The discrete cosine transform (DCT): theory and application SA Khayam Michigan State University 114 (1), 31, 2003 | 566 | 2003 |
Revisiting traffic anomaly detection using software defined networking SA Mehdi, J Khalid, SA Khayam Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 524 | 2011 |
A taxonomy of botnet behavior, detection, and defense S Khattak, NR Ramay, KR Khan, AA Syed, SA Khayam IEEE communications surveys & tutorials 16 (2), 898-924, 2013 | 263 | 2013 |
Keystroke-based user identification on smart phones S Zahid, M Shahzad, SA Khayam, M Farooq International Workshop on Recent advances in intrusion detection, 224-243, 2009 | 178 | 2009 |
Embedded Malware Detection Using Markov n-Grams MZ Shafiq, SA Khayam, M Farooq International conference on detection of intrusions and malware, and …, 2008 | 152 | 2008 |
Performance analysis and modeling of errors and losses over 802.11 b LANs for high-bit-rate real-time multimedia SA Khayam, S Karande, H Radha, D Loguinov Signal Processing: Image Communication 18 (7), 575-595, 2003 | 112 | 2003 |
Markov-based modeling of wireless local area networks SA Khayam, H Radha Proceedings of the 6th ACM international workshop on Modeling analysis and …, 2003 | 106 | 2003 |
Breaking e-banking CAPTCHAs S Li, SAH Shah, MAU Khan, SA Khayam, AR Sadeghi, R Schmitz Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 91 | 2010 |
Energy efficient video compression for wireless sensor networks JJ Ahmad, HA Khan, SA Khayam 2009 43rd Annual Conference on Information Sciences and Systems, 629-634, 2009 | 89 | 2009 |
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan Journal of Network and Computer Applications 35 (2), 597-605, 2012 | 84 | 2012 |
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ... 2012 European Workshop on Software Defined Networking, 79-84, 2012 | 65 | 2012 |
Method and system for adaptive anomaly-based intrusion detection SA Khayam, MQ Ali US Patent 8,800,036, 2014 | 59 | 2014 |
A comparative evaluation of anomaly detectors under portscan attacks AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 59 | 2008 |
Designing a cluster-based covert channel to evade disk investigation and forensics H Khan, M Javed, SA Khayam, F Mirza Computers & Security 30 (1), 35-49, 2011 | 56 | 2011 |
A topologically-aware worm propagation model for wireless sensor networks SA Khayam, H Radha 25th IEEE international conference on distributed computing systems …, 2005 | 56 | 2005 |
A look at the consequences of Internet censorship through an ISP lens S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014 | 53 | 2014 |
Analyzing the spread of active worms over VANET SA Khayam, H Radha Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004 | 50 | 2004 |
Using signal processing techniques to model worm propagation over wireless sensor networks SA Khayam, H Radha IEEE Signal Processing Magazine 23 (2), 164-169, 2006 | 49 | 2006 |
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks SA Khayam, S Karande, M Krappel, H Radha 2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003 | 48 | 2003 |
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks HK Qureshi, S Rizvi, M Saleem, SA Khayam, V Rakocevic, M Rajarajan Computer Communications 34 (10), 1235-1242, 2011 | 43 | 2011 |