Syed Ali Khayam
Syed Ali Khayam
Amazon Web Services
Geverifieerd e-mailadres voor seecs.edu.pk
Geciteerd door
Geciteerd door
The discrete cosine transform (DCT): theory and application
SA Khayam
Michigan State University 114 (1), 31, 2003
Revisiting traffic anomaly detection using software defined networking
SA Mehdi, J Khalid, SA Khayam
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan, AA Syed, SA Khayam
IEEE communications surveys & tutorials 16 (2), 898-924, 2013
Keystroke-based user identification on smart phones
S Zahid, M Shahzad, SA Khayam, M Farooq
International Workshop on Recent advances in intrusion detection, 224-243, 2009
Embedded Malware Detection Using Markov n-Grams
MZ Shafiq, SA Khayam, M Farooq
International conference on detection of intrusions and malware, and …, 2008
Performance analysis and modeling of errors and losses over 802.11 b LANs for high-bit-rate real-time multimedia
SA Khayam, S Karande, H Radha, D Loguinov
Signal Processing: Image Communication 18 (7), 575-595, 2003
Markov-based modeling of wireless local area networks
SA Khayam, H Radha
Proceedings of the 6th ACM international workshop on Modeling analysis and …, 2003
Breaking e-banking CAPTCHAs
S Li, SAH Shah, MAU Khan, SA Khayam, AR Sadeghi, R Schmitz
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Energy efficient video compression for wireless sensor networks
JJ Ahmad, HA Khan, SA Khayam
2009 43rd Annual Conference on Information Sciences and Systems, 629-634, 2009
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks
S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan
Journal of Network and Computer Applications 35 (2), 597-605, 2012
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
Method and system for adaptive anomaly-based intrusion detection
SA Khayam, MQ Ali
US Patent 8,800,036, 2014
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
A look at the consequences of Internet censorship through an ISP lens
S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
A topologically-aware worm propagation model for wireless sensor networks
SA Khayam, H Radha
25th IEEE international conference on distributed computing systems …, 2005
Using signal processing techniques to model worm propagation over wireless sensor networks
SA Khayam, H Radha
IEEE Signal Processing Magazine 23 (2), 164-169, 2006
Analyzing the spread of active worms over VANET
SA Khayam, H Radha
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks
SA Khayam, S Karande, M Krappel, H Radha
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks
HK Qureshi, S Rizvi, M Saleem, SA Khayam, V Rakocevic, M Rajarajan
Computer Communications 34 (10), 1235-1242, 2011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20