ÆÈ·Î¿ì
Zahid Anwar
Zahid Anwar
ndsu.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing ¡¦, 2005
2502005
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges
U Shaukat, E Ahmed, Z Anwar, F Xia
Journal of Network and Computer Applications 62, 18-40, 2016
1472016
Data-driven analytics for cyber-threat intelligence and information sharing
S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu
Computers & Security 67, 35-58, 2017
1282017
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
U Noor, Z Anwar, T Amjad, KKR Choo
Future Generation Computer Systems 96, 227-242, 2019
1212019
Semantic security against web application attacks
A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
992014
Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks
RU Rasool, U Ashraf, K Ahmed, H Wang, W Rafique, Z Anwar
IEEE Access 7, 34885-34899, 2019
952019
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE conference on communications and network security (CNS), 180-188, 2016
942016
Ontology for attack detection: An intelligent approach to web application security
A Razzaq, Z Anwar, HF Ahmad, K Latif, F Munir
computers & security 45, 124-146, 2014
932014
RRW—A robust and reversible watermarking technique for relational data
S Iftikhar, M Kamran, Z Anwar
IEEE Transactions on knowledge and data engineering 27 (4), 1132-1145, 2014
882014
Digital forensics for eucalyptus
F Anwar, Z Anwar
2011 Frontiers of Information Technology, 110-116, 2011
882011
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things
M Mohsin, MU Sardar, O Hasan, Z Anwar
IEEE Access 5, 5494-5505, 2017
692017
EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments
M Masood, Z Anwar, SA Raza, MA Hur
INMIC, 37-42, 2013
622013
Design and deployment of a trusted eucalyptus cloud
I Khan, H Rehman, Z Anwar
2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011
542011
A machine learning framework for investigating data breaches based on semantic analysis of adversary¡¯s attack patterns in threat intelligence repositories
U Noor, Z Anwar, AW Malik, S Khan, S Saleem
Future Generation Computer Systems 95, 467-487, 2019
532019
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations
M Mohsin, Z Anwar, F Zaman, E Al-Shaer
Computers & Security 70, 199-223, 2017
482017
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference ¡¦, 2006
462006
Real-time 3d video compression for tele-immersive environments
Z Yang, Y Cui, Z Anwar, R Bocchino, N Kiyanclar, K Nahrstedt, ...
Multimedia Computing and Networking 2006 6071, 12-23, 2006
452006
Can a DDoS attack meltdown my data center? A simulation study and defense strategies
Z Anwar, AW Malik
IEEE Communications Letters 18 (7), 1175-1178, 2014
362014
Automatic security assessment of critical cyber-infrastructures
Z Anwar, R Shankesi, RH Campbell
2008 IEEE International Conference on Dependable Systems and Networks With ¡¦, 2008
362008
Leveraging social-network infrastructure to improve peer-to-peer overlay performance: Results from orkut
Z Anwar, W Yurcik, V Pandey, A Shankar, I Gupta, RH Campbell
Arxiv preprint cs/0509095, 2005
352005
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20