Muhammad Shahzad

Works (41)

Updated: April 5th, 2024 09:24

2023 journal article

Enhanced Machine Learning Sketches for Network Measurements

IEEE TRANSACTIONS ON COMPUTERS, 72(4), 957–970.

author keywords: Machine learning; Measurement; Machine learning algorithms; Hash functions; Frequency modulation; Estimation; Recording; Network measurements; sketch; machine learning
TL;DR: This work proposes the idea of using machine learning to improve the accuracy of sketches, and proposes a generic machine learning framework to reduce the dependence of accuracy of sketching techniques on network traffic characteristics. (via Semantic Scholar)
Source: Web Of Science
Added: April 4, 2023

2023 journal article

Using RF Signals to Generate Indoor Maps

ACM TRANSACTIONS ON SENSOR NETWORKS, 19(1).

By: U. Khan n, R. Venkatnarayan n & M. Shahzad n

author keywords: RF maps; radar; through wall mapping; indoor mapping
TL;DR: This article proposes RFMap, which generates fully connected maps, and does not require the measurement setup to be moved along the sides of the buildings, and trains a deep generative adversarial network (GAN) to intelligently predict the missing information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Source: Web Of Science
Added: April 11, 2023

2022 article

A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks

A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks. 2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022).

By: P. Adina n & M. Shahzad n

TL;DR: NLSec is presented, a fully distributed and lightweight framework that can detect arbitrary network layer (NL) attacks in any given IoTN, localize (i.e., identify) the compromised nodes, and mitigate the attacks by isolating the compromised node automatically. (via Semantic Scholar)
Source: Web Of Science
Added: October 17, 2022

2022 article

Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants

Iqbal, H., Singh, A., & Shahzad, M. (2022, February 22). IEEE-ACM TRANSACTIONS ON NETWORKING.

By: H. Iqbal n, A. Singh n & M. Shahzad n

author keywords: Cloud computing; Packet loss; Service level agreements; Market research; Data centers; Band-pass filters; Time measurement; Cloud; tenants; availability; latency; AWS
TL;DR: A detailed network measurement study of the largest public cloud, Amazon Web Services (AWS), to characterize the availability and latency of AWS over a period of 100 days and presents several recommendations that tenants can use to better deploy their applications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: Web Of Science
Added: March 21, 2022

2022 journal article

Contactless Monitoring of PPG Using Radar

PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 6(3).

By: U. Khan n, L. Rigazio & M. Shahzad n

author keywords: Radar; PPG; Deep Learning; Vital Signs; Attention; Encoder Decoder Networks
TL;DR: Evaluations show that VitaNet accurately estimates the PPG waveform and its derivatives with high accuracy, significantly improves the heart rate and heart rate variability estimates from the prior works, and also accurately estimates several useful PPG features. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: December 19, 2022

2022 article

Estimating Soil Moisture using RF Signals

PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, pp. 242–254.

By: U. Khan n & M. Shahzad n

UN Sustainable Development Goal Categories
15. Life on Land (OpenAlex)
Source: Web Of Science
Added: December 4, 2023

2022 article

Left or Right: A Peek into the Political Biases in Email Spam Filtering Algorithms During US Election 2020

PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), pp. 2491–2500.

By: H. Iqbal n, U. Khan n, H. Khan n & M. Shahzad n

author keywords: US Elections; Emails; Spam; Bias; Political Bias; Algorithm Bias
TL;DR: It is observed that the SFAs of different email services indeed exhibit biases towards different political affiliations, and the impact of the interactions (such as reading or marking emails as spam) of email recipients on these biases is studied. (via Semantic Scholar)
Source: Web Of Science
Added: October 31, 2022

2022 article

RMS: Removing Barriers to Analyze the Availability and Surge Pricing of Ridesharing Services

PROCEEDINGS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI' 22).

By: H. Khan n, H. Iqbal n, M. Shahzad n & G. Jin n

author keywords: Ridesharing services; Gig economy; Uber; Surge; COVID 19
TL;DR: This paper identifies that previous articles miscalculated the utilization of ridesharing services as they did not count in the vehicles driving in multiple categories of the same service, and presents Ridesharing Measurement Suite (RMS), which removes the barrier of entry for analyzing the availability and surge pricing of ridesHaring services for ridesh sharing users, researchers from various scientific domains, and regulators. (via Semantic Scholar)
Source: Web Of Science
Added: May 1, 2023

2021 article

Accurately Decoding MIMO Streams in VLC

30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021).

By: R. Venkatnarayan n & M. Shahzad n

TL;DR: PCDM, a novel parallelogram - clustering based decoding method, which is fundamentally different from C MDM and achieves an order of magnitude lower bit error rate compared to CMDM is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2021 article

Characterizing the Performance of QUIC on Android and Wear OS Devices

30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021).

By: A. Ganji n & M. Shahzad n

TL;DR: A probabilistic framework is proposed, which is called Dynamic Transport Selection, that adaptively chooses the appropriate transport protocol for a given network environment that improves the overall request completion performance of the application by as much as 41.76% when compared to using either QUIC or TCP alone. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2021 journal article

Dissecting Cloud Gaming Performance with DECAF

PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 5(3).

By: H. Iqbal n, A. Khalid* & M. Shahzad n

author keywords: Cloud gaming; measurement; performance evaluation; deep learning; game bot; latency; streaming bitrate; network utilization
TL;DR: DECAF is implemented, a methodology to systematically analyze and dissect the performance of cloud gaming platforms across different game genres and game platforms, and finds that processing delays in the cloud comprise majority of the total round trip delay experienced by users. (via Semantic Scholar)
Source: Web Of Science
Added: August 15, 2022

2021 journal article

WiFi based Multi-User Gesture Recognition

IEEE TRANSACTIONS ON MOBILE COMPUTING, 20(3), 1242–1256.

By: R. Venkatnarayan n, S. Mahmood n & M. Shahzad n

author keywords: Wireless fidelity; Gesture recognition; Training; Performance evaluation; Wireless communication; Wireless sensor networks
TL;DR: The results show that WiMU recognizes 2, 3, 4, 5, 6, 7, and 8 simultaneously performed gestures with accuracies of 95.6, 94.9, 93.7, 91.0, and 90.1 percent, respectively. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 8, 2021

2020 article

A WiFi-based Home Security System

2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 129–137.

By: S. Zhang n, R. Venkatnarayan n & M. Shahzad n

TL;DR: A Wi Fi based security system that uses commodity WiFi devices, which most modern households already have, to perform the three primary tasks of typical home security systems, detected intrusions with over 95% accuracy and identified the exact door/window that moved with just 4.5% average error. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 9, 2021

2020 journal article

Bimodal affect recognition based on autoregressive hidden Markov models from physiological signals

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 195.

By: F. Akbulut n, H. Perros n & M. Shahzad n

author keywords: Affect recognition; Autoregressive hidden Markov models; Machine learning; Biosignals; Heart rate variability
MeSH headings : Electrocardiography; Emotions; Female; Happiness; Heart Rate; Humans; Male
TL;DR: A method to accurately recognize six emotions using ECG and EDA signals and applying autoregressive hidden Markov models (AR-HMMs) and heart rate variability analysis on these signals is presented. (via Semantic Scholar)
Source: Web Of Science
Added: October 12, 2020

2020 article

Characterizing the Impact of TCP Coexistence in Data Center Networks

2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 388–398.

By: A. Ganji n, A. Singh n & M. Shahzad n

TL;DR: An extensive set of experiments with coexisting TCP variants on Leaf-Spine and Fat-Tree switch fabrics results in a large set of network traces that have important implications in ensuring optimal utilization of data center switch fabric and in meeting the network performance needs of application layer workloads. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 26, 2021

2020 article

Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion

2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 220–228.

By: S. Boob n, S. Mahmood* & M. Shahzad n

TL;DR: A distributed and privacy preserving routing protocol, namely DPR, which the connected vehicles collaboratively and repeatedly execute to calculate fast routes to their destinations such that the overall congestion on the road network is significantly reduced and at the same time the privacy of the vehicles is preserved. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 9, 2021

2020 journal article

Large Scale Characterization of Software Vulnerability Life Cycles

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 17(4), 730–744.

By: M. Shahzad n, M. Shafiq* & A. Liu*

author keywords: Computer hacking; Data aggregation; Linux; Market research; Microsoft Windows; Vulnerability; disclosure; patch; exploit; diversity
TL;DR: An exploratory measurement study of a large software vulnerability data set containing 56077 vulnerabilities disclosed since 1988 till 2013 uncovers several statistically significant findings that have important implications for software development and deployment. (via Semantic Scholar)
Source: Web Of Science
Added: July 20, 2020

2020 article

RFMap: Generating Indoor Maps using RF Signals

2020 19TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN 2020), pp. 133–144.

By: U. Khan n, R. Venkatnarayan n & M. Shahzad n

author keywords: RF; Indoor Maps; Machine Learning; Wireless
TL;DR: This paper proposes RFMap, which generates fully connected maps, and does not require the measurement setup to be moved along the sides of the buildings, and trains deep generative adversarial network (GAN) to intelligently predict the missing information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Source: Web Of Science
Added: February 22, 2021

2020 journal article

SF-Sketch: A Two-Stage Sketch for Data Streams

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 31(10), 2263–2276.

By: L. Liu*, Y. Shen*, Y. Yan*, T. Yang*, M. Shahzad n, B. Cui*, G. Xie*

author keywords: Distributed databases; Monitoring; Bars; Frequency measurement; Registers; Fats; Hash functions; Network measurements; sketch; distributed monitoring; multiset; frequent items
TL;DR: The Slim-Fat (SF) sketch is proposed, a new sketch designed for gathering Internet statistics from distributed data streams in network measurements that outperforms the CM-sketch by up to 33.1 times in terms of accuracy. (via Semantic Scholar)
Source: Web Of Science
Added: June 15, 2020

2019 article

CSLIM: Automated Extraction of loT Functionalities from Legacy C Codebases

ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, pp. 421–426.

By: H. Sim*, A. Paul*, E. Tilevich*, A. Butt* & M. Shahzad n

author keywords: Software Engineering; IoT
TL;DR: This paper presents Cslim, a cross-package function extraction tool for C that extracts programmer-specified functions from a source package and generates new source files for a target package, thereby enabling the reuse of systems software in resource-poor execution environments, such as the IoT devices. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: September 23, 2019

2018 journal article

FID-sketch: an accurate sketch to store frequencies in data streams

World Wide Web, 22(6), 2675–2696.

author keywords: Sketch; Data streams; Accuracy; Speed; Measurement
TL;DR: This paper designs a new sketch, called FID-sketch, that has a significantly higher accuracy and a much smaller on-chip memory footprint compared to the existing sketches, and significantly outperforms the state-of-the-art with 36.7 times lower relative error. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, Crossref
Added: January 13, 2020

2018 journal article

Identifying and Estimating Persistent Items in Data Streams

IEEE-ACM TRANSACTIONS ON NETWORKING, 26(6), 2429–2442.

By: H. Dai*, M. Shahzad n, A. Liu*, M. Li*, Y. Zhong* & G. Chen*

author keywords: Persistent item; identification; estimation; Bloom filter; Raptor code
TL;DR: This paper proposes a novel scheme, PIE, that can not only accurately identify each persistent item with a probability greater than any desired false negative rate (FNR), but can also accurately estimate the number of occurrences of each persistence item. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: January 14, 2019

2018 article

Multi-User Gesture Recognition Using WiFi

MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, pp. 401–413.

By: R. Venkatnarayan n, G. Page n & M. Shahzad n

author keywords: Gesture recognition; WiFi; Multi-user
TL;DR: The key idea behind WiMU is that when it detects that some users have performed some gestures simultaneously, it first automatically determines the number of simultaneously performed gestures (Na) and then, using the training samples collected from a single user, generates virtual samples for various plausible combinations of Na gestures. (via Semantic Scholar)
Source: Web Of Science
Added: January 28, 2019

2017 journal article

A Shifting Framework for Set Queries

IEEE-ACM TRANSACTIONS ON NETWORKING, 25(5), 3116–3131.

By: T. Yang*, A. Liu*, M. Shahzad n, D. Yang*, Q. Fu*, G. Xie*, X. Li*

author keywords: Set queries; Bloom filters; algorithms
TL;DR: Results show that ShBF significantly advances the state-of-the-art on all three types of set queries, and extends the shifting framework from BF-based data structures to sketch- based data structures, which are widely used to store multiplicities of items. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures

IEEE TRANSACTIONS ON MOBILE COMPUTING, 16(10), 2726–2741.

By: M. Shahzad*, A. Liu & A. Samuel

author keywords: Mobile authentication; touch screen devices; gesture; signature
TL;DR: Unlike existing authentication schemes for touch screen devices, which use what user inputs as the authentication secret, BEAT authenticates users mainly based on how they input, using distinguishing features such as velocity, device acceleration, and stroke time. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Continuous Authentication and Authorization for the Internet of Things

IEEE INTERNET COMPUTING, 21(2), 86–90.

By: M. Shahzad n & M. Singh n

Contributors: M. Shahzad n & M. Singh n

TL;DR: Some challenges and opportunities in developing continuous authentication and authorization approaches for the IoT are discussed while also a case study of a Wi-Fi-based human authentication system called WiFiU is presented. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2017 journal article

Device-Free Human Activity Recognition Using Commercial WiFi Devices

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1118–1131.

By: W. Wang*, A. Liu*, M. Shahzad n, K. Ling* & S. Lu*

author keywords: Device-free sensing; human activities; WiFi; CSI
TL;DR: A Channel State Information (CSI)-based human Activity Recognition and Monitoring system (CARM) based on a CSI-speed model that quantifies the relation between CSI dynamics and human movement speeds and human activities. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 article

Fast and Accurate Tracking of Population Dynamics in RFID Systems

2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), pp. 836–846.

By: M. Shahzad n & A. Liu*

author keywords: RFID; Estimation; Tracking; Population; Mobile
TL;DR: This paper proposes a dynamic tag estimation scheme, namely DTE, that can achieve arbitrarily high required reliability, is compliant with the C1G2 standard, and works in single as well as multiple-reader environment. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Multi-Category RFID Estimation

IEEE-ACM TRANSACTIONS ON NETWORKING, 25(1), 264–277.

By: X. Liu*, K. Li*, A. Liu, S. Guo*, M. Shahzad n, A. Wang*, J. Wu*

author keywords: RFID; cardinality estimation; multi-category; Manchester coding; adaptive partitioning
TL;DR: This paper proposes an approach called simultaneous estimation for multi-category RFID systems (SEM), which exploits the Manchester-coding mechanism, which is supported by the ISO 18000-6 RFID standard, to decode the combined signals, thereby simultaneously obtaining the reply status of tags from each category. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2017 journal article

Recognizing Keystrokes Using WiFi Devices

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1175–1190.

By: K. Ali, A. Liu, W. Wang & M. Shahzad*

author keywords: Keystroke recognition; wireless sensing; human computer interaction (HCI); wireless security
TL;DR: It is shown for the first time that WiFi signals can also be exploited to recognize keystrokes, which is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2017 conference paper

Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed

2017 IEEE International Conference on Big Data (Big Data), 837–846.

By: T. Yang*, B. Yin*, H. Li*, M. Shahzad n, S. Uhlig*, B. Cui*, X. Li*

TL;DR: This paper designs a practical and efficient hash table that achieves high load factor, low hash collision rate, fast lookup speed, fast update speed, and zero update failures and proposes a set of hashing techniques that leverage Bloom filters to significantly reduce hash collision rates. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2017 article

SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items

2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), pp. 103–106.

TL;DR: This paper proposes a new sketch, called Slim-Fat (SF) sketch, which has a much smaller memory footprint for query while supporting updates, and significantly outperforms the most commonly used CM-sketch in terms of accuracy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

A shifting bloom filter framework for set queries

Proceedings of the VLDB Endowment, 9(5), 408–419.

By: T. Yang*, A. Liu*, M. Shahzad n, Y. Zhong*, Q. Fu, Z. Li*, G. Xie*, X. Li*

TL;DR: This paper proposes a Shifting Bloom Filter framework for representing and querying sets, and demonstrates the effectiveness of ShBF using three types of popular set queries: membership, association, and multiplicity queries. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A stochastic frame based approach to RFID tag searching

2016 IFIP Networking Conference (IFIP Networking) and Workshops, 153–161.

By: A. Wang*, M. Shahzad n & A. Liu*

TL;DR: This paper proposes a protocol called RTSP, which satisfies the four requirements of C1G2 compliance, arbitrary accuracy, privacy preserving, and multiple-reader capability and is easy to deploy because it is implemented on readers as a software module and does not require any implementation on tags. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping

IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3477–3492.

By: M. Shahzad n & A. Liu*

author keywords: Passive measurement; per-flow latency
TL;DR: This paper proposes COLATE, the first per-flow latency measurement scheme that requires no probe packets and time stamping and is designed to be efficiently implementable on network middleboxes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild

IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3770–3784.

By: M. Shahzad* & A. Liu

author keywords: RFID; missing tag detection; missing tag identification
TL;DR: The protocol, RUN, uses standardized frame slotted Aloha for communication between tags and readers and minimizes the missing tag detection and identification time by first estimating the number of unexpected tags in the population and using it along with the false-positive probability to obtain optimal frame sizes and minimum number of times Aloha frames should be executed to mitigate the effects of false positives. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Finding persistent items in data streams

Proceedings of the VLDB Endowment, 10(4), 289–300.

By: H. Dai*, M. Shahzad n, A. Liu* & Y. Zhong*

TL;DR: This paper proposes a novel scheme, PIE, that can accurately identify each persistent item with a probability greater than any desired false negative rate (FNR) while using a very small amount of memory. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness

2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), pp. 279–290.

By: M. Shahzad* & A. Liu

author keywords: RFID; Fairness; Identification
TL;DR: The first Fair RFID Identification Protocol (FRIP) is proposed that can achieve any required amount of fairness and is easy to deploy because it is compliant with the C1G2 standard, and thus, requires no modifications to tags or to the communication protocol between tags and readers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS

Information Sciences, 231, 45–63.

By: F. Shahzad*, M. Shahzad* & M. Farooq*

author keywords: Intrusion detection system; Kernel task structure; Malware forensic; Operating system security; Malicious process detection
TL;DR: A novel concept of genetic footprint is proposed, by mining the information in the kernel process control blocks (PCB) of a process, that can be used to detect malicious processes at run time, and it is shown that the presented technique is robust to well known run-time evasion attempts. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2009 chapter

Keystroke-Based User Identification on Smart Phones

In Lecture Notes in Computer Science (pp. 224–243).

By: S. Zahid*, M. Shahzad*, S. Khayam* & M. Farooq*

TL;DR: It is demonstrated that keystroke dynamics of a smart phone user can be translated into a viable features' set for accurate user identification and the proposed technique consistently and considerably outperforms existing schemes. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2008 chapter

A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols

In Parallel Problem Solving from Nature – PPSN X (pp. 1130–1139).

By: M. Shahzad*, S. Zahid* & M. Farooq*

TL;DR: This paper proposes a scalable formal framework that is scalable to any size of topology, robust to changing network traffic conditions and utilized to model a well-known BeeHive Protocol which is further validated on NTTNeT (a 57 node topology). (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.