A support vector machine-based framework for detection of covert timing channels PL Shrestha, M Hempel, F Rezaei, H Sharif IEEE Transactions on Dependable and Secure Computing 13 (2), 274-283, 2015 | 87 | 2015 |
Assurance of energy efficiency and data security for ECG transmission in BASNs T Ma, PL Shrestha, M Hempel, D Peng, H Sharif, HH Chen IEEE Transactions on Biomedical Engineering 59 (4), 1041-1048, 2012 | 70 | 2012 |
A study on energy efficient multi-tier multi-hop wireless sensor networks for freight-train monitoring P Mahasukhon, H Sharif, M Hempel, T Zhou, T Ma, PL Shrestha 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 37 | 2011 |
Leveraging statistical feature points for generalized detection of covert timing channels PL Shrestha, M Hempel, F Rezaei, H Sharif 2014 IEEE Military Communications Conference, 7-11, 2014 | 25 | 2014 |
Modeling latency and reliability of hybrid technology networking PL Shrestha, M Hempel, H Sharif, HH Chen IEEE Sensors Journal 13 (10), 3616-3624, 2013 | 21 | 2013 |
Achieving robustness and capacity gains in covert timing channels F Rezaei, M Hempel, PL Shrestha, H Sharif 2014 IEEE International Conference on Communications (ICC), 969-974, 2014 | 19 | 2014 |
Multi-tier multi-hop routing in large-scale wireless sensor networks for real-time monitoring P Mahasukhon, H Sharif, M Hempel, T Zhou, T Ma, PL Shrestha SENSORS, 2010 IEEE, 678-681, 2010 | 17 | 2010 |
Detecting covert timing channels using non-parametric statistical approaches F Rezaei, M Hempel, PL Shrestha, SM Rakshit, H Sharif 2015 International Wireless Communications and Mobile Computing Conference …, 2015 | 16 | 2015 |
Performance analysis for direction of arrival estimating algorithms PL Shrestha, M Hempel, P Mahasukhon, T Ma, H Sharif 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012 | 15 | 2012 |
An event-based unified system model to characterize and evaluate timing covert channels PL Shrestha, M Hempel, H Sharif, HH Chen IEEE Systems Journal 10 (1), 271-280, 2014 | 14 | 2014 |
A general attack method for steganography removal using pseudo-cfa re-interpolation PL Shrestha, M Hempel, T Ma, D Peng, H Sharif 2011 International Conference for Internet Technology and Secured …, 2011 | 11 | 2011 |
Evaluation and verification of automated covert channel modeling using a real network platform F Rezaei, M Hempel, PL Shrestha, H Sharif 2014 IEEE Military Communications Conference, 12-17, 2014 | 9 | 2014 |
Towards a unified model for the analysis of timing-based covert channels PL Shrestha, M Hempel, H Sharif 2014 IEEE International Conference on Communications (ICC), 816-820, 2014 | 9 | 2014 |
Performance evaluation of hybrid technology networking for real-time monitoring in freight railroad operations PL Shrestha, M Hempel, S Rakshit, H Sharif, J Punwani, M Stewart ASME/IEEE Joint Rail Conference 55300, V001T03A007, 2013 | 8 | 2013 |
Performance modeling of a multi-tier multi-hop hybrid sensor network protocol PL Shrestha, M Hempel, Y Qian, H Sharif, J Punwani, M Stewart 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2345-2350, 2013 | 8 | 2013 |
A quality-preserving hidden information removal approach for digital images F Rezaei, M Hempel, PL Shrestha, T Ma, D Peng, H Sharif 2012 IEEE International Conference on Communications (ICC), 1021-1025, 2012 | 7 | 2012 |
Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms T Ma, P Shrestha, M Hempel, D Peng, H Sharif 2011 18th IEEE International Conference on Image Processing, 297-300, 2011 | 7 | 2011 |
Modeling packet rate covert timing channels PL Shrestha, M Hempel, M Alahmad, H Sharif 2013 9th International Conference on Innovations in Information Technology …, 2013 | 6 | 2013 |
A novel analytical model and its test bed verification for network covert timing channels PL Shrestha, M Hempel, F Rezaei, H Sharif 2015 IEEE Conference on Communications and Network Security (CNS), 227-235, 2015 | 5 | 2015 |
A novel Covert Timing Channel detection approach for online network traffic F Rezaei, M Hempel, PL Shrestha, SM Rakshit, H Sharif 2015 IEEE Conference on Communications and Network Security (CNS), 737-738, 2015 | 5 | 2015 |