{"id":11,"date":"2023-09-29T17:13:53","date_gmt":"2023-09-29T17:13:53","guid":{"rendered":"https:\/\/www.isi.edu\/people-hussain\/?page_id=11"},"modified":"2025-06-13T17:45:36","modified_gmt":"2025-06-13T17:45:36","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/people-hussain\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n\n\t\n        <div class=\"pubs\">\n\n                                <h2 class=\"year h4\">2024<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/20684\/conference-safespace-a-cybersecurity-workshop-for-space\" target=\"_blank\">\n                                Conference: SafeSpace: A Cybersecurity Workshop for Space                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2422664. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2024\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2023<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14712\/modeling-cognitive-workload-in-open-source-communities-via-simulation\" target=\"_blank\">\n                                Modeling cognitive workload in open-source communities via simulation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alexey Tregubov, Jeremy Abramson, Christophe Hauser, Alefiya Hussain, Jim Blythe                        <\/div>\n                    \n                    <div>\n                        <i>International Workshop on Multi-Agent Systems and Agent-Based Simulation \u2026<\/i>,&nbsp;2023\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2022<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14715\/generating-representative-video-teleconferencing-traffic\" target=\"_blank\">\n                                Generating Representative Video Teleconferencing Traffic                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            David DeAngelis, Alefiya Hussain, Brian Kocoloski, Calvin Ardi, Stephen Schwab                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 15th Workshop on Cyber Security Experimentation and Test \u2026<\/i>,&nbsp;2022\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546096.3546107\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/57892\/effect-of-malicious-traffic-on-the-network\" target=\"_blank\">\n                                Effect of malicious traffic on the network                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        2022\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/88986142\/effect_of_malicious.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14717\/a-machine-learning-ids-for-known-and-unknown-anomalies\" target=\"_blank\">\n                                A Machine Learning IDS for Known and Unknown Anomalies                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            F Aguil\u00f3\u2013Gost, Ester Sim\u00f3\u2013Mezquita, Eva Mar\u00edn\u2013Tordera, Ayaz Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2022 18th International Conference on the Design of Reliable Communication \u2026<\/i>,&nbsp;2022\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/20685\/collaborative-research-sii-nrdz-aspire-advanced-spectrum-initiative-for-research-and-experimentation\" target=\"_blank\">\n                                Collaborative Research: SII-NRDZ: ASPIRE: Advanced SPectrum Initiative for Research and Experimentation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 2232473. Directorate for Mathematical and Physical Sciences \u2026<\/i>,&nbsp;2022\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14718\/a-tutorial-on-security-and-privacy-challenges-in-cps\" target=\"_blank\">\n                                A tutorial on security and privacy challenges in CPS                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Seyed Mehran Dibaji, Alefiya Hussain, Hideaki Ishii                        <\/div>\n                    \n                    <div>\n                        <i>Security and Resilience of Control Systems: Theory and Applications, 121-146<\/i>,&nbsp;2022\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2019<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/43096\/industry-under-the-open-sky-an-exploration-of-the-political-economy-of-brick-making-in-nepal-icimod-working-paper-2019-7\" target=\"_blank\">\n                                Industry under the open sky: An exploration of the political economy of brick making in Nepal; ICIMOD Working Paper 2019\/7                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            S Sharma, K Gurung, A Mishra, S Bajracharya, L Mathema, A Hussain, BB Pradhan                        <\/div>\n                    \n                    <div>\n                        <i>(No Title)<\/i>,&nbsp;2019\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2018<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14723\/sparse-and-distributed-control-of-wide-area-power-systems-with-large-communication-delays\" target=\"_blank\">\n                                Sparse and distributed control of wide-area power systems with large communication delays                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Seyed Mehran Dibaji, Anuradha Annaswamy, Aranya Chakrabortty, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2018 Annual American Control Conference (ACC), 3822-3827<\/i>,&nbsp;2018\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14724\/delay-aware-wide-area-control-of-power-systems-over-sparse-communications-with-analytical-guarantees\" target=\"_blank\">\n                                Delay-aware wide-area control of power systems over sparse communications with analytical guarantees                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Seyed Mehran Dibaji, Anuradha Annaswamy, Aranya Chakrabortty, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>Institute of Electrical and Electronics Engineers (IEEE)<\/i>,&nbsp;2018\n\n                                                    <div>\n                                <a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/113352\/DibAnuChaHusTSGCompl.pdf?isAllowed=y&#038;sequence=1\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2017<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14725\/towards-resilient-cyber-physical-energy-systems\" target=\"_blank\">\n                                Towards resilient cyber-physical energy systems                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Stefanos Baros, Dylan Shiltz, Prateek Jaipuria, Alefiya Hussain, Anuradha M Annaswamy                        <\/div>\n                    \n                    <div>\n                        2017\n\n                                                    <div>\n                                <a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/107408\/Resilience_Alefiya_Anu_Stefanos.pdf?sequence=1&#038;isAllowed=y\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14726\/towards-repeatability-verifiability-in-networking-experiments-a-stochastic-framework\" target=\"_blank\">\n                                Towards repeatability &amp; verifiability in networking experiments: A stochastic framework                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Swati Sharma, Alefiya Hussain, Huzur Saran                        <\/div>\n                    \n                    <div>\n                        <i>Journal of Network and Computer Applications 81, 12-23<\/i>,&nbsp;2017\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14727\/profiting-from-attacks-on-real-time-price-communications-in-smart-grids\" target=\"_blank\">\n                                Profiting from attacks on real-time price communications in smart grids                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Paul Wood, Saurabh Bagchi, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2017 9th international conference on communication systems and networks \u2026<\/i>,&nbsp;2017\n\n                                                    <div>\n                                <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2017\/final_smartgridattacks_comsnets17_cameraready.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2016<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14731\/tutorial-resilience-a-key-property-of-infrastructure-cps\" target=\"_blank\">\n                                Tutorial: Resilience, a key property of Infrastructure CPS                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2016 American Control Conference (ACC), 2668-2668<\/i>,&nbsp;2016\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14732\/foundations-of-infrastructure-cps\" target=\"_blank\">\n                                Foundations of infrastructure-CPS                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Anuradha M Annaswamy, Alefiya Hussainy, Aranya Chakraborttyz, Milo\u0161 Cvetkovi\u0107                        <\/div>\n                    \n                    <div>\n                        <i>2016 American Control Conference (ACC), 2649-2664<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/99195\/annaswamy_infrastructureCPStutorial_acc_2016_Dspace.pdf?sequence=1&#038;isAllowed=y\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14729\/a-framework-for-evaluating-the-resilience-of-dynamic-real-time-market-mechanisms\" target=\"_blank\">\n                                A framework for evaluating the resilience of dynamic real-time market mechanisms                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Paul Wood, Dylan Shiltz, Thomas R Nudell, Alefiya Hussain, Anuradha M Annaswamy                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Transactions on Smart Grid 7 (6), 2904-2912<\/i>,&nbsp;2016\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14730\/mitigating-denial-of-service-attacks-in-wide-area-lqr-control\" target=\"_blank\">\n                                Mitigating denial-of-service attacks in wide-area LQR control                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Nachiappan Chockalingam, Aranya Chakrabortty, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2016 IEEE Power and Energy Society General Meeting (PESGM), 1-5<\/i>,&nbsp;2016\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14728\/dbit-assessing-statistically-significant-differences-in-cdn-performance\" target=\"_blank\">\n                                DBit: Assessing statistically significant differences in CDN performance                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Zahaib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, Ramesh Govindan                        <\/div>\n                    \n                    <div>\n                        <i>Computer Networks 107, 94-103<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"https:\/\/opendl.ifip-tc6.org\/db\/conf\/tma\/tma2016\/tma2016-final43.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14733\/defending-against-strategic-adversaries-in-dynamic-pricing-markets-for-smart-grids\" target=\"_blank\">\n                                Defending against strategic adversaries in dynamic pricing markets for smart grids                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Paul Wood, Saurabh Bagchi, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2016 8th International Conference on Communication Systems and Networks \u2026<\/i>,&nbsp;2016\n\n                                                    <div>\n                                <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2015\/final_smartgridsecurity_comsnets16_cameraready.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2015<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/20686\/cps-ttp-option-synergy-collaborative-research-hardening-network-infrastructures-for-fast-resilient-and-cost-optimal-wide-area-control-of-power-systems\" target=\"_blank\">\n                                CPS: TTP Option: Synergy: Collaborative Research: Hardening Network Infrastructures for Fast, Resilient, and Cost-Optimal Wide-Area Control of Power Systems                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1544742. Directorate for Computer and Information Science \u2026<\/i>,&nbsp;2015\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14735\/optimizing-defensive-investments-in-energy-based-cyber-physical-systems\" target=\"_blank\">\n                                Optimizing defensive investments in energy-based cyber-physical systems                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Paul Wood, Saurabh Bagchi, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2015 IEEE International Parallel and Distributed Processing Symposium \u2026<\/i>,&nbsp;2015\n\n                                                    <div>\n                                <a href=\"https:\/\/engineering.purdue.edu\/dcsl\/publications\/papers\/2015\/optimizingdefense_dpdns15.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14736\/dbit-a-methodology-for-comparing-content-distribution-networks\" target=\"_blank\">\n                                Dbit: A methodology for comparing content distribution networks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Zahaib Akhtar, Alefiya Hussain, Ethan Katz-Bassett, Ramesh Govindan                        <\/div>\n                    \n                    <div>\n                        <i>University of Southern California, Computer Science Department, Tech. Rep \u2026<\/i>,&nbsp;2015\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2014<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14737\/enabling-collaborative-research-for-security-and-resiliency-of-energy-cyber-physical-systems\" target=\"_blank\">\n                                Enabling collaborative research for security and resiliency of energy cyber physical systems                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Ted Faber, Robert Braden, Terry Benzel, Tim Yardley, Jeremy Jones, David M Nicol, William H Sanders, Thomas W Edgar, Thomas E Carroll, David O Manz, Laura Tinnel                        <\/div>\n                    \n                    <div>\n                        <i>2014 IEEE International Conference on Distributed Computing in Sensor \u2026<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/deter-project.org\/sites\/info.deterlab.net\/files\/files\/enabling%20collaborative%20research%20for%20security%20and%20resiliency%20of%20energy%20cyber%20physical%20systems.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/20687\/rips-type-2-collaborative-research-towards-resilient-computational-models-of-electricity-gas-ici\" target=\"_blank\">\n                                RIPS Type 2: Collaborative Research: Towards resilient computational models of electricity-gas ICI                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>NSF Award Number 1440468. Directorate for Engineering 14 (1440468), 40468<\/i>,&nbsp;2014\n\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14738\/a-distributed-optimization-algorithm-for-attack-resilient-wide-area-monitoring-of-power-systems-theoretical-and-experimental-methods\" target=\"_blank\">\n                                A distributed optimization algorithm for attack-resilient wide-area monitoring of power systems: Theoretical and experimental methods                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>Decision and Game Theory for Security: 5th International Conference, GameSec \u2026<\/i>,&nbsp;2014\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=f75ac42e5b8f2bbe6574963bfbc3b6a752e3af33\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2013<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14740\/in-quest-of-benchmarking-security-risks-to-cyber-physical-systems\" target=\"_blank\">\n                                In quest of benchmarking security risks to cyber-physical systems                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Saurabh Amin, Galina A Schwartz, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Network 27 (1), 19-24<\/i>,&nbsp;2013\n\n                                                    <div>\n                                <a href=\"https:\/\/people.eecs.berkeley.edu\/~sastry\/pubs\/Pdfs%20of%202013\/AminInQuestof2013.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2012<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14742\/montage-topology-manager-tools-for-constructing-and-sharing-representative-internet-topologies\" target=\"_blank\">\n                                Montage topology manager: Tools for constructing and sharing representative internet topologies                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Jennifer Chen                        <\/div>\n                    \n                    <div>\n                        <i>Technical Report-684<\/i>,&nbsp;2012\n\n                                                    <div>\n                                <a href=\"https:\/\/deter-project.org\/sites\/default\/files\/photos\/tech%20rprt_deter_montage%20topology%20mgr_isi-tr-684_20120817.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14743\/experience-with-heterogenous-clock-skew-based-device-fingerprinting\" target=\"_blank\">\n                                Experience with heterogenous clock-skew based device fingerprinting                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Swati Sharma, Alefiya Hussain, Huzur Saran                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2012 Workshop on Learning from Authoritative Security \u2026<\/i>,&nbsp;2012\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Alefiya-Hussain\/publication\/262396262_Experience_with_heterogenous_clock-skew_based_device_fingerprinting\/links\/53d049c00cf2f7e53cfb7395\/Experience-with-heterogenous-clock-skew-based-device-fingerprinting.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14744\/ncs-security-experimentation-using-deter\" target=\"_blank\">\n                                NCS security experimentation using DETER                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Saurabh Amin                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 1st international conference on High Confidence Networked \u2026<\/i>,&nbsp;2012\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/88986166\/hussain_20alefiya_amin_20saurabh_ncs_20security_20experimentation_20using_20deter_acm_hicons12_beijing_20china_april_2017-18_202012.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14741\/reducing-allocation-errors-in-network-testbeds\" target=\"_blank\">\n                                Reducing allocation errors in network testbeds                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Hao Shi, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2012 Internet Measurement Conference, 495-508<\/i>,&nbsp;2012\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/imc12-final-1.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14745\/markov-model-based-experiment-comparison\" target=\"_blank\">\n                                Markov model based experiment comparison                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Swati Sharma, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>2012 Fourth International Conference on Communication Systems and Networks \u2026<\/i>,&nbsp;2012\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2011<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14746\/multiresolution-semantic-visualization-of-network-traffic\" target=\"_blank\">\n                                Multiresolution semantic visualization of network traffic                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Arun Viswanathan                        <\/div>\n                    \n                    <div>\n                        <i>2011 IEEE Fifth International Conference on Semantic Computing, 364-367<\/i>,&nbsp;2011\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Alefiya-Hussain\/publication\/221406118_Multiresolution_Semantic_Visualization_of_Network_Traffic\/links\/0c960531e0757bda64000000\/Multiresolution-Semantic-Visualization-of-Network-Traffic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14747\/thirdeye-for-semantic-analysis-of-experiment-data-deter-at-a-glance\" target=\"_blank\">\n                                ThirdEye for Semantic Analysis of Experiment Data: DETER at a Glance                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Arun Viswanathan, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>The DETER Testbed Newsletter<\/i>,&nbsp;2011\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2010<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14749\/tools-for-worm-experimentation-on-the-deter-testbed\" target=\"_blank\">\n                                Tools for worm experimentation on the DETER testbed                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko                        <\/div>\n                    \n                    <div>\n                        <i>International Journal of Communication Networks and Distributed Systems 5 (1 \u2026<\/i>,&nbsp;2010\n\n                                                    <div>\n                                <a href=\"https:\/\/www.isi.edu\/people-mirkovic\/wp-content\/uploads\/sites\/52\/2023\/10\/trident09.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2008<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14751\/testing-a-collaborative-ddos-defense-in-a-red-team-blue-team-exercise\" target=\"_blank\">\n                                Testing a collaborative DDoS defense in a red team\/blue team exercise                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Transactions on Computers 57 (8), 1098-1112<\/i>,&nbsp;2008\n\n                                                    <div>\n                                <a href=\"https:\/\/lasr.cs.ucla.edu\/lasr-members\/reiher\/papers\/acm_transactions_2008.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14750\/accurately-measuring-denial-of-service-in-simulation-and-testbed-experiments\" target=\"_blank\">\n                                Accurately measuring denial of service in simulation and testbed experiments                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, Roshan K Thomas                        <\/div>\n                    \n                    <div>\n                        <i>IEEE Transactions on Dependable and Secure Computing 6 (2), 81-95<\/i>,&nbsp;2008\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2007<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14752\/automating-ddos-experimentation\" target=\"_blank\">\n                                Automating DDoS Experimentation.                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Brett Wilson, Alefiya Hussain, Sonia Fahmy, Peter Reiher, Roshan Thomas, Stephen Schwab                        <\/div>\n                    \n                    <div>\n                        <i>Usenix Workshop on Cyber Security Experimentation<\/i>,&nbsp;2007\n\n                                                    <div>\n                                <a href=\"https:\/\/www.usenix.org\/event\/deter07\/tech\/full_papers\/mirkovic\/mirkovic.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14757\/seer-a-security-experimentation-environment-for-deter\" target=\"_blank\">\n                                {SEER}: A Security Experimentation {EnviRonment} for {DETER}                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Brett Wilson, Calvin Ko, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>DETER Community Workshop on Cyber Security Experimentation and Test 2007 \u2026<\/i>,&nbsp;2007\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2006<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14762\/measuring-impact-of-dos-attacks\" target=\"_blank\">\n                                Measuring impact of dos attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan Thomas, Alefiya Hussain, Steven Schwab, Calvin Ko                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the DETER community workshop on cyber security experimentation<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=a1a8307df404d5b6ddb6003cfcd17d640a28d986\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14763\/identification-of-repeated-denial-of-service-attacks\" target=\"_blank\">\n                                Identification of repeated denial of service attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, John Heidemann, Christos Papadopoulos                        <\/div>\n                    \n                    <div>\n                        <i>INFOCOM 2006. 25th IEEE International Conference on Computer Communications \u2026<\/i>,&nbsp;2006\n\n                                                    <div>\n                                <a href=\"http:\/\/www1.cs.columbia.edu\/~danr\/courses\/6772\/Fall06\/papers\/ident-repeated.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2005<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14764\/experiences-with-a-continuous-network-tracing-infrastructure\" target=\"_blank\">\n                                Experiences with a continuous network tracing infrastructure                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John Heidemann, Christos Papadopoulos, Joseph Bannister                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, 185-190<\/i>,&nbsp;2005\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080173.1080181\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14765\/spectral-analysis-of-bottleneck-traffic\" target=\"_blank\">\n                                Spectral analysis of bottleneck traffic                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, Usman Riaz, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>University of Southern California, Department of Computer Science, Tech. Rep \u2026<\/i>,&nbsp;2005\n\n                                                    <div>\n                                <a href=\"http:\/\/www.cs.colostate.edu\/~christos\/papers\/He05a.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14766\/measurement-and-spectral-analysis-of-denial-of-service-attacks\" target=\"_blank\">\n                                Measurement and spectral analysis of denial of service attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Naveed Hussain, John Adviser-Heidemann, Christos Adviser-Papadopoulos                        <\/div>\n                    \n                    <div>\n                        <i>PhD Thesis, 1-200<\/i>,&nbsp;2005\n\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2004<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14768\/spectral-characteristics-of-saturated-links\" target=\"_blank\">\n                                Spectral characteristics of saturated links                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Xinming He, Christos Papadopoulos, John Heidemann, Alefiya Hussain                        <\/div>\n                    \n                    <div>\n                        <i>Under Submission<\/i>,&nbsp;2004\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=ef1e1db17b3508a444d49d26ce1528863687c396\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14769\/the-effect-of-detail-on-ethernet-simulation\" target=\"_blank\">\n                                The effect of detail on Ethernet simulation                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, Aman Kapoor, John Heidemann                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the eighteenth workshop on Parallel and distributed \u2026<\/i>,&nbsp;2004\n\n                                                    <div>\n                                <a href=\"https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&#038;type=pdf&#038;doi=54ab86e950e81560b223e8384dfd943da3f48d1a\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14767\/distinguishing-between-single-and-multi-source-attacks-using-signal-processing\" target=\"_blank\">\n                                Distinguishing between single and multi-source attacks using signal processing                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, John Heidemann, Christos Papadopoulos                        <\/div>\n                    \n                    <div>\n                        <i>Computer Networks 46 (4), 479-503<\/i>,&nbsp;2004\n\n                                                    <div>\n                                <a href=\"https:\/\/www.academia.edu\/download\/85086919\/Hussain04b.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n                                <h2 class=\"year h4\">2003<\/h2>\n                \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14770\/a-framework-for-classifying-denial-of-service-attacks\" target=\"_blank\">\n                                A framework for classifying denial of service attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Alefiya Hussain, John Heidemann, Christos Papadopoulos                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings of the 2003 conference on Applications, technologies \u2026<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/863955.863968\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14772\/effect-of-malicious-traffic-on-the-network\" target=\"_blank\">\n                                Effect of malicious traffic on the network                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta                        <\/div>\n                    \n                    <div>\n                        <i>Passive and Active Measurement Workshop (PAM)<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"https:\/\/www.researchgate.net\/profile\/Alefiya-Hussain\/publication\/228611227_The_Effect_of_Malicious_Traffic_on_the_Network\/links\/0c960531e07573cac7000000\/The-Effect-of-Malicious-Traffic-on-the-Network.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n                <div class=\"pub\">\n                    <h3 class=\"title\">\n                                                    <a href=\"https:\/\/www.isi.edu\/people-hussain\/results\/publications\/14771\/cossack-coordinated-suppression-of-simultaneous-attacks\" target=\"_blank\">\n                                Cossack: Coordinated suppression of simultaneous attacks                            <\/a>\n                                            <\/h3>\n\n                                            <div class=\"authors\">\n                            Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan                        <\/div>\n                    \n                    <div>\n                        <i>Proceedings DARPA information survivability conference and exposition 1, 2-13<\/i>,&nbsp;2003\n\n                                                    <div>\n                                <a href=\"http:\/\/www.cs.colostate.edu\/~christos\/papers\/discex03.pdf\" class=\"font-weight-normal\"\n                                   target=\"_blank\">View Paper<\/a>\n                            <\/div>\n                                            <\/div>\n\n                <\/div>\n\n            \n        <\/div>\n\n        \n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":421,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Alefiya Hussain<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/people-hussain\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Alefiya Hussain\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/people-hussain\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Alefiya Hussain\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T17:45:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/people-hussain\/publications\/\",\"url\":\"https:\/\/www.isi.edu\/people-hussain\/publications\/\",\"name\":\"Publications - Alefiya Hussain\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/people-hussain\/#website\"},\"datePublished\":\"2023-09-29T17:13:53+00:00\",\"dateModified\":\"2025-06-13T17:45:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/people-hussain\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/people-hussain\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/people-hussain\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/people-hussain\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/people-hussain\/#website\",\"url\":\"https:\/\/www.isi.edu\/people-hussain\/\",\"name\":\"Alefiya Hussain\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/people-hussain\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Alefiya Hussain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/people-hussain\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Alefiya Hussain","og_url":"https:\/\/www.isi.edu\/people-hussain\/publications\/","og_site_name":"Alefiya Hussain","article_modified_time":"2025-06-13T17:45:36+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/people-hussain\/publications\/","url":"https:\/\/www.isi.edu\/people-hussain\/publications\/","name":"Publications - Alefiya Hussain","isPartOf":{"@id":"https:\/\/www.isi.edu\/people-hussain\/#website"},"datePublished":"2023-09-29T17:13:53+00:00","dateModified":"2025-06-13T17:45:36+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/people-hussain\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/people-hussain\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/people-hussain\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/people-hussain\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/people-hussain\/#website","url":"https:\/\/www.isi.edu\/people-hussain\/","name":"Alefiya Hussain","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/people-hussain\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/people-hussain\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}