Alefiya Hussain
Alefiya Hussain
Computer Scientist, USC/Information Sciences Institute
Verified email at isi.edu - Homepage
Title
Cited by
Cited by
Year
A framework for classifying denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
Proceedings of the 2003 conference on Applications, technologies …, 2003
6532003
Cossack: Coordinated suppression of simultaneous attacks
C Papadopoulos, R Lindell, J Mehringer, A Hussain, R Govindan
Proceedings DARPA Information Survivability Conference and Exposition 1, 2-13, 2003
2042003
Effect of malicious traffic on the network
K Lan, A Hussain, D Dutta
Passive and Active Measurement Workshop (PAM), 2003
952003
In quest of benchmarking security risks to cyber-physical systems
S Amin, GA Schwartz, A Hussain
IEEE Network 27 (1), 19-24, 2013
912013
Accurately measuring denial of service in simulation and testbed experiments
J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas
IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008
772008
Identification of repeated denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
75*2006
Towards user-centric metrics for denial-of-service measurement
J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ...
Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007
642007
Seer: A security experimentation environment for deter
S Schwab, B Wilson, C Ko, A Hussain
Proceedings of the DETER Community Workshop on Cyber Security …, 2007
572007
Measuring denial of service
J Mirkovic, P Reiher, S Fahmy, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the 2nd ACM workshop on Quality of protection, 53-58, 2006
562006
Experiences with a continuous network tracing infrastructure
A Hussain, G Bartlett, Y Pryadkin, J Heidemann, C Papadopoulos, ...
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 185-190, 2005
432005
Testing a collaborative DDoS defense in a red team/blue team exercise
J Mirkovic, P Reiher, C Papadopoulos, A Hussain, M Shepard, M Berg, ...
IEEE Transactions on Computers 57 (8), 1098-1112, 2008
342008
DDoS experiment methodology
A Hussain, S Schwab, R Thomas, S Fahmy, J Mirkovic
Proceedings of the DETER community workshop on cyber security experimentation 8, 2006
342006
A systems and control perspective of CPS security
SM Dibaji, M Pirani, DB Flamholz, AM Annaswamy, KH Johansson, ...
Annual Reviews in Control 47, 394-411, 2019
322019
Measuring impact of dos attacks
J Mirkovic, S Fahmy, P Reiher, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the DETER community workshop on cyber security experimentation, 2006
312006
A semantic framework for data analysis in networked systems
A Viswanathan, A Hussain, J Mirkovic, S Schwab, J Wroclawski
Proc. USENIX Symp. Netw. Syst. Des. Implement.(NSDI), 127-140, 2011
272011
DDoS benchmarks and experimenter's workbench for the DETER testbed
J Mirkovic, S Wei, A Hussain, B Wilson, R Thomas, S Schwab, S Fahmy, ...
2007 3rd International Conference on Testbeds and Research Infrastructure …, 2007
272007
Automating DDoS Experimentation.
J Mirkovic, S Fahmy, PL Reiher, RK Thomas
DETER, 2007
242007
Experience with heterogenous clock-skew based device fingerprinting
S Sharma, A Hussain, H Saran
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
162012
Distinguishing between single and multi-source attacks using signal processing
A Hussain, J Heidemann, C Papadopoulos
Computer Networks 46 (4), 479-503, 2004
152004
Spectral characteristics of saturated links
X He, C Papadopoulos, J Heidemann, A Hussain
Under Submission, 2004
152004
The system can't perform the operation now. Try again later.
Articles 1–20