default search action
Alefiya Hussain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c35]M. Patrick Collins, Alefiya Hussain, Stephen Schwab:
Identifying and Differentiating Acknowledged Scanners in Network Traffic. EuroS&P Workshops 2023: 567-574 - [c34]Alexey Tregubov, Jeremy Abramson, Christophe Hauser, Alefiya Hussain, Jim Blythe:
Modeling Cognitive Workload in Open-Source Communities via Simulation. MABS 2023: 146-159 - 2022
- [c33]Michael Collins, Alefiya Hussain, Stephen Schwab:
Towards an Operations-Aware Experimentation Methodology. EuroS&P Workshops 2022: 384-393 - [c32]Calvin Ardi, Connor Aubry, Brian Kocoloski, Dave DeAngelis, Alefiya Hussain, Matthew Troglia, Stephen Schwab:
The DARPA SEARCHLIGHT Dataset of Application Network Traffic. CSET @ USENIX Security Symposium 2022: 59-64 - [c31]David DeAngelis, Alefiya Hussain, Brian Kocoloski, Calvin Ardi, Stephen Schwab:
Generating Representative Video Teleconferencing Traffic. CSET @ USENIX Security Symposium 2022: 100-104 - 2021
- [c30]Brian Kocoloski, Alefiya Hussain, Matthew Troglia, Calvin Ardi, Steven Cheng, Dave DeAngelis, Christopher Symonds, Michael Collins, Ryan Goodfellow, Stephen Schwab:
Case Studies in Experiment Design on a minimega Based Network Emulation Testbed. CSET @ USENIX Security Symposium 2021: 83-90 - [c29]Calvin Ardi, Alefiya Hussain, Stephen Schwab:
Building Reproducible Video Streaming Traffic Generators. CSET @ USENIX Security Symposium 2021: 91-95 - 2020
- [c28]Alefiya Hussain, David DeAngelis, Erik Kline, Stephen Schwab:
Replicated Testbed Experiments for the Evaluation of a Wide-range of DDoS Defenses. EuroS&P Workshops 2020: 46-55 - [c27]Alefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel:
Toward Orchestration of Complex Networking Experiments. CSET @ USENIX Security Symposium 2020
2010 – 2019
- 2018
- [c26]Seyed Mehran Dibaji, Anuradha Annaswamy, Aranya Chakrabortty, Alefiya Hussain:
Sparse and Distributed Control of Wide-Area Power Systems with Large Communication Delays. ACC 2018: 3822-3827 - 2017
- [j8]Swati Sharma, Alefiya Hussain, Huzur Saran:
Towards repeatability & verifiability in networking experiments: A stochastic framework. J. Netw. Comput. Appl. 81: 12-23 (2017) - [c25]Paul Wood, Saurabh Bagchi, Alefiya Hussain:
Profiting from attacks on real-time price communications in smart grids. COMSNETS 2017: 158-165 - 2016
- [j7]Zahaib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, Ramesh Govindan:
DBit: Assessing statistically significant differences in CDN performance. Comput. Networks 107: 94-103 (2016) - [j6]Paul Wood, Dylan Shiltz, Thomas R. Nudell, Alefiya Hussain, Anuradha M. Annaswamy:
A Framework for Evaluating the Resilience of Dynamic Real-Time Market Mechanisms. IEEE Trans. Smart Grid 7(6): 2904-2912 (2016) - [c24]Anuradha M. Annaswamy, Alefiya Hussain, Aranya Chakrabortty, Milos Cvetkovic:
Foundations of Infrastructure-CPS. ACC 2016: 2649-2664 - [c23]Alefiya Hussain:
Resilience, a key property of Infrastructure CPS. ACC 2016: 2668 - [c22]Paul Wood, Saurabh Bagchi, Alefiya Hussain:
Defending against strategic adversaries in dynamic pricing markets for smart grids. COMSNETS 2016: 1-8 - [c21]Zahaib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, Ramesh Govindan:
DBit: Assessing Statistically Significant Differences in CDN Performance. TMA 2016 - [p1]John Wroclawski, Terry V. Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab:
DETERLab and the DETER Project. The GENI Book 2016: 35-62 - 2015
- [c20]Paul Wood, Saurabh Bagchi, Alefiya Hussain:
Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems. IPDPS Workshops 2015: 1042-1051 - 2014
- [c19]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c18]Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty, Alefiya Hussain:
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods. GameSec 2014: 350-359 - 2013
- [j5]Saurabh Amin, Galina A. Schwartz, Alefiya Hussain:
In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1): 19-24 (2013) - 2012
- [c17]Swati Sharma, Alefiya Hussain:
Markov model based experiment comparison. COMSNETS 2012: 1-2 - [c16]Alefiya Hussain, Saurabh Amin:
NCS security experimentation using DETER. HiCoNS 2012: 73-80 - [c15]Jelena Mirkovic, Hao Shi, Alefiya Hussain:
Reducing allocation errors in network testbeds. Internet Measurement Conference 2012: 495-508 - 2011
- [c14]Arun Viswanathan, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab, John Wroclawski:
A Semantic Framework for Data Analysis in Networked Systems. NSDI 2011 - [c13]Alefiya Hussain, Arun Viswanathan:
Multiresolution Semantic Visualization of Network Traffic. ICSC 2011: 364-367 - 2010
- [j4]Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko:
Tools for worm experimentation on the DETER testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 151-171 (2010)
2000 – 2009
- 2009
- [j3]Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Trans. Dependable Secur. Comput. 6(2): 81-95 (2009) - [c12]Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain:
Tools for worm experimentation on the DETER testbed. TRIDENTCOM 2009: 1-10 - 2008
- [j2]Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung:
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. IEEE Trans. Computers 57(8): 1098-1112 (2008) - 2007
- [c11]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas, Wei-Min Yao, Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement. Experimental Computer Science 2007: 8 - [c10]Jelena Mirkovic, Alefiya Hussain, Brett Wilson, Sonia Fahmy, Wei-Min Yao, Peter L. Reiher, Stephen Schwab, Roshan K. Thomas:
When is service really denied?: a user-centric dos metric. SIGMETRICS 2007: 357-358 - [c9]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - [c8]Brett Wilson, Calvin Ko, Alefiya Hussain:
SEER: A Security Experimentation EnviRonment for DETER. DETER 2007 - 2006
- [c7]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - [c6]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
Identification of Repeated Denial of Service Attacks. INFOCOM 2006 - 2005
- [c5]Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John S. Heidemann, Christos Papadopoulos, Joseph A. Bannister:
Experiences with a continuous network tracing infrastructure. MineNet 2005: 185-190 - 2004
- [j1]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
Distinguishing between single and multi-source attacks using signal processing. Comput. Networks 46(4): 479-503 (2004) - [c4]Alefiya Hussain, Aman Kapoor, John S. Heidemann:
The Effect of Detail on Ethernet Simulation. PADS 2004: 97-104 - 2003
- [c3]Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan:
COSSACK: Coordinated Suppression of Simultaneous Attacks. DISCEX (1) 2003: 2-13 - [c2]Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan:
COSSACK: Coordinated Suppression of Simultaneous Attacks. DISCEX (2) 2003: 94-96 - [c1]Alefiya Hussain, John S. Heidemann, Christos Papadopoulos:
A framework for classifying denial of service attacks. SIGCOMM 2003: 99-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint