Alefiya Hussain
Alefiya Hussain
Sr. Computer Scientist, USC/Information Sciences Institute
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A framework for classifying denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
Proceedings of the 2003 conference on Applications, technologies …, 2003
Cossack: Coordinated suppression of simultaneous attacks
C Papadopoulos, R Lindell, J Mehringer, A Hussain, R Govindan
Proceedings DARPA information survivability conference and exposition 1, 2-13, 2003
In quest of benchmarking security risks to cyber-physical systems
S Amin, GA Schwartz, A Hussain
IEEE Network 27 (1), 19-24, 2013
Effect of malicious traffic on the network
K Lan, A Hussain, D Dutta
Passive and Active Measurement Workshop (PAM), 2003
Accurately measuring denial of service in simulation and testbed experiments
J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas
IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008
Identification of repeated denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
Towards user-centric metrics for denial-of-service measurement
J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ...
Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007
Seer: A security experimentation environment for deter
S Schwab, B Wilson, C Ko, A Hussain
Proceedings of the DETER Community Workshop on Cyber Security …, 2007
Measuring denial of service
J Mirkovic, P Reiher, S Fahmy, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the 2nd ACM workshop on Quality of protection, 53-58, 2006
Experiences with a continuous network tracing infrastructure
A Hussain, G Bartlett, Y Pryadkin, J Heidemann, C Papadopoulos, ...
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 185-190, 2005
Testing a collaborative DDoS defense in a red team/blue team exercise
J Mirkovic, P Reiher, C Papadopoulos, A Hussain, M Shepard, M Berg, ...
IEEE Transactions on Computers 57 (8), 1098-1112, 2008
DDoS experiment methodology
A Hussain, S Schwab, R Thomas, S Fahmy, J Mirkovic
Proceedings of the DETER community workshop on cyber security experimentation 8, 2006
Measuring impact of dos attacks
J Mirkovic, S Fahmy, P Reiher, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the DETER community workshop on cyber security experimentation, 2006
A semantic framework for data analysis in networked systems
A Viswanathan, A Hussain, J Mirkovic, S Schwab, J Wroclawski
Proc. USENIX Symp. Netw. Syst. Des. Implement.(NSDI), 127-140, 2011
DDoS benchmarks and experimenter's workbench for the DETER testbed
J Mirkovic, S Wei, A Hussain, B Wilson, R Thomas, S Schwab, S Fahmy, ...
2007 3rd International Conference on Testbeds and Research Infrastructure …, 2007
Automating DDoS Experimentation.
J Mirkovic, B Wilson, A Hussain, S Fahmy, P Reiher, R Thomas, ...
Usenix Workshop on Cyber Security Experimentation, 2007
Experience with heterogenous clock-skew based device fingerprinting
S Sharma, A Hussain, H Saran
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
Distinguishing between single and multi-source attacks using signal processing
A Hussain, J Heidemann, C Papadopoulos
Computer Networks 46 (4), 479-503, 2004
Measurement and spectral analysis of denial of service attacks
AN Hussain, J Adviser-Heidemann, C Adviser-Papadopoulos
PhD Thesis, 1-200, 2005
The effect of detail on Ethernet simulation
A Hussain, A Kapoor, J Heidemann
18th Workshop on Parallel and Distributed Simulation, 2004. PADS 2004., 97-104, 2004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20