Hossain Shahriar
Hossain Shahriar
Associate Professor of Information Technology
Verified email at kennesaw.edu
Title
Cited by
Cited by
Year
Mitigating program security vulnerabilities: Approaches and challenges
H Shahriar, M Zulkernine
ACM Computing Surveys (CSUR) 44 (3), 1-46, 2012
1172012
MUSIC: Mutation-based SQL injection vulnerability checking
H Shahriar, M Zulkernine
2008 The Eighth International Conference on Quality Software, 77-86, 2008
1112008
Trustworthiness testing of phishing websites: A behavior model-based approach
H Shahriar, M Zulkernine
Future Generation Computer Systems 28 (8), 1258-1271, 2012
832012
Mutec: Mutation-based testing of cross site scripting
H Shahriar, M Zulkernine
2009 ICSE Workshop on Software Engineering for Secure Systems, 47-53, 2009
772009
Client-side detection of cross-site request forgery attacks
H Shahriar, M Zulkernine
2010 IEEE 21st International Symposium on Software Reliability Engineering …, 2010
662010
S2XS2: a server side approach to automatically detect XSS attacks
H Shahriar, M Zulkernine
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
612011
Mutation-based testing of buffer overflow vulnerabilities
H Shahriar, M Zulkernine
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
482008
Information-theoretic detection of sql injection attacks
H Shahriar, M Zulkernine
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
472012
Mobile phishing attacks and mitigation techniques
H Shahriar, T Klintic, V Clincy
Journal of Information Security 6 (03), 206, 2015
432015
A comparative study of email forensic tools
VK Devendran, H Shahriar, V Clincy
Journal of Information Security 6 (2), 111, 2015
412015
Server side detection of content sniffing attacks
A Barua, H Shahriar, M Zulkernine
2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011
412011
Improving the prediction accuracy of decision tree mining with data preprocessing
P Chandrasekar, K Qian, H Shahriar, P Bhattacharya
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
402017
Testing of memory leak in android applications
H Shahriar, S North, E Mawangi
2014 IEEE 15th International Symposium on High-Assurance Systems Engineering …, 2014
392014
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations
H Shahriar, M Zulkernine
Journal of Systems and Software 84 (2), 250-269, 2011
392011
Automatic testing of program security vulnerabilities
H Shahriar, M Zulkernine
2009 33rd Annual IEEE International Computer Software and Applications …, 2009
372009
Classification of static analysis-based buffer overflow detectors
H Shahriar, M Zulkernine
2010 Fourth International Conference on Secure Software Integration and …, 2010
352010
PhishTester: automatic testing of phishing attacks
H Shahriar, M Zulkernine
2010 Fourth International Conference on Secure Software Integration and …, 2010
342010
Injecting comments to detect JavaScript code injection attacks
H Shahriar, M Zulkernine
2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011
332011
Mutation-based testing of format string bugs
H Shahriar, M Zulkernine
2008 11th IEEE High Assurance Systems Engineering Symposium, 229-238, 2008
292008
Effective detection of vulnerable and malicious browser extensions
H Shahriar, K Weldemariam, M Zulkernine, T Lutellier
Computers & Security 47, 66-84, 2014
282014
The system can't perform the operation now. Try again later.
Articles 1–20