default search action
Syed Ali Khayam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j28]Ayesha Binte Ashfaq, Zainab Abaid, Maliha Ismail, Muhammad Umar Aslam, Affan A. Syed, Syed Ali Khayam:
Diagnosing bot infections using Bayesian inference. J. Comput. Virol. Hacking Tech. 14(1): 21-38 (2018) - 2015
- [j27]Sheharbano Khattak, Zaafar Ahmed, Affan A. Syed, Syed Ali Khayam:
BotFlex: A community-driven tool for botnet detection. J. Netw. Comput. Appl. 58: 144-154 (2015) - [c51]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. WOOT 2015 - 2014
- [j26]Kamran Riaz Khan, Zaafar Ahmed, Shabbir Ahmed, Affan A. Syed, Syed Ali Khayam:
Rapid and scalable isp service delivery through a programmable middlebox. Comput. Commun. Rev. 44(3): 31-37 (2014) - [j25]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Stealing bandwidth from BitTorrent seeders. Comput. Secur. 46: 126-140 (2014) - [j24]Sheharbano Khattak, Naurin Rasheed Ramay, Kamran Riaz Khan, Affan A. Syed, Syed Ali Khayam:
A Taxonomy of Botnet Behavior, Detection, and Defense. IEEE Commun. Surv. Tutorials 16(2): 898-924 (2014) - [j23]Ayesha Binte Ashfaq, Sajjad Rizvi, Mobin Javed, Syed Ali Khayam, Muhammad Qasim Ali, Ehab Al-Shaer:
Information theoretic feature space slicing for statistical anomaly detection. J. Netw. Comput. Appl. 41: 473-487 (2014) - [j22]Osman Hasan, Syed Ali Khayam:
Towards Formal Linear Cryptanalysis using HOL4. J. Univers. Comput. Sci. 20(2): 193-212 (2014) - [c50]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Who Is Going to Be the Next BitTorrent Peer Idol? EUC 2014: 293-298 - [c49]Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson:
A Look at the Consequences of Internet Censorship Through an ISP Lens. Internet Measurement Conference 2014: 271-284 - 2013
- [j21]Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. ACM Trans. Inf. Syst. Secur. 15(4): 17:1-17:30 (2013) - [j20]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wirel. Networks 19(1): 31-46 (2013) - [c48]Sheharbano Khattak, Zaafar Ahmed, Affan A. Syed, Syed Ali Khayam:
BotFlex: a community-driven tool for botnetdetection. CCS 2013: 1387-1390 - [c47]Ayesha Binte Ashfaq, Muhammad Qasim Ali, Ehab Al-Shaer, Syed Ali Khayam:
Revisiting anomaly detection system design philosophy. CCS 2013: 1473-1476 - [i1]Kamran Riaz Khan, Affan A. Syed, Syed Ali Khayam:
Traffic analyzer for differentiating BitTorrent handshake failures from port-scans. CoRR abs/1309.0276 (2013) - 2012
- [j19]Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. J. Netw. Comput. Appl. 35(2): 597-605 (2012) - [j18]Adnan Iqbal, Syed Ali Khayam:
Accurate residual wireless channel simulation using a two-tier Markov model. Simul. 88(8): 1011-1019 (2012) - [c46]Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam:
Monetizing spambot activity and understanding its relation with spambot traffic features. AsiaCCS 2012: 51-52 - [c45]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. CyberC 2012: 143-150 - [c44]Rajesh Narayanan, Saikrishna Kotha, Geng Lin, Aimal Khan, Sajjad Rizvi, Wajeeha Javed, Hassan Khan, Syed Ali Khayam:
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane. EWSDN 2012: 79-84 - [c43]Sobia Jangsher, Syed Ali Khayam, Qasim M. Chaudhari:
Application-aware MIMO Video Rate Adaptation. INFOCOM 2012: 397-405 - 2011
- [j17]Muhammad Saleem, Israr Ullah, Syed Ali Khayam, Muddassar Farooq:
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications. Ad Hoc Networks 9(3): 285-299 (2011) - [j16]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks. Comput. Commun. 34(10): 1235-1242 (2011) - [j15]Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza:
Designing a cluster-based covert channel to evade disk investigation and forensics. Comput. Secur. 30(1): 35-49 (2011) - [j14]Ayesha Binte Ashfaq, Muhammad Qasim Ali, Syed Ali Khayam:
Accuracy improving guidelines for network anomaly detection systems. J. Comput. Virol. 7(1): 63-81 (2011) - [j13]Hassan Khan, Fauzan Mirza, Syed Ali Khayam:
Determining malicious executable distinguishing attributes and low-complexity detection. J. Comput. Virol. 7(2): 95-105 (2011) - [j12]Syed Ali Khayam, Ayesha Binte Ashfaq, Hayder Radha:
Joint network-host based malware detection using information-theoretic tools. J. Comput. Virol. 7(2): 159-172 (2011) - [j11]Hassaan Khaliq Qureshi, Junaid Jameel Ahmad, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models. Wirel. Pers. Commun. 58(4): 831-849 (2011) - [c42]Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger:
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. CCS 2011: 725-728 - [c41]Sardar Ali, Hassan Khan, Muhammad Ahmad, Syed Ali Khayam:
Progressive Differential Thresholding for Network Anomaly Detection. ICC 2011: 1-5 - [c40]Maryam Hafeez, Sobia Jangsher, Syed Ali Khayam:
A Cross-Layer Architecture for Motion-Adaptive Video Transmission over MIMO Channels. ICC 2011: 1-5 - [c39]Saeed Ullah, Junaid Jameel Ahmad, Junaid Khalid, Syed Ali Khayam:
Energy and distortion analysis of video compression schemes for Wireless Video Sensor Networks. MILCOM 2011: 822-827 - [c38]Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam:
Revisiting Traffic Anomaly Detection Using Software Defined Networking. RAID 2011: 161-180 - [c37]Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam:
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. SafeConfig 2011 - [c36]Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li:
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. SafeConfig 2011 - [c35]Toni Perkovic, Shujun Li, Asma Mumtaz, Syed Ali Khayam, Yousra Javed, Mario Cagalj:
Breaking undercover: exploiting design flaws and nonuniform human behavior. SOUPS 2011: 5 - 2010
- [j10]Sardar Ali, Irfan Ul Haq, Sajjad Rizvi, Naurin Rasheed, Unum Sarfraz, Syed Ali Khayam, Fauzan Mirza:
On mitigating sampling-induced accuracy loss in traffic anomaly detection systems. Comput. Commun. Rev. 40(3): 4-16 (2010) - [j9]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
On Performance Modeling of Ad Hoc Routing Protocols. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j8]Ali Tufail, Syed Ali Khayam, Muhammad Taqi Raza, Amna Ali, Ki-Hyung Kim:
An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks. Sensors 10(3): 1619-1651 (2010) - [c34]Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking e-banking CAPTCHAs. ACSAC 2010: 171-180 - [c33]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Muttukrishnan Rajarajan, Veselin Rakocevic:
An energy efficient Clique-based CDS discovery protocol for wireless sensor networks. CISS 2010: 1-6 - [c32]Ayesha Binte Ashfaq, Mobin Javed, Syed Ali Khayam, Hayder Radha:
An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems. ICC 2010: 1-5 - [c31]Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz:
Breaking Randomized Linear Generation Functions Based Virtual Password System. ICC 2010: 1-6 - [c30]Bilal Mehdi, Faraz Ahmed, Syed Ali Khayam, Muddassar Farooq:
Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection. ICC 2010: 1-5 - [c29]Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam:
What Is the Impact of P2P Traffic on Anomaly Detection? RAID 2010: 1-17
2000 – 2009
- 2009
- [j7]Adnan Iqbal, Syed Ali Khayam:
An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j6]Syed Ali Khayam, Hayder Radha:
Comparison of Conventional and Cross-Layer Multimedia Transport Schemes for Wireless Networks. Wirel. Pers. Commun. 51(3): 535-548 (2009) - [c28]Muhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam:
On achieving good operating points on an ROC plane using stochastic anomaly score prediction. CCS 2009: 314-323 - [c27]Syed Ali Raza Zaidi, Maryam Hafeez, Syed A. Khayam, Desmond C. McLernon, Mounir Ghogho, Kwangjo Kim:
On minimum cost coverage in wireless sensor networks. CISS 2009: 213-218 - [c26]Junaid Jameel Ahmad, Hassan Khan, Syed Ali Khayam:
Energy efficient video compression for wireless sensor networks. CISS 2009: 629-634 - [c25]Hassan Khan, Yousra Javed, Fauzan Mirza, Syed Ali Khayam:
Embedding a Covert Channel in Active Network Connections. GLOBECOM 2009: 1-6 - [c24]Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq:
Keystroke-Based User Identification on Smart Phones. RAID 2009: 224-243 - [c23]Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:
On the Inefficient Use of Entropy for Anomaly Detection. RAID 2009: 369-370 - 2008
- [c22]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol. ANTS Conference 2008: 315-322 - [c21]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Embedded Malware Detection Using Markov n-Grams. DIMVA 2008: 88-107 - [c20]M. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam:
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. EvoWorkshops 2008: 52-61 - [c19]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
A formal performance modeling framework for bio-inspired ad hoc routing protocols. GECCO 2008: 103-110 - [c18]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Improving accuracy of immune-inspired malware detectors by using intelligent features. GECCO 2008: 119-126 - [c17]Adnan Iqbal, Khurram Shahzad, Syed Ali Khayam:
SRVF: An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Sensor Networks. ICC 2008: 146-150 - [c16]Adnan Iqbal, Syed Ali Khayam:
Improving WSN Simulation and Analysis Accuracy Using Two-Tier Channel Models. ICC 2008: 349-353 - [c15]Syed A. Khayam, Hayder Radha, Dmitri Loguinov:
Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations. ICC 2008: 1561-1565 - [c14]Sohraab Soltani, Syed A. Khayam, Hayder Radha:
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic. ICC 2008: 1593-1597 - [c13]Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. RAID 2008: 351-371 - 2007
- [j5]Syed A. Khayam, Hayder Radha, Selin Aviyente, John R. Deller Jr.:
Markov and multifractal wavelet models for wireless MAC-to-MAC channels. Perform. Evaluation 64(4): 298-314 (2007) - [j4]Syed A. Khayam, Shirish S. Karande, Muhammad Usman Ilyas, Hayder Radha:
Header Detection to Improve Multimedia Quality Over Wireless Networks. IEEE Trans. Multim. 9(2): 377-385 (2007) - [j3]Syed A. Khayam, Hayder Radha:
Maximum-Likelihood Header Estimation: A Cross-Layer Methodology for Wireless Multimedia. IEEE Trans. Wirel. Commun. 6(11): 3946-3954 (2007) - [c12]Yongju Cho, Syed A. Khayam, Shirish Karande, Hayder Radha, Jae-Gon Kim, Jinwoo Hong:
A Multi-Tier Model for BER Prediction over Wireless Residual Channels. CISS 2007: 450-455 - [c11]Syed A. Khayam, Hayder Radha:
On the Impact of Ignoring Markovian Channel Memory on the Analysis of Wireless Systems. ICC 2007: 199-204 - [c10]Syed A. Khayam, Hayder Radha:
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. ICC 2007: 1385-1390 - [c9]Shirish Karande, Syed A. Khayam, Yongju Cho, Kiran Misra, Hayder Radha, Jae-Gon Kim, Jinwoo Hong:
On Channel State Inference and Prediction Using Observable Variables in 802.11b Network. ICC 2007: 4554-4559 - 2006
- [c8]Syed A. Khayam, Shirish Karande, Muhammad Usman Ilyas, Hayder Radha:
Improving Wireless Multimedia Quality using Header Detection with Priors. ICC 2006: 5457-5462 - [c7]Syed A. Khayam, Hayder Radha:
Constant-Complexity Models for Wireless Channels. INFOCOM 2006 - 2005
- [j2]Syed A. Khayam, Hayder Radha:
Linear-Complexity Models for Wireless MAC-to-MAC Channels. Wirel. Networks 11(5): 543-555 (2005) - [c6]Syed A. Khayam, Muhammad Usman Ilyas, Klaus Porsch, Shirish Karande, Hayder Radha:
A statistical receiver-based approach for improved throughput of multimedia communications over wireless LANs. ICC 2005: 3589-3593 - [c5]Syed A. Khayam, Hayder Radha:
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks. ICDCS Workshops 2005: 210-216 - 2004
- [c4]Syed A. Khayam, Hayder Radha:
Analyzing the spread of active worms over VANET. Vehicular Ad Hoc Networks 2004: 86-87 - 2003
- [j1]Syed A. Khayam, Shirish Karande, Hayder Radha, Dmitri Loguinov:
Performance analysis and modeling of errors and losses over 802.11b LANs for high-bit-rate real-time multimedia. Signal Process. Image Commun. 18(7): 575-595 (2003) - [c3]Syed A. Khayam, Shirish Karande, Michael Krappel, Hayder Radha:
Cross-layer protocol design for real-time multimedia applications over 802.11 b networks. ICME 2003: 425-428 - [c2]Shirish Karande, Syed A. Khayam, Michael Krappel, Hayder Radha:
Analysis and modeling of errors at the 802.11b link layer. ICME 2003: 673-676 - [c1]Syed A. Khayam, Hayder Radha:
Markov-based modeling of wireless local area networks. MSWiM 2003: 100-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint