Effective key management in dynamic wireless sensor networks SH Seo, J Won, S Sultana, E Bertino IEEE Transactions on Information Forensics and Security 10 (2), 371-383, 2014 | 205 | 2014 |
Characterizing failures in mobile oses: A case study with android and symbian AK Maji, K Hao, S Sultana, S Bagchi 2010 IEEE 21st international symposium on software reliability engineering …, 2010 | 147 | 2010 |
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013 | 101 | 2013 |
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks S Sultana, E Bertino, M Shehab 2011 31st International Conference on Distributed Computing Systems …, 2011 | 88 | 2011 |
Secure provenance transmission for streaming data S Sultana, M Shehab, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012 | 87 | 2012 |
A lightweight secure provenance scheme for wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab 2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012 | 60 | 2012 |
Henet: A deep learning approach on intel® processor trace for effective exploit detection L Chen, S Sultana, R Sahita 2018 IEEE Security and Privacy Workshops (SPW), 109-115, 2018 | 51 | 2018 |
A roadmap for privacy-enhanced secure data provenance E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ... Journal of Intelligent Information Systems 43, 481-501, 2014 | 51 | 2014 |
Deep learning on execution trace data for exploit detection L Chen, S Sultana US Patent 10,915,631, 2021 | 49 | 2021 |
Secure data provenance compression using arithmetic coding in wireless sensor networks SR Hussain, C Wang, S Sultana, E Bertino 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 46 | 2014 |
Demonstrating a lightweight data provenance for sensor networks B Shebaro, S Sultana, S Reddy Gopavaram, E Bertino Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 40 | 2012 |
Kinesis: a security incident response and prevention system for wireless sensor networks S Sultana, D Midi, E Bertino Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 34 | 2014 |
Cryptographic capability computing M LeMay, J Rakshit, S Deutsch, DM Durham, S Ghosh, A Nori, J Gaur, ... MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021 | 29 | 2021 |
SYREN: Synergistic link correlation-aware and network coding-based dissemination in wireless sensor networks SMI Alam, S Sultana, YC Hu, S Fahmy 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation …, 2013 | 26 | 2013 |
Disease investigation of small indigenous fishes from KaiIla beel in Mymensingh area GU Ahmed, R Parveen, S Sultana Journal of the Bangladesh Agricultural University 2 (2), 305-311, 2004 | 26 | 2004 |
A file provenance system S Sultana, E Bertino Proceedings of the third ACM conference on Data and application security and …, 2013 | 24 | 2013 |
A distributed system for the management of fine-grained provenance S Sultana, E Bertino Journal of Database Management (JDM) 26 (2), 32-47, 2015 | 21 | 2015 |
A comprehensive model for provenance S Sultana, E Bertino Advances in Conceptual Modeling: ER 2012 Workshops CMS, ECDM-NoCoDA, MoDIC …, 2012 | 18 | 2012 |
Encoded stack pointers AJ Weiler, DM Durham, MD LeMay, S Deutsch, ME Kounavis, S Sultana, ... US Patent 11,711,201, 2023 | 16 | 2023 |
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces C Yagemann, S Sultana, L Chen, W Lee Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 16 | 2019 |