Mitigating program security vulnerabilities: Approaches and challenges H Shahriar, M Zulkernine ACM Computing Surveys (CSUR) 44 (3), 1-46, 2012 | 165 | 2012 |
MUSIC: Mutation-based SQL injection vulnerability checking H Shahriar, M Zulkernine 2008 The Eighth International Conference on Quality Software, 77-86, 2008 | 118 | 2008 |
Trustworthiness testing of phishing websites: A behavior model-based approach H Shahriar, M Zulkernine Future Generation Computer Systems 28 (8), 1258-1271, 2012 | 95 | 2012 |
Web Application Firewall: Network Security Models and Configuration V Clincy, H Shahriar 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 91 | 2018 |
Improving the prediction accuracy of decision tree mining with data preprocessing P Chandrasekar, K Qian, H Shahriar, P Bhattacharya 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 86 | 2017 |
Mutec: Mutation-based testing of cross site scripting H Shahriar, M Zulkernine 2009 ICSE Workshop on Software Engineering for Secure Systems, 47-53, 2009 | 85 | 2009 |
Malware Detection and Prevention using Artificial Intelligence Techniques MJH Faruk, H Shahriar, M Valero, FL Barsha, S Sobhan, MA Khan, ... 2021 IEEE International Conference on Big Data (Big Data), 5369-5377, 2021 | 83 | 2021 |
Client-side detection of cross-site request forgery attacks H Shahriar, M Zulkernine 2010 IEEE 21st International Symposium on Software Reliability Engineering …, 2010 | 76 | 2010 |
Wi-COVID: A COVID-19 symptom detection and patient monitoring framework using WiFi F Li, M Valero, H Shahriar, RA Khan, SI Ahamed Smart Health 19, 100147, 2021 | 70 | 2021 |
S2XS2: a server side approach to automatically detect XSS attacks H Shahriar, M Zulkernine 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011 | 70 | 2011 |
Ransomware classification and detection with machine learning algorithms M Masum, MJH Faruk, H Shahriar, K Qian, D Lo, MI Adnan 2022 IEEE 12th Annual Computing and Communication Workshop and Conference …, 2022 | 67 | 2022 |
Information-theoretic detection of sql injection attacks H Shahriar, M Zulkernine 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012 | 65 | 2012 |
Mobile phishing attacks and mitigation techniques H Shahriar, T Klintic, V Clincy Journal of Information Security 6 (03), 206, 2015 | 63 | 2015 |
A comparative study of email forensic tools VK Devendran, H Shahriar, V Clincy Journal of Information Security 6 (2), 111, 2015 | 63 | 2015 |
Mutation-based testing of buffer overflow vulnerabilities H Shahriar, M Zulkernine 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 55 | 2008 |
Server side detection of content sniffing attacks A Barua, H Shahriar, M Zulkernine 2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011 | 52 | 2011 |
Testing of memory leak in android applications H Shahriar, S North, E Mawangi 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering …, 2014 | 50 | 2014 |
A literature review on blockchain-enabled security and operation of cyber-physical systems AA Khalil, J Franco, I Parvez, S Uluagac, H Shahriar, MA Rahman 2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022 | 44 | 2022 |
Classification of static analysis-based buffer overflow detectors H Shahriar, M Zulkernine 2010 Fourth International Conference on Secure Software Integration and …, 2010 | 44 | 2010 |
Automatic testing of program security vulnerabilities H Shahriar, M Zulkernine 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 44 | 2009 |