BibBase hussain, a
generated by bibbase.org
  2022 (1)
A Tutorial on Security and Privacy Challenges in CPS. Dibaji, S. M.; Hussain, A.; and Ishii, H. Security and Resilience of Control Systems,121–146. 2022.
link   bibtex  
  2021 (2)
Case Studies in Experiment Design on a minimega Based Network Emulation Testbed. Kocoloski, B.; Hussain, A.; Troglia, M.; Ardi, C.; Cheng, S.; DeAngelis, D.; Symonds, C.; Collins, M.; Goodfellow, R.; and Schwab, S. In Cyber Security Experimentation and Test Workshop, pages 83–90, 2021.
link   bibtex  
Building Reproducible Video Streaming Traffic Generators. Ardi, C.; Hussain, A.; and Schwab, S. In Cyber Security Experimentation and Test Workshop, pages 91–95, 2021.
link   bibtex  
  2020 (2)
Toward orchestration of complex networking experiments. Hussain, A.; Jaipuria, P.; Lawler, G.; Schwab, S.; and Benzel, T. In 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020.
link   bibtex  
Replicated Testbed Experiments for the Evaluation of a Wide-range of DDoS Defenses. Hussain, A.; DeAngelis, D.; Kline, E.; and Schwab, S. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 46–55, 2020. IEEE
link   bibtex  
  2018 (2)
Delay-aware wide-area control of power systems over sparse communications with analytical guarantees. Dibaji, S. M.; Annaswamy, A.; Chakrabortty, A.; and Hussain, A. . 2018.
link   bibtex  
Sparse and distributed control of wide-area power systems with large communication delays. Dibaji, S. M.; Annaswamy, A.; Chakrabortty, A.; and Hussain, A. In 2018 Annual American Control Conference (ACC), pages 3822–3827, 2018. IEEE
link   bibtex  
  2017 (5)
A Comparative Study of Network Testbed Usage Characteristics. Mirkovic, J.; Hussain, A.; and Shi, H. . 2017.
link   bibtex  
A Calibration Methodology for Networked Cybersecurity Testbed Environments. Ghatge, V.; Jaipuria, P.; and Hussain, A. . 2017.
link   bibtex  
Towards repeatability & verifiability in networking experiments: A stochastic framework. Sharma, S.; Hussain, A.; and Saran, H. Journal of Network and Computer Applications, 81: 12–23. 2017.
link   bibtex  
Profiting from attacks on real-time price communications in smart grids. Wood, P.; Bagchi, S.; and Hussain, A. In 2017 9th International Conference on Communication Systems and Networks (COMSNETS), pages 158–165, 2017. IEEE
link   bibtex  
Towards resilient cyber-physical energy systems. Baros, S.; Shiltz, D.; Jaipuria, P.; Hussain, A.; and Annaswamy, A. M . 2017.
link   bibtex  
  2016 (7)
Foundations of infrastructure-CPS. Annaswamy, A. M; Hussainy, A.; Chakraborttyz, A.; and Cvetković, M. In 2016 American Control Conference (ACC), pages 2649–2664, 2016. IEEE
link   bibtex  
Defending against strategic adversaries in dynamic pricing markets for smart grids. Wood, P.; Bagchi, S.; and Hussain, A. In 2016 8th International Conference on Communication Systems and Networks (COMSNETS), pages 1–8, 2016. IEEE
link   bibtex  
DBit: assessing statistically significant differences in CDN performance. Akhtar, Z.; Hussain, A.; Katz-Bassett, E.; and Govindan, R. Computer Networks, 107: 94–103. 2016.
link   bibtex  
Tutorial: Resilience, a key property of Infrastructure CPS. Hussain, A. In 2016 American Control Conference (ACC), pages 2668–2668, 2016. IEEE
link   bibtex  
A framework for evaluating the resilience of dynamic real-time market mechanisms. Wood, P.; Shiltz, D.; Nudell, T. R; Hussain, A.; and Annaswamy, A. M IEEE Transactions on Smart Grid, 7(6): 2904–2912. 2016.
link   bibtex  
DETERLab and the DETER Project. Wroclawski, J.; Benzel, T.; Blythe, J.; Faber, T.; Hussain, A.; Mirkovic, J.; and Schwab, S. In The GENI Book, pages 35–62. Springer, Cham, 2016.
link   bibtex  
Mitigating denial-of-service attacks in wide-area LQR control. Chockalingam, N.; Chakrabortty, A.; and Hussain, A. In 2016 IEEE Power and Energy Society General Meeting (PESGM), pages 1–5, 2016. IEEE
link   bibtex  
  2015 (2)
Optimizing defensive investments in energy-based cyber-physical systems. Wood, P.; Bagchi, S.; and Hussain, A. In 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, pages 1042–1051, 2015. IEEE
link   bibtex  
Dbit: A methodology for comparing content distribution networks. Akhtar, Z.; Hussain, A.; Katz-Bassett, E.; and Govindan, R. University of Southern California, Computer Science Department, Tech. Rep,15–957. 2015.
link   bibtex  
  2014 (2)
Enabling collaborative research for security and resiliency of energy cyber physical systems. Hussain, A.; Faber, T.; Braden, R.; Benzel, T.; Yardley, T.; Jones, J.; Nicol, D. M; Sanders, W. H; Edgar, T. W; Carroll, T. E; and others In 2014 IEEE International Conference on Distributed Computing in Sensor Systems, pages 358–360, 2014. IEEE
link   bibtex  
A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods. Zhang, J.; Jaipuria, P.; Chakrabortty, A.; and Hussain, A. In International Conference on Decision and Game Theory for Security, pages 350–359, 2014. Springer, Cham
link   bibtex  
  2013 (2)
In quest of benchmarking security risks to cyber-physical systems. Amin, S.; Schwartz, G. A; and Hussain, A. IEEE Network, 27(1): 19–24. 2013.
link   bibtex  
Replay of malicious traffic in network testbeds. Hussain, A.; Pradkin, Y.; and Heidemann, J. In 2013 IEEE International Conference on Technologies for Homeland Security (HST), pages 322–327, 2013. IEEE
link   bibtex  
  2012 (5)
Markov model based experiment comparison. Sharma, S.; and Hussain, A. In 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pages 1–2, 2012. IEEE
link   bibtex  
NCS security experimentation using DETER. Hussain, A.; and Amin, S. In Proceedings of the 1st international conference on High Confidence Networked Systems, pages 73–80, 2012.
link   bibtex  
Reducing allocation errors in network testbeds. Mirkovic, J.; Shi, H.; and Hussain, A. In Proceedings of the 2012 Internet Measurement Conference, pages 495–508, 2012.
link   bibtex  
Montage topology manager: Tools for constructing and sharing representative internet topologies. Hussain, A.; and Chen, J. Technical Report Technical Report ISI-TR-684, Information Sciences Institute, 2012.
link   bibtex  
Experience with heterogenous clock-skew based device fingerprinting. Sharma, S.; Hussain, A.; and Saran, H. In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, pages 9–18, 2012.
link   bibtex  
  2011 (3)
A semantic framework for data analysis in networked systems. Viswanathan, A.; Hussain, A.; Mirkovic, J.; Schwab, S.; and Wroclawski, J. In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011.
link   bibtex  
Multiresolution semantic visualization of network traffic. Hussain, A.; and Viswanathan, A. In 2011 IEEE Fifth International Conference on Semantic Computing, pages 364–367, 2011. IEEE
link   bibtex  
ThirdEye for Semantic Analysis of Experiment Data: DETER at a Glance. Viswanathan, A.; and Hussain, A. 2011.
link   bibtex  
  2010 (1)
Tools for worm experimentation on the DETER testbed. Wei, S.; Hussain, A.; Mirkovic, J.; and Ko, C. International Journal of Communication Networks and Distributed Systems, 5(1-2): 151–171. 2010.
link   bibtex  
  2008 (2)
Accurately measuring denial of service in simulation and testbed experiments. Mirkovic, J.; Hussain, A.; Fahmy, S.; Reiher, P.; and Thomas, R. K IEEE Transactions on Dependable and Secure Computing, 6(2): 81–95. 2008.
link   bibtex  
Testing a collaborative DDoS defense in a red team/blue team exercise. Mirkovic, J.; Reiher, P.; Papadopoulos, C.; Hussain, A.; Shepard, M.; Berg, M.; and Jung, R. IEEE Transactions on Computers, 57(8): 1098–1112. 2008.
link   bibtex  
  2007 (8)
Towards user-centric metrics for denial-of-service measurement. Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S. In Proceedings of the 2007 workshop on Experimental computer science, pages 8–es, 2007.
link   bibtex  
Seer: A security experimentation environment for deter. Schwab, S.; Wilson, B.; Ko, C.; and Hussain, A. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, pages 2–2, 2007.
link   bibtex  
DDoS benchmarks and experimenter's workbench for the DETER testbed. Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; Schwab, S.; Fahmy, S.; Chertov, R.; and Reiher, P. In 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, pages 1–7, 2007. IEEE
link   bibtex  
Automating DDoS Experimentation. Mirkovic, J.; Wilson, B.; Hussain, A.; Fahmy, S.; Reiher, P.; Thomas, R.; and Schwab, S. In Usenix Workshop on Cyber Security Experimentation, 2007.
link   bibtex  
When is service really denied? a user-centric dos metric. Mirkovic, J.; Hussain, A.; Willson, B.; Fahmy, S.; Yao, W.; Reiher, P.; Schwab, S.; and Thomas, R. In Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 357–358, 2007.
link   bibtex  
A user-centric metric for denial-of-service measurement. Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S. In Proc. of Workshop on Experimental Comp. Sci, 2007.
link   bibtex  
DDoS benchmarks and experimentation workbench for the DETER testbed. Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; and Schwab, S. In In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007, 2007.
link   bibtex  
$\{$SEER$\}$: A Security Experimentation $\{$EnviRonment$\}$ for $\{$DETER$\}$. Wilson, B.; Ko, C.; and Hussain, A. In DETER Community Workshop on Cyber Security Experimentation and Test 2007 (DETER 2007), 2007.
link   bibtex  
  2006 (5)
Identification of repeated denial of service attacks. Hussain, A.; Heidemann, J.; and Papadopoulos, C. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pages 1–15, 2006. IEEE
link   bibtex  
Measuring denial of service. Mirkovic, J.; Reiher, P.; Fahmy, S.; Thomas, R.; Hussain, A.; Schwab, S.; and Ko, C. In Proceedings of the 2nd ACM workshop on Quality of protection, pages 53–58, 2006.
link   bibtex  
DDoS experiment methodology. Hussain, A.; Schwab, S.; Thomas, R.; Fahmy, S.; and Mirkovic, J. In Proceedings of the DETER community workshop on cyber security experimentation, volume 8, 2006.
link   bibtex  
Measuring impact of dos attacks. Mirkovic, J.; Fahmy, S.; Reiher, P.; Thomas, R.; Hussain, A.; Schwab, S.; and Ko, C. In Proceedings of the DETER community workshop on cyber security experimentation, 2006.
link   bibtex  
Towards systematic IDS evaluation. Ko, C.; Hussain, A.; Schwab, S.; Thomas, R.; and Wilson, B. In Proceedings of DETER Community Workshop, pages 20–23, 2006.
link   bibtex  
  2005 (3)
Experiences with a continuous network tracing infrastructure. Hussain, A.; Bartlett, G.; Pryadkin, Y.; Heidemann, J.; Papadopoulos, C.; and Bannister, J. In Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pages 185–190, 2005.
link   bibtex  
Measurement and spectral analysis of denial of service attacks. Hussain, A. N.; Adviser-Heidemann, J.; and Adviser-Papadopoulos, C. Ph.D. Thesis, University of Southern California, 2005.
link   bibtex  
Spectral analysis of bottleneck traffic. He, X.; Papadopoulos, C.; Heidemann, J.; Mitra, U.; Riaz, U.; and Hussain, A. University of Southern California, Department of Computer Science, Tech. Rep. USC-CSDTR-05-854. 2005.
link   bibtex  
  2004 (3)
The effect of detail on Ethernet simulation. Hussain, A.; Kapoor, A.; and Heidemann, J. In 18th Workshop on Parallel and Distributed Simulation, 2004. PADS 2004., pages 97–104, 2004. IEEE
link   bibtex  
Distinguishing between single and multi-source attacks using signal processing. Hussain, A.; Heidemann, J.; and Papadopoulos, C. Computer Networks, 46(4): 479–503. 2004.
link   bibtex  
  2003 (3)
A framework for classifying denial of service attacks. Hussain, A.; Heidemann, J.; and Papadopoulos, C. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 99–110, 2003.
link   bibtex  
Cossack: Coordinated suppression of simultaneous attacks. Papadopoulos, C.; Lindell, R.; Mehringer, J.; Hussain, A.; and Govindan, R. In Proceedings DARPA information survivability conference and exposition, volume 1, pages 2–13, 2003. IEEE
link   bibtex  
Effect of malicious traffic on the network. Lan, K.; Hussain, A.; and Dutta, D. In Passive and Active Measurement Workshop (PAM), 2003.
link   bibtex