Alefiya Hussain
Alefiya Hussain
Sr. Computer Scientist, Research Team Leader, USC/Information Sciences Institute
Verified email at - Homepage
Cited by
Cited by
A framework for classifying denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
Proceedings of the 2003 conference on Applications, technologies …, 2003
Cossack: Coordinated suppression of simultaneous attacks
C Papadopoulos, R Lindell, J Mehringer, A Hussain, R Govindan
Proceedings DARPA information survivability conference and exposition 1, 2-13, 2003
In quest of benchmarking security risks to cyber-physical systems
S Amin, GA Schwartz, A Hussain
IEEE Network 27 (1), 19-24, 2013
Effect of malicious traffic on the network
K Lan, A Hussain, D Dutta
Passive and Active Measurement Workshop (PAM), 2003
Accurately measuring denial of service in simulation and testbed experiments
J Mirkovic, A Hussain, S Fahmy, P Reiher, RK Thomas
IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95, 2008
Towards user-centric metrics for denial-of-service measurement
J Mirkovic, A Hussain, B Wilson, S Fahmy, P Reiher, R Thomas, WM Yao, ...
Proceedings of the 2007 workshop on Experimental computer science, 8-es, 2007
Identification of repeated denial of service attacks
A Hussain, J Heidemann, C Papadopoulos
INFOCOM 2006. 25th IEEE International Conference on Computer Communications …, 2006
Seer: A security experimentation environment for deter
S Schwab, B Wilson, C Ko, A Hussain
Proceedings of the DETER Community Workshop on Cyber Security …, 2007
Measuring denial of service
J Mirkovic, P Reiher, S Fahmy, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the 2nd ACM workshop on Quality of protection, 53-58, 2006
Experiences with a continuous network tracing infrastructure
A Hussain, G Bartlett, Y Pryadkin, J Heidemann, C Papadopoulos, ...
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 185-190, 2005
Testing a collaborative DDoS defense in a red team/blue team exercise
J Mirkovic, P Reiher, C Papadopoulos, A Hussain, M Shepard, M Berg, ...
IEEE Transactions on Computers 57 (8), 1098-1112, 2008
Experience with heterogenous clock-skew based device fingerprinting
S Sharma, A Hussain, H Saran
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
Measuring impact of dos attacks
J Mirkovic, S Fahmy, P Reiher, R Thomas, A Hussain, S Schwab, C Ko
Proceedings of the DETER community workshop on cyber security experimentation, 2006
DDoS experiment methodology
A Hussain, S Schwab, R Thomas, S Fahmy, J Mirkovic
Proceedings of the DETER community workshop on cyber security experimentation 8, 2006
DDoS benchmarks and experimenter's workbench for the DETER testbed
J Mirkovic, S Wei, A Hussain, B Wilson, R Thomas, S Schwab, S Fahmy, ...
2007 3rd International Conference on Testbeds and Research Infrastructure …, 2007
A semantic framework for data analysis in networked systems
A Viswanathan, A Hussain, J Mirkovic, S Schwab, J Wroclawski
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011
DETERLab and the DETER Project
J Wroclawski, T Benzel, J Blythe, T Faber, A Hussain, J Mirkovic, ...
The GENI Book, 35-62, 2016
Automating DDoS Experimentation.
J Mirkovic, B Wilson, A Hussain, S Fahmy, P Reiher, R Thomas, ...
Usenix Workshop on Cyber Security Experimentation, 2007
A framework for evaluating the resilience of dynamic real-time market mechanisms
P Wood, D Shiltz, TR Nudell, A Hussain, AM Annaswamy
IEEE Transactions on Smart Grid 7 (6), 2904-2912, 2016
Distinguishing between single and multi-source attacks using signal processing
A Hussain, J Heidemann, C Papadopoulos
Computer Networks 46 (4), 479-503, 2004
The system can't perform the operation now. Try again later.
Articles 1–20