default search action
Mohammad Ashiqur Rahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems. Comput. Secur. 139: 103709 (2024) - [c96]Aditi Saha, Mohammad Ashiqur Rahman, Fan Wu:
Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments. ACM Southeast Regional Conference 2024: 321-322 - [c95]Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Ahmad Mohammad:
ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles. AsiaCCS 2024 - [c94]Jean Carlos Tonday Rodriguez, David Perry, Mohammad Ashiqur Rahman, Syed Bahauddin Alam:
An Intelligent Hierarchical Framework for Efficient Fault Detection and Diagnosis in Nuclear Power Plants. CPSIOTSEC@CCS 2024: 80-92 - [c93]Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions. DSN 2024: 129-141 - [c92]Alejandro Almeida, Muneeba Asif, Md. Tauhidur Rahman, Mohammad Ashiqur Rahman:
Side-Channel-Driven Intrusion Detection System for Mission Critical Unmanned Aerial Vehicles. ISQED 2024: 1-9 - [c91]Alvaro Alva, Luis Martinez Moreno, Muneeba Asif, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Alfredo Cuzzocrea, Hossain Shahriar:
Secured UAV Navigation: A Novel Intrusion Detection System Based on PWM Signal Analysis. SDS 2024: 174-180 - [c90]Parth Patel, Syed Rafay Hasan, Mohammad Ashiqur Rahman, Soamar Homsi:
Detection and Mitigation of Subtle Feature-map Attacks in Pseudo Parallel Collaborative CNN Models for Distributed Edge Intelligence. VTC Fall 2024: 1-5 - [i31]Muneeba Asif, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Syed Rafay Hasan, Soamar Homsi:
SHEATH: Defending Horizontal Collaboration for Distributed CNNs against Adversarial Noise. CoRR abs/2409.17279 (2024) - [i30]Nur Imtiazul Haque, Prabin Mali, Mohammad Zakaria Haider, Mohammad Ashiqur Rahman, Sumit Paudyal:
MISGUIDE: Security-Aware Attack Analytics for Smart Grid Load Frequency Control. CoRR abs/2411.04731 (2024) - 2023
- [j25]Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman:
Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs. Comput. Networks 229: 109784 (2023) - [j24]Tayebeh Rajab, Alvi Ataur Khalil, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Mohammad Dakhilalian, Maurice Ngouen, Murtuza Jadliwala, A. Selcuk Uluagac:
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains. Distributed Ledger Technol. Res. Pract. 2(4): 1-21 (2023) - [j23]Madhukrishna Priyadarsini, Padmalochan Bera, Sajal K. Das, Mohammad Ashiqur Rahman:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. IEEE Trans. Dependable Secur. Comput. 20(2): 1500-1515 (2023) - [j22]Mohamadsaleh Jafari, Mohammad Ashiqur Rahman, Sumit Paudyal:
Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems. IEEE Trans. Inf. Forensics Secur. 18: 5200-5212 (2023) - [j21]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Muneeba Asif, Alvi Ataur Khalil, Hisham A. Kholidy, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. IEEE Trans. Netw. Serv. Manag. 20(1): 138-151 (2023) - [j20]Mohamadsaleh Jafari, Mohammad Ashiqur Rahman, Sumit Paudyal:
Optimal False Data Injection Attacks Against Power System Frequency Stability. IEEE Trans. Smart Grid 14(2): 1276-1288 (2023) - [c89]Hisham A. Kholidy, Keven Disen, Andrew Karam, Elhadj Benkhelifa, Mohammad Ashiqur Rahman, Atta-ur-Rahman, Ibrahim Almazyad, Ahmed F. Sayed, Rakia Jaziri:
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures. AICCSA 2023: 1-8 - [c88]Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Hossain Shahriar, Alfredo Cuzzocrea:
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles. IEEE Big Data 2023: 5428-5437 - [c87]Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
SHIP: Securing Hashed Timelock Contracts in Payment Channel Networks. CNS 2023: 1-2 - [c86]Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy:
FAKEY: Fake Hashed Key Attack on Payment Channel Networks. CNS 2023: 1-9 - [c85]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - [c84]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. DSN 2023: 1-13 - [c83]Maurice Ngouen, Mohammad Ashiqur Rahman, Nagarajan Prabakar, A. Selcuk Uluagac, Laurent Njilla:
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption. IOTSMS 2023: 141-148 - [c82]Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVs. LCN 2023: 1-9 - [e2]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i29]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. CoRR abs/2305.09669 (2023) - [i28]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. CoRR abs/2306.00284 (2023) - 2022
- [c81]Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman:
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System. CCS 2022: 3359-3361 - [c80]Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System. CNSM 2022: 268-274 - [c79]Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. COMPSAC 2022: 1774-1779 - [c78]Mohamadsaleh Jafari, Mohammad Ashiqur Rahman, Sumit Paudyal:
Optimal Improvement of Post-Disturbance Dynamic Response in Power Grids. IAS 2022: 1-5 - [c77]Maryam Abbasi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya, Murtuza Jadliwala:
On Algorand Transaction Fees: Challenges and Mechanism Design. ICC 2022: 5403-5408 - [c76]Nur Imtiazul Haque, Mohammad Ashiqur Rahman:
PHASE: Security Analyzer for Next-Generation Smart Personalized Smart Healthcare System. ICDH 2022: 208-214 - [c75]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed:
DeepCAD: A Stand-alone Deep Neural Network-based Framework for Classification and Anomaly Detection in Smart Healthcare Systems. ICDH 2022: 218-227 - [c74]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohamed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. MILCOM 2022: 577-582 - [c73]Akram Hakiri, Aniruddha S. Gokhale, Yogesh D. Barve, Valerio Formicola, Shashank Shekhar, Charif Mahmoudi, Mohammad Ashiqur Rahman, Uttam Ghosh, Syed Rafay Hasan, Terry N. Guo:
Techniques for Realizing Secure, Resilient and Differentiated 5G Operations. WMNC 2022: 113-117 - [i27]Hisham A. Kholidy, Mohammad Ashiqur Rahman, Andrew Karam, Zahid Akhtar:
Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform. CoRR abs/2201.00484 (2022) - [i26]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman:
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. CoRR abs/2206.12766 (2022) - [i25]Ryan Shivers, Mohammad Ashiqur Rahman, Md. Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy:
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform. CoRR abs/2207.03525 (2022) - [i24]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. CoRR abs/2207.09902 (2022) - 2021
- [j19]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses. ACM Trans. Comput. Heal. 2(3): 27:1-27:44 (2021) - [j18]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. EAI Endorsed Trans. Security Safety 8(28): e4 (2021) - [j17]Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya:
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach. IEEE Trans. Netw. Sci. Eng. 8(1): 751-764 (2021) - [j16]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Aniruddha Gokhale:
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model. IEEE Trans. Netw. Serv. Manag. 18(2): 1430-1444 (2021) - [c72]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea, Fan Wu:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. IEEE BigData 2021: 5413-5419 - [c71]Ryan Shivers, Mohammad Ashiqur Rahman, Md. Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy:
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform. IEEE BigData 2021: 5450-5459 - [c70]Md Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen:
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. CNS 2021: 200-208 - [c69]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Hossain Shahriar:
Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems. COMPSAC 2021: 504-513 - [c68]Md Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, Badrul H. Chowdhury:
DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems. COMPSAC 2021: 725-734 - [c67]Nur Imtiazul Haque, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, M. Hadi Amini, Sheikh Iqbal Ahamed:
BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems. ICDH 2021: 48-58 - [c66]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman:
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. ICDH 2021: 299-308 - [c65]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman:
5G Core Security in Edge Networks: A Vulnerability Assessment Approach. ISCC 2021: 1-6 - [c64]Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman:
CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS. LCN 2021: 533-540 - [c63]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA: Control-Aware Attack Analytics for Building Internet of Things. SECON 2021: 1-9 - [c62]Md Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, Badrul H. Chowdhury, Steven G. Whisenant:
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems. SecureComm (2) 2021: 338-359 - [c61]Alvi Ataur Khalil, Alexander J. Byrne, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
REPlanner: Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. SMARTCOMP 2021: 153-160 - [i23]Mohamadsaleh Jafari, Mohammad Ashiqur Rahman, Sumit Paudyal:
False Data Injection Attack Against Power System Small-Signal Stability. CoRR abs/2102.10587 (2021) - [i22]Mohamadsaleh Jafari, Md Hasan Shahriar, Mohammad Ashiqur Rahman, Sumit Paudyal:
False Relay Operation Attacks in Power Systems with High Renewables. CoRR abs/2102.12041 (2021) - [i21]Alvi Ataur Khalil, Alexander J. Byrne, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. CoRR abs/2103.02676 (2021) - [i20]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, A. Selcuk Uluagac:
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems. CoRR abs/2103.03472 (2021) - [i19]Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Mohammad Ashiqur Rahman:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. CoRR abs/2107.07916 (2021) - [i18]Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman:
CURE: Enabling RF Energy Harvesting using Cell-Free Massive MIMO UAVs Assisted by RIS. CoRR abs/2107.10412 (2021) - [i17]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, Hisham A. Kholidy:
BIoTA Control-Aware Attack Analytics for Building Internet of Things. CoRR abs/2107.14136 (2021) - 2020
- [j15]Madhukrishna Priyadarsini, Shailesh Kumar, Padmalochan Bera, Mohammad Ashiqur Rahman:
An energy-efficient load distribution framework for SDN controllers. Computing 102(9): 2073-2098 (2020) - [j14]Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman:
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment. J. Inf. Secur. Appl. 50 (2020) - [j13]Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic analysis to defend against remote operating system fingerprinting. J. Inf. Secur. Appl. 52: 102456 (2020) - [j12]Mohammad Ashiqur Rahman, Amarjit Datta:
Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis. IEEE Trans. Dependable Secur. Comput. 17(3): 451-464 (2020) - [c60]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, Sheikh Iqbal Ahamed, Sweta Sneha, Mohammad Ashiqur Rahman, Alfredo Cuzzocrea:
Actionable Knowledge Extraction Framework for COVID-19. IEEE BigData 2020: 4036-4041 - [c59]Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr.:
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. COMPSAC 2020: 376-385 - [c58]Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers. COMPSAC 2020: 473-482 - [c57]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-Based Reward Distribution in Algorand. DSN 2020: 452-463 - [c56]A. K. M. Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems. GLOBECOM 2020: 1-6 - [c55]Mohammad Ashiqur Rahman, Rahat Masum, Matthew Anderson, Steven L. Drager:
Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission Lines. ICECCS 2020: 103-112 - [i16]Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains. CoRR abs/2002.06531 (2020) - [i15]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses. CoRR abs/2005.07359 (2020) - [i14]Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Miguel Alonso Jr.:
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System. CoRR abs/2006.00676 (2020) - [i13]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Matthew Anderson, Steven Drager:
Automated Trajectory Synthesis for UAV Swarms Based on Resilient Data Collection Objectives. CoRR abs/2008.10782 (2020) - [i12]A. H. M. Jakaria, Md Mosharaf Hossain, Mohammad Ashiqur Rahman:
Smart Weather Forecasting Using Machine Learning: A Case Study in Tennessee. CoRR abs/2008.10789 (2020) - [i11]Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif I. Sarwat, Mohammad Ashiqur Rahman:
Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey. CoRR abs/2010.00661 (2020) - [i10]A. K. M. Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems. CoRR abs/2010.03671 (2020)
2010 – 2019
- 2019
- [j11]Madhukrishna Priyadarsini, Joy Chandra Mukherjee, Padmalochan Bera, Shailesh Kumar, A. H. M. Jakaria, Mohammad Ashiqur Rahman:
An adaptive load balancing scheme for software-defined network controllers. Comput. Networks 164 (2019) - [j10]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Security design against stealthy attacks on power system state estimation: A formal approach. Comput. Secur. 84: 301-317 (2019) - [j9]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Carol J. Fung:
A Requirement-Oriented Design of NFV Topology by Formal Synthesis. IEEE Trans. Netw. Serv. Manag. 16(4): 1739-1753 (2019) - [c54]Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Ashiqur Rahman:
Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units. Blockchain 2019: 504-509 - [c53]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan:
Safety Analysis of AMI Networks Through Smart Fraud Detection. CNS 2019: 1-7 - [c52]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Aniruddha Gokhale:
A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study. CNSM 2019: 1-5 - [c51]Brian K. Ledbetter, Samuel Wehunt, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei:
LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons. COMPSAC (1) 2019: 535-544 - [c50]Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Walid Saad:
A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems. COMPSAC (1) 2019: 549-558 - [c49]Md Arabin Islam Talukder, Hossain Shahriar, Kai Qian, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. COMPSAC (1) 2019: 565-569 - [c48]Hossain Shahriar, Md Arabin Islam Talukder, Mohammad Ashiqur Rahman, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu:
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. COMPSAC (2) 2019: 604-609 - [c47]Madhukrishna Priyadarsini, Padmalochan Bera, Mohammad Ashiqur Rahman:
A Signalling Game-Based Security Enforcement Mechanism for SDN Controllers. ICCCNT 2019: 1-7 - [c46]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. SNAMS 2019: 389-396 - [c45]Hossain Shahriar, Md Arabin Islam Talukder, Hongmei Chi, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi:
Data Protection Labware for Mobile Security. SpaCCS 2019: 183-195 - [c44]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Rahat Masum:
False data injection attacks against contingency analysis in power grids: poster. WiSec 2019: 343-344 - [i9]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Ehab Al-Shaer, Quanyan Zhu:
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips. CoRR abs/1907.00540 (2019) - [i8]A. K. M. Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac:
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems. CoRR abs/1909.10565 (2019) - [i7]Ryan Shivers, Mohammad Ashiqur Rahman, Hossain Shahriar:
Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles. CoRR abs/1910.00715 (2019) - [i6]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Mohamadsaleh Jafari, Rahat Masum:
Novel Attacks against Contingency Analysis in Power Grids. CoRR abs/1911.00928 (2019) - [i5]Mohammad Ashiqur Rahman, Rahat Masum, Matthew Anderson, Steven L. Drager:
Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study. CoRR abs/1911.02512 (2019) - [i4]Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman:
On Incentive Compatible Role-based Reward Distribution in Algorand. CoRR abs/1911.03356 (2019) - [i3]Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Kemal Akkaya:
Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach. CoRR abs/1912.10073 (2019) - 2018
- [c43]Md. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. COMPSAC (2) 2018: 498-503 - [c42]A. H. M. Jakaria, Mohammad Ashiqur Rahman:
Formal Analysis of k-Resiliency for Collaborative UAVs. COMPSAC (1) 2018: 583-592 - [c41]A. H. M. Jakaria, Mohammad Ashiqur Rahman:
Poster Abstract: Safety Analysis for UAV Networks. IoTDI 2018: 294-295 - [c40]Md. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman:
Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. IoTDI 2018: 298-299 - [c39]Enahoro Oriero, Mohammad Ashiqur Rahman:
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks. MILCOM 2018: 1-9 - [c38]Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman:
A scalable and flexible DDoS mitigation system using network function virtualization. NOMS 2018: 1-6 - [c37]Madhukrishna Priyadarsini, Padmalochan Bera, Mohammad Ashiqur Rahman:
A new approach for energy efficiency in software defined network. SDS 2018: 67-73 - [i2]Hawzhin Mohammed, Syed Rafay Hasan, Mohammad Ashiqur Rahman:
Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks. CoRR abs/1807.11565 (2018) - [i1]Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Ashiqur Rahman:
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units. CoRR abs/1811.02001 (2018) - 2017
- [j8]Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67: 35-58 (2017) - [j7]Vitaly Ford, Ambareen Siraj, Mohammad Ashiqur Rahman:
Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis. J. Comput. Syst. Sci. 83(1): 84-100 (2017) - [j6]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 14(2): 221-234 (2017) - [j5]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement. IEEE Trans. Parallel Distributed Syst. 28(2): 416-430 (2017) - [c36]A. H. M. Jakaria, Mohammad Ashiqur Rahman:
A Formal Framework of Resource Management for VNFaaS in Cloud. CLOUD 2017: 254-261 - [c35]Md. Golam Moula Mehedi Hasan, Mohammad Ashiqur Rahman:
Protection by Detection: A Signaling Game Approach to Mitigate Co-Resident Attacks in Cloud. CLOUD 2017: 552-559 - [c34]Amarjit Datta, Mohammad Ashiqur Rahman:
Cyber Threat Analysis Framework for the Wind Energy Based Power System. CPS-SPC@CCS 2017: 81-92 - [c33]A. H. M. Jakaria, Mohammad Ashiqur Rahman, Carol J. Fung:
Automated synthesis of NFV topology: A security requirement-oriented design. CNSM 2017: 1-5 - [c32]A. H. M. Jakaria, Bahman Rashidi, Mohammad Ashiqur Rahman, Carol J. Fung, Wei Yang:
Dynamic DDoS Defense Resource Allocation using Network Function Virtualization. SDN-NFV@CODASPY 2017: 37-42 - [c31]Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman:
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network. COMPSAC (1) 2017: 548-556 - [c30]Amarjit Datta, Brian K. Ledbetter, Mohammad Ashiqur Rahman:
Optimal Deployment of Charging Stations for Electric Vehicles: A Formal Approach. ICDCS Workshops 2017: 83-90 - [c29]Mohammad Taghi Adili, Amin Mohammadi, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman:
A cost-effective security management for clouds: A game-theoretic deception mechanism. IM 2017: 98-106 - 2016
- [b1]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches. Advances in Information Security 67, Springer 2016, ISBN 978-3-319-32870-6, pp. 3-134 - [c28]Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). CNS 2016: 180-188 - [c27]Mohammad Ashiqur Rahman, Abdullah Al Farooq, Amarjit Datta, Ehab Al-Shaer:
Automated synthesis of resiliency configurations for cyber networks. CNS 2016: 243-251 - [c26]Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. COMPSAC Workshops 2016: 381 - [c25]Bata Krishna Tripathy, Ananta Gopal Sethy, Padmalochan Bera, Mohammad Ashiqur Rahman:
A Novel Secure and Efficient Policy Management Framework for Software Defined Network. COMPSAC Workshops 2016: 423-430 - [c24]A. H. M. Jakaria, Wei Yang, Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman:
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization. COMPSAC Workshops 2016: 431-436 - [c23]Bata Krishna Tripathy, Padmalochan Bera, Mohammad Ashiqur Rahman:
Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study. COMSNETS 2016: 1-8 - [c22]Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer:
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. DSN 2016: 263-274 - [c21]Mohammad Sadegh Nourbakhsh, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Walid Saad:
Electric vehicle consumption markets: An economic analysis. GlobalSIP 2016: 906-910 - 2015
- [c20]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. CCS 2015: 1711-1712 - [c19]Christopher S. Oehmen, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Automated Decision Making for Active Cyber Defense: Panel Discussion. SafeConfig@CCS 2015: 59 - [c18]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Formal synthesis of dependable configurations for advanced metering infrastructures. SmartGridComm 2015: 289-294 - [p1]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. Cyber Warfare 2015: 57-80 - [e1]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3821-9 [contents] - 2014
- [c17]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rakesh B. Bobba:
Moving Target Defense for Hardening the Security of the Power System State Estimation. MTD@CCS 2014: 59-68 - [c16]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. DSN 2014: 156-167 - [c15]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. ICCPS 2014: 175-186 - [c14]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid. ICDCS 2014: 649-659 - 2013
- [j4]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Padmalochan Bera:
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 4(1): 273-287 (2013) - [c13]Mohammad Ashiqur Rahman, Fadi Mohsen, Ehab Al-Shaer:
A formal model for sustainable vehicle-to-grid management. SEGS@CCS 2013: 81-92 - [c12]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. CNS 2013: 73-81 - [c11]Mohammad Ashiqur Rahman, Qi Duan, Ehab Al-Shaer:
Energy efficient navigation management for hybrid electric vehicles on highways. ICCPS 2013: 21-30 - [c10]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A Formal Framework for Network Security Design Synthesis. ICDCS 2013: 560-570 - [c9]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A formal approach for network security management based on qualitative risk analysis. IM 2013: 244-251 - [c8]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Metrics for Automated Network Security Design. NDSS 2013 - [c7]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Md. Ashfaqur Rahman:
A formal model for verifying stealthy attacks on state estimation in power grids. SmartGridComm 2013: 414-419 - 2012
- [j3]Mohammad Ashiqur Rahman, Mohammad Mostofa Akbar:
A Permission based Multilevel Parallel Solution for Distributed Mutual Exclusion. J. Comput. 7(8): 1831-1846 (2012) - [c6]Mohammad Ashiqur Rahman, Padmalochan Bera, Ehab Al-Shaer:
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. INFOCOM 2012: 2255-2263 - [c5]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure. SafeConfig 2012: 59-77 - [c4]Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. TrustCom 2012: 279-286 - 2011
- [c3]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A declarative approach for global network security configuration verification and evaluation. Integrated Network Management 2011: 531-538 - [c2]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
AMIAnalyzer: Security analysis of AMI configurations. SafeConfig 2011 - 2010
- [j2]Salahuddin Mohammad Masum, Mohammad Mostofa Akbar, Amin Ahsan Ali, Mohammad Ashiqur Rahman:
A consensus-based l-Exclusion algorithm for mobile ad hoc networks. Ad Hoc Networks 8(1): 30-45 (2010) - [j1]Mohammad Ashiqur Rahman, Md. Mostofa Akbar:
A Permission Based Hierarchical Algorithm for Mutual Exclusion. J. Comput. 5(12): 1789-1799 (2010)
2000 – 2009
- 2007
- [c1]Mohammad Ashiqur Rahman, Md. Mostofa Akbar:
A Quorum Based Distributed Mutual Exclusion Algorithm for Multi-Level Clustered Network Architecture. WALCOM 2007: 121-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint