A wireless intrusion detection system for 802.11 networks Z Afzal, J Rossebø, B Talha, M Chowdhury 2016 international conference on wireless communications, signal processing …, 2016 | 16 | 2016 |
Mapping cyber threat intelligence to probabilistic attack graphs A Gylling, M Ekstedt, Z Afzal, P Eliasson 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 14 | 2021 |
Yet another cybersecurity risk assessment framework M Ekstedt, Z Afzal, P Mukherjee, S Hacks, R Lagerström International Journal of Information Security 22 (6), 1713-1729, 2023 | 7 | 2023 |
Multipath TCP IDS evasion and mitigation Z Afzal, S Lindskog Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 6 | 2015 |
Ids rule management made easy Z Afzal, S Lindskog 2016 8th International Conference on Electronics, Computers and Artificial …, 2016 | 5 | 2016 |
Automated testing of IDS rules Z Afzal, S Lindskog 2015 IEEE Eighth International Conference on Software Testing, Verification …, 2015 | 5 | 2015 |
Slice distance: an insert-only levenshtein distance with a focus on security applications Z Afzal, J Garcia, S Lindskog, A Brunstrom 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 4 | 2018 |
Threat scenarios and monitoring requirements for cyber-physical systems of energy flexibility markets N Müller, Z Afzal, P Eliasson, M Ekstedt, K Heussen arXiv preprint arXiv:2111.03300, 2021 | 2 | 2021 |
Using features of encrypted network traffic to detect malware Z Afzal, A Brunstrom, S Lindskog Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021 | 2 | 2021 |
Towards Secure Multipath TCP Communication Z Afzal Karlstads universitet, 2017 | 2 | 2017 |
Towards multipath TCP aware security technologies Z Afzal, S Lindskog, A Brunstrom, A Liden 2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016 | 2 | 2016 |
Development and Validation of Corelang: A Threat Modeling Language for the ICT Domain S Katsikeas, A Buhaiu, M Ekstedt, Z Afzal, S Hacks, P Mukherjee Computers & Security, 2024 | 1 | 2024 |
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Flexibility Markets N Müller, K Heussen, Z Afzal, M Ekstedt, P Eliasson 2022 IEEE PES Generation, Transmission and Distribution Conference and …, 2022 | 1 | 2022 |
Development and implementation of a holistic flexibility market architecture O Kraft, O Pohl, U Häger, K Heussen, N Müller, Z Afzal, M Ekstedt, ... 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2022 | 1 | 2022 |
Using Partial Signatures in Intrusion Detection for Multipath TCP Z Afzal, J Garcia, S Lindskog, A Brunstrom Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark …, 2019 | 1 | 2019 |
A multipath TCP proxy Z Afzal, S Lindskog, A Lidén The 11th Swedish National Computer Networking Workshop (SNCNW), Karlstad …, 2015 | 1 | 2015 |
Life of a Security Middlebox: Challenges with Emerging Protocols and Technologies Z Afzal Karlstads universitet, 2020 | | 2020 |
Partial Signature Matching in an MPTCP World using Insert-only Levenshtein Distance Z Afzal, J Garcia, S Lindskog | | 2017 |
Development and Evaluation of a Wireless Intrusion Detection System Z Afzal | | 2014 |