Follow
Syed Ali Khayam
Syed Ali Khayam
Amazon Web Services
Verified email at seecs.edu.pk
Title
Cited by
Cited by
Year
The discrete cosine transform (DCT): theory and application
SA Khayam
Michigan State University 114 (1), 31, 2003
5622003
Revisiting traffic anomaly detection using software defined networking
SA Mehdi, J Khalid, SA Khayam
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
5202011
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan, AA Syed, SA Khayam
IEEE communications surveys & tutorials 16 (2), 898-924, 2013
2612013
Keystroke-based user identification on smart phones
S Zahid, M Shahzad, SA Khayam, M Farooq
International Workshop on Recent advances in intrusion detection, 224-243, 2009
1772009
Embedded Malware Detection Using Markov n-Grams
MZ Shafiq, SA Khayam, M Farooq
International conference on detection of intrusions and malware, and …, 2008
1522008
Performance analysis and modeling of errors and losses over 802.11 b LANs for high-bit-rate real-time multimedia
SA Khayam, S Karande, H Radha, D Loguinov
Signal Processing: Image Communication 18 (7), 575-595, 2003
1122003
Markov-based modeling of wireless local area networks
SA Khayam, H Radha
Proceedings of the 6th ACM international workshop on Modeling analysis and …, 2003
1062003
Breaking e-banking CAPTCHAs
S Li, SAH Shah, MAU Khan, SA Khayam, AR Sadeghi, R Schmitz
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
902010
Energy efficient video compression for wireless sensor networks
JJ Ahmad, HA Khan, SA Khayam
2009 43rd Annual Conference on Information Sciences and Systems, 629-634, 2009
892009
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks
S Rizvi, HK Qureshi, SA Khayam, V Rakocevic, M Rajarajan
Journal of Network and Computer Applications 35 (2), 597-605, 2012
842012
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
602012
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
592008
Method and system for adaptive anomaly-based intrusion detection
SA Khayam, MQ Ali
US Patent 8,800,036, 2014
582014
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
562011
A topologically-aware worm propagation model for wireless sensor networks
SA Khayam, H Radha
25th IEEE international conference on distributed computing systems …, 2005
562005
A look at the consequences of Internet censorship through an ISP lens
S Khattak, M Javed, SA Khayam, ZA Uzmi, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 271-284, 2014
532014
Analyzing the spread of active worms over VANET
SA Khayam, H Radha
Proceedings of the 1st ACM international workshop on Vehicular ad hoc …, 2004
502004
Using signal processing techniques to model worm propagation over wireless sensor networks
SA Khayam, H Radha
IEEE Signal Processing Magazine 23 (2), 164-169, 2006
482006
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks
SA Khayam, S Karande, M Krappel, H Radha
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
482003
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks
HK Qureshi, S Rizvi, M Saleem, SA Khayam, V Rakocevic, M Rajarajan
Computer Communications 34 (10), 1235-1242, 2011
432011
The system can't perform the operation now. Try again later.
Articles 1–20