Kingston
- Masters Computer Science Queen's University at Kingston
- Bachelors Computer Science Bangladesh University of Engineering and Technology
Similar Degrees You Can Earn
Why Is Mohammad Zulkernine Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mohammad Zulkernine is a Canadian computer scientist, currently a Canada Research Chair at Queen's University.
Mohammad Zulkernine's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Random-Forests-Based Network Intrusion Detection Systems (2008) (428)
- Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities (2011) (253)
- Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection (2006) (245)
- A Neural Network Based System for Intrusion Detection and Classification of Attacks (2004) (200)
- A software implementation of a genetic algorithm based approach to network intrusion detection (2005) (198)
- A hybrid network intrusion detection technique using random forests (2006) (188)
- A Survey of Security Attacks in Information-Centric Networking (2015) (161)
- Mitigating program security vulnerabilities: Approaches and challenges (2012) (106)
- DIDMA: a distributed intrusion detection system using mobile agents (2005) (99)
- Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? (2010) (93)
- Network Intrusion Detection using Random Forests (2005) (92)
- MUSIC: Mutation-based SQL Injection Vulnerability Checking (2008) (87)
- Security metrics for source code structures (2008) (84)
- Preventing Cache-Based Side-Channel Attacks in a Cloud Environment (2014) (82)
- A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud (2013) (71)
- CAT: a context-aware trust model for open and dynamic systems (2008) (68)
- MUTEC: Mutation-based testing of Cross Site Scripting (2009) (65)
- Trustworthiness testing of phishing websites: A behavior model-based approach (2012) (65)
- An anomaly intrusion detection method using the CSI-KNN algorithm (2008) (61)
- UMLintr: a UML profile for specifying intrusions (2006) (56)
- Client-Side Detection of Cross-Site Request Forgery Attacks (2010) (53)
- S2XS2: A Server Side Approach to Automatically Detect XSS Attacks (2011) (51)
- Information-Theoretic Detection of SQL Injection Attacks (2012) (49)
- Routeguard: an intrusion detection and response system for mobile ad hoc networks (2005) (49)
- Attacks and Defenses in Short-Range Wireless Technologies for IoT (2020) (48)
- On Failure Propagation in Component-Based Software Systems (2008) (44)
- FPGuard: Detection and Prevention of Browser Fingerprinting (2015) (42)
- Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults (2016) (40)
- Mutation-Based Testing of Buffer Overflow Vulnerabilities (2008) (38)
- Detecting Flooding-Based DDoS Attacks (2007) (37)
- Injecting Comments to Detect JavaScript Code Injection Attacks (2011) (37)
- Automatic Testing of Program Security Vulnerabilities (2009) (34)
- Quantifying Security in Secure Software Development Phases (2008) (34)
- Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection (2006) (33)
- On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software (2009) (31)
- Server Side Detection of Content Sniffing Attacks (2011) (30)
- PhishTester: Automatic Testing of Phishing Attacks (2010) (30)
- A Distributed Defense Framework for Flooding-Based DDoS Attacks (2008) (30)
- A model-based aspect-oriented framework for building intrusion-aware software systems (2009) (30)
- Intrusion detection aware component-based systems: A specification-based framework (2007) (29)
- A compositional approach to monitoring distributed systems (2002) (27)
- A Natural Classification Scheme for Software Security Patterns (2011) (26)
- Mutation-Based Testing of Format String Bugs (2008) (26)
- Taxonomy and classification of automatic monitoring of program security vulnerability exploitations (2011) (26)
- A Comparative Study of Software Security Pattern Classifications (2012) (25)
- Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles (2019) (23)
- Effective detection of vulnerable and malicious browser extensions (2014) (23)
- UMLtrust: towards developing trust-aware software (2008) (22)
- Improving Reliability and Safety by Trading off Software Failure Criticalities (2007) (22)
- Bad-token: denial of service attacks on WPA3 (2019) (22)
- CRAWDAD dataset queensu/crowd_temperature (v.2015-11-20) (2015) (21)
- Towards an intrusion detection system for pervasive computing environments (2005) (20)
- Offering security diagnosis as a service for cloud SaaS applications (2019) (19)
- Classification of Static Analysis-Based Buffer Overflow Detectors (2010) (19)
- A Reliability-Based Resource Allocation Approach for Cloud Computing (2017) (19)
- Securing Vehicle ECU Communications and Stored Data (2019) (19)
- A Reputation System to Evaluate Participants for Participatory Sensing (2016) (19)
- Protecting Web Browser Extensions from JavaScript Injection Attacks (2013) (19)
- An Empirical Evaluation of Web-Based Fingerprinting (2015) (17)
- Software Security Engineering: Towards Unifying Software Engineering and Security Engineering (2009) (17)
- A dependable device discovery approach for pervasive computing middleware (2006) (17)
- Towards defending connected vehicles against attacks (2017) (17)
- TRUST-CAP: A Trust Model for Cloud-Based Applications (2017) (17)
- Detecting DNS Tunneling Using Ensemble Learning (2017) (17)
- An Intrusion-Tolerant Mechanism for Intrusion Detection Systems (2008) (16)
- DACPI: A decentralized access control protocol for information centric networking (2016) (16)
- Towards automatic monitoring of component-based software systems (2005) (16)
- Protecting Internet users from becoming victimized attackers of click‐fraud (2018) (15)
- Attacks in Public Clouds: Can They Hinder the Rise of the Cloud? (2014) (15)
- AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification (2007) (15)
- EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages (2013) (14)
- A Survey on Requirements and Design Methods for Secure Software Development (2009) (14)
- PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction (2020) (14)
- FCFraud: Fighting Click-Fraud from the User Side (2016) (14)
- A Trust Framework for Pervasive Computing Environments (2006) (13)
- Failure Type-Aware Reliability Assessment with Component Failure Dependency (2010) (13)
- Detecting intrusions specified in a software specification language (2005) (13)
- Using Artificial Intelligence in Intrusion Detection Systems (2007) (13)
- Towards Model-Based Automatic Testing of Attack Scenarios (2009) (12)
- T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT (2021) (12)
- Integrating software specifications into intrusion detection (2007) (12)
- Assume-guarantee supervisor for concurrent systems (2001) (12)
- Activity and Artifact Views of a Secure Software Development Process (2009) (12)
- Information Source-Based Classification of Automatic Phishing Website Detectors (2011) (11)
- Monitoring Buffer Overflow Attacks: A Perennial Task (2010) (11)
- Anti-pattern Mutations and Fault-proneness (2014) (11)
- Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications (2013) (11)
- A Model-Based Detection of Vulnerable and Malicious Browser Extensions (2013) (11)
- Towards developing sensor networks monitoring as a middleware service (2004) (11)
- Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game (2021) (11)
- SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android (2018) (11)
- A Constraint-based intrusion detection system (2017) (10)
- CSKES: A Context-Based Secure Keyless Entry System (2019) (10)
- An Automatic Software Vulnerability Classification Framework (2017) (10)
- Bridging the gap: software specification meets intrusion detector (2006) (10)
- WPA3 Connection Deprivation Attacks (2019) (10)
- Exploiting Race Condition for Wi-Fi Denial of Service Attacks (2020) (10)
- Security Vulnerability Metrics for Connected Vehicles (2019) (10)
- CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud (2015) (10)
- Towards a Security Architecture for Protecting Connected Vehicles from Malware (2019) (10)
- A taxonomy of software architecture-based reliability efforts (2010) (9)
- Preventing unauthorized access in information centric networking (2018) (9)
- RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware (2021) (9)
- IFCaaS: Information Flow Control as a Service for Cloud Security (2016) (9)
- Towards Security Monitoring for Cloud Analytic Applications (2018) (9)
- Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems (2021) (9)
- Mutation Testing of Event Processing Queries (2012) (8)
- The Power of Temporal Pattern Processing in Anomaly Intrusion Detection (2007) (8)
- Runtime Prediction of Failure Modes from System Error Logs (2013) (8)
- SAM: A secure anti-malware framework for the smartphone operating systems (2016) (8)
- Collaboration through computation: incorporating trust model into service-based software systems (2009) (7)
- Defending Application Cache Integrity of Android Runtime (2017) (7)
- Towards Incorporating Discrete-Event Systems in Secure Software Development (2008) (7)
- At What Level of Granularity Should We be Componentizing for Software Reliability? (2008) (7)
- DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations (2012) (7)
- Building components with embedded security monitors (2011) (7)
- Packet Filtering Based on Source Router Marking and Hop-Count (2007) (7)
- DADI: Defending against distributed denial of service in information‐centric networking routing and caching (2018) (7)
- A Participant Contribution Trust Scheme for Crisis Response Systems (2017) (7)
- On evaluating and securing firefox for Android browser extensions (2014) (7)
- Bluetooth Low Energy Makes “Just Works” Not Work (2019) (7)
- Classification of Buffer Overflow Vulnerability Monitors (2010) (7)
- Security Pattern Detection Using Ordered Matrix Matching (2017) (6)
- Connection Dumping Vulnerability Affecting Bluetooth Availability (2018) (6)
- Intrusion detection in a private network by satisfying constraints (2016) (6)
- Detection and Prevention of Malicious Requests in ICN Routing and Caching (2015) (6)
- Architectural Design Decisions for Achieving Reliable Software Systems (2010) (6)
- Towards Secure Trust Bootstrapping in Pervasive Computing Environment (2008) (6)
- Countermeasures for Mitigating ICN Routing Related DDoS Attacks (2014) (5)
- Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT (2021) (5)
- A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor (2011) (5)
- A security pattern detection framework for building more secure software (2021) (5)
- Assessing Test Suites for Buffer Overflow Vulnerabilities (2010) (5)
- Classification of participatory sensing privacy schemes (2014) (5)
- E-NIPS: An Event-Based Network Intrusion Prediction System (2007) (5)
- Analysing vulnerability reproducibility for Firefox browser (2016) (5)
- A secure architecture for TCP/UDP-based cloud communications (2020) (5)
- A Control Flow Representation for Component-Based Software Reliability Analysis (2012) (5)
- Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts (2017) (4)
- CREM: A Cloud Reliability Evaluation Model (2018) (4)
- Multi-layer stacking ensemble learners for low footprint network intrusion detection (2022) (4)
- Cloud-based Sybil Attack Detection Scheme for Connected Vehicles (2019) (4)
- A Hybrid Monitoring of Software Design-Level Security Specifications (2014) (4)
- A Classification of Intrusion Detection Systems in the Cloud (2015) (4)
- Vehicle Software Engineering (VSE): Research and Practice (2020) (4)
- A classification of attacks to In-Vehicle Components (IVCs) (2020) (4)
- Towards an Aspect-Oriented Intrusion Detection Framework (2007) (4)
- CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions (2016) (4)
- Reinforcement Learning-driven Attack on Road Traffic Signal Controllers (2021) (3)
- Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game (2019) (3)
- ATM: an automatic trust monitoring algorithm for service software (2009) (3)
- Securing Web Applications with Secure Coding Practices and Integrity Verification (2018) (3)
- A software-based trust framework for distributed industrial management systems (2007) (3)
- TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks (2014) (3)
- A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems (2020) (3)
- Secure Method Calls by Instrumenting Bytecode with Aspects (2009) (3)
- OSDC: adapting ODC for developing more secure software (2013) (3)
- Towards developing a trust-based security solution (2009) (3)
- A Taxonomy of Security as a Service (2018) (3)
- Assume-Guarantee Algorithms for Automatic Detection of Software Failures (2002) (3)
- Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3 (2021) (2)
- Towards a ranking framework for software components (2013) (2)
- A Dynamic App Anti-Debugging Approach on Android ART Runtime (2018) (2)
- ACIR: An Aspect-Connector for Intrusion Response (2007) (2)
- Security Features for Proximity Verification (2019) (2)
- Flamingo: a framework for smartphone security context management (2017) (2)
- OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation (2022) (2)
- Graphene: A Secure Cloud Communication Architecture (2019) (2)
- A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus (2022) (2)
- A Connection-Based Signature Approach for Control Flow Error Detection (2011) (2)
- LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network (2020) (2)
- A Trust Monitoring Architecture for Service-Based Software (2009) (2)
- Architecture and Implementation of a trust Model for Pervasive Applications (2008) (2)
- Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation (2020) (2)
- A Comparative Study on the Reliability Eorts in Component-Based Software Systems (2009) (2)
- Zonedroid: control your droid through application zoning (2016) (2)
- Mitigating and Monitoring Program Security Vulnerabilities 1 (2010) (1)
- Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems (2021) (1)
- Software control flow error detection and correlation with system performance deviation (2014) (1)
- AVSDA: Autonomous Vehicle Security Decay Assessment (2021) (1)
- AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles (2022) (1)
- Integrating Security in Cloud Application Development Cycle (2018) (1)
- An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques (2018) (1)
- A coalitional security game against data integrity attacks in autonomous vehicle networks (2022) (1)
- More Lessons: Analysis of PUF-based Authentication Protocols for IoT (2021) (1)
- A Context-Aware Privacy Scheme for Crisis Situations (2018) (1)
- CamoDroid: An Android application analysis environment resilient against sandbox evasion (2022) (1)
- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs (2020) (1)
- HBD-Authority: Streaming Access Control Model for Hadoop (2020) (1)
- Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory (2022) (1)
- Panel on Safety, Security, and Reliability of Autonomous Vehicles (2020) (1)
- Optimizing Virtual Machine Migration in Multi-Clouds (2020) (1)
- D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions (2023) (1)
- Mining Attribute-Based Access Control Policies (2022) (1)
- AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency (2022) (1)
- Chairs of Workshops Co-Located with QRS 2020 (2018) (0)
- Workshop Program Committee ASSD 2015 (2015) (0)
- Special issue on "Trustworthy Software Systems for the Digital Society" (2014) (0)
- Software Assurance: What Should We Do Next? (2013) (0)
- A secure architecture for TCP/UDP-based cloud communications (2020) (0)
- STPSA 2008 Workshop Organization (2008) (0)
- Message from the STPSA 2018 Workshop Organizers (2018) (0)
- Detecting Intrusions in Communication-Based Train Control Systems (2022) (0)
- Towards a Secure Software Lifecycle for Autonomous Vehicles (2021) (0)
- Quality software for quality service (QS4QS) (2013) (0)
- Towards a compositional approach for automatic monitoring of software systems (2003) (0)
- A Security Framework for ICN Traffic Management (2018) (0)
- Reliability-based Formation of Cloud Federations Using Game Theory (2020) (0)
- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure (2022) (0)
- Quantifying Safety in Software Architectural Designs (2009) (0)
- Message from the SEPT Organizing Committee (2016) (0)
- Security, Privacy, and Trust for Pervasive Computing Applications (2008) (0)
- SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments (2022) (0)
- A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments (2022) (0)
- Guest Editorial: Special section on software reliability and security (2012) (0)
- Guest Editorial (2012) (0)
- JaCaL : an implementation of Linda in Java (1999) (0)
- Proceedings of the 2005 International Conference on Programming Languages and Compilers, PLC'05: Foreword (2005) (0)
- STPSA 2019 Welcome Message (2019) (0)
- Special issue on High Assurance Systems Engineering (2016) (0)
- DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles (2021) (0)
- AIM: An Android Interpretable Malware detector based on application class modeling (2023) (0)
- Message from SEPT 2017 Organizing Committee (2017) (0)
- Message from the STPSA 2008 Workshop Organizers (2008) (0)
- Message from HUMA Symposium Organizing Committee (2015) (0)
- SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET (2022) (0)
- Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications (2022) (0)
- Security Pattern Detection Through Diagonally Distributed Matrix Matching (2022) (0)
- Message from SEPT Symposium Organizing Committee (2015) (0)
- The Level of Decomposition Impact on Component Fault Tolerance (2010) (0)
- Mitigating and Monitoring Program Security Vulnerabilities 1 Technical Report No . 2010-572 (2010) (0)
- Message from the Standing Committee Vice Chairs (2022) (0)
- Message from STPSA 2016 Workshop Organizers (2016) (0)
- SAS-GKE: A Secure Authenticated Scalable Group Key Exchange (2022) (0)
- Special issue on High Assurance Systems Engineering (2016) (0)
- Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults (2015) (0)
- SSIRI 2011 Organizing Committee Conference Chair (2011) (0)
- Security Monitoring of Components Using Aspects and Contracts in Wrappers (2011) (0)
- FRanC: A Ranking Framework for the Prioritization of Software Maintenance (2014) (0)
- Policy Modeling and Anomaly Detection in ABAC Policies (2021) (0)
- COMPSAC 2015 Symposium on Security, Privacy and Trust in Computing (SEPT) Message from SEPT Organizing Committee (2015) (0)
This paper list is powered by the following services:
Other Resources About Mohammad Zulkernine
What Schools Are Affiliated With Mohammad Zulkernine?
Mohammad Zulkernine is affiliated with the following schools: