Follow
Salmin Sultana
Salmin Sultana
Cloud SW Architect, Intel Labs
Verified email at intel.com
Title
Cited by
Cited by
Year
Effective key management in dynamic wireless sensor networks
SH Seo, J Won, S Sultana, E Bertino
IEEE Transactions on Information Forensics and Security 10 (2), 371-383, 2014
2102014
Characterizing failures in mobile oses: A case study with android and symbian
AK Maji, K Hao, S Sultana, S Bagchi
2010 IEEE 21st international symposium on software reliability engineering …, 2010
1482010
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013
1052013
Secure provenance transmission for streaming data
S Sultana, M Shehab, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012
912012
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks
S Sultana, E Bertino, M Shehab
2011 31st International Conference on Distributed Computing Systems …, 2011
912011
A lightweight secure provenance scheme for wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012
582012
Henet: A deep learning approach on intel® processor trace for effective exploit detection
L Chen, S Sultana, R Sahita
2018 IEEE Security and Privacy Workshops (SPW), 109-115, 2018
552018
Deep learning on execution trace data for exploit detection
L Chen, S Sultana
US Patent 10,915,631, 2021
512021
A roadmap for privacy-enhanced secure data provenance
E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ...
Journal of Intelligent Information Systems 43, 481-501, 2014
512014
Secure data provenance compression using arithmetic coding in wireless sensor networks
SR Hussain, C Wang, S Sultana, E Bertino
2014 IEEE 33rd International Performance Computing and Communications …, 2014
492014
Cryptographic capability computing
M LeMay, J Rakshit, S Deutsch, DM Durham, S Ghosh, A Nori, J Gaur, ...
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021
432021
Demonstrating a lightweight data provenance for sensor networks
B Shebaro, S Sultana, S Reddy Gopavaram, E Bertino
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
422012
Kinesis: a security incident response and prevention system for wireless sensor networks
S Sultana, D Midi, E Bertino
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
342014
SYREN: Synergistic link correlation-aware and network coding-based dissemination in wireless sensor networks
SMI Alam, S Sultana, YC Hu, S Fahmy
2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation …, 2013
252013
A file provenance system
S Sultana, E Bertino
Proceedings of the third ACM conference on Data and application security and …, 2013
252013
A distributed system for the management of fine-grained provenance
S Sultana, E Bertino
Journal of Database Management (JDM) 26 (2), 32-47, 2015
212015
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces
C Yagemann, S Sultana, L Chen, W Lee
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
192019
A comprehensive model for provenance
S Sultana, E Bertino
Advances in Conceptual Modeling: ER 2012 Workshops CMS, ECDM-NoCoDA, MoDIC …, 2012
182012
Link correlation and network coding in broadcast protocols for wireless sensor networks
SMI Alam, S Sultana, YC Hu, S Fahmy
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
162012
Henet: A deep learning approach on intel R processor trace for effective exploit detection. In 2018 IEEE Security and Privacy Workshops (SPW)
L Chen, S Sultana, R Sahita
IEEE. https://doi. org/10.1109/spw, 2018
142018
The system can't perform the operation now. Try again later.
Articles 1–20