Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
MUSIC: Mutation-based SQL Injection Vulnerability Checking
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- The Eighth International Conference on Quality…
- 12 August 2008
TLDR
Information-Theoretic Detection of SQL Injection Attacks
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- IEEE 14th International Symposium on High…
- 25 October 2012
TLDR
Trustworthiness testing of phishing websites: A behavior model-based approach
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- Future Gener. Comput. Syst.
- 1 October 2012
TLDR
Mitigating program security vulnerabilities: Approaches and challenges
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- CSUR
- 1 June 2012
TLDR
MUTEC: Mutation-based testing of Cross Site Scripting
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- ICSE Workshop on Software Engineering for Secure…
- 19 May 2009
TLDR
Injecting Comments to Detect JavaScript Code Injection Attacks
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- IEEE 35th Annual Computer Software and…
- 18 July 2011
TLDR
Client-Side Detection of Cross-Site Request Forgery Attacks
- Hossain Shahriar, Mohammad Zulkernine
- Engineering, Computer Science
- IEEE 21st International Symposium on Software…
- 1 November 2010
TLDR
PhishTester: Automatic Testing of Phishing Attacks
- Hossain Shahriar, Mohammad Zulkernine
- Engineering, Computer Science
- Fourth International Conference on Secure…
- 9 June 2010
TLDR
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks
- Hossain Shahriar, Mohammad Zulkernine
- Computer Science
- IEEE Ninth International Conference on Dependable…
- 12 December 2011
TLDR
Effective detection of vulnerable and malicious browser extensions
- Hossain Shahriar, K. Weldemariam, Mohammad Zulkernine, Thibaud Lutellier
- Computer Science
- Comput. Secur.
- 1 November 2014
TLDR
...
1
2
3
4
5
...