Maximum damage malware attack in mobile wireless networks MHR Khouzani, S Sarkar, E Altman IEEE/ACM Transactions on Networking 20 (5), 1347-1360, 2012 | 146 | 2012 |
Optimal control of epidemic evolution MHR Khouzani, S Sarkar, E Altman 2011 Proceedings IEEE INFOCOM, 1683-1691, 2011 | 103 | 2011 |
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs MHR Khouzani, Z Liu, P Malacaria European Journal of Operational Research 278 (3), 894-903, 2019 | 93 | 2019 |
Optimal patching in clustered malware epidemics S Eshghi, MHR Khouzani, S Sarkar, SS Venkatesh IEEE/ACM Transactions on Networking 24 (1), 283-298, 2014 | 81 | 2014 |
Malware diffusion models for modern complex networks: theory and applications V Karyotis, MHR Khouzani Morgan Kaufmann, 2016 | 78 | 2016 |
Optimal energy-aware epidemic routing in DTNs MHR Khouzani, S Eshghi, S Sarkar, NB Shroff, SS Venkatesh Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc …, 2012 | 61 | 2012 |
Maximum damage battery depletion attack in mobile sensor networks MHR Khouzani, S Sarkar IEEE Transactions on Automatic Control 56 (10), 2358-2368, 2011 | 59 | 2011 |
Saddle-point strategies in malware attack MHR Khouzani, S Sarkar, E Altman IEEE Journal on Selected Areas in Communications 30 (1), 31-43, 2011 | 48 | 2011 |
Optimal energy-aware epidemic routing in DTNs S Eshghi, MHR Khouzani, S Sarkar, NB Shroff, SS Venkatesh IEEE Transactions on Automatic Control 60 (6), 1554-1569, 2015 | 44 | 2015 |
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks MHR Khouzani, S Sarkar, E Altman 49th IEEE Conference on Decision and Control (CDC), 2354-2359, 2010 | 44 | 2010 |
A dynamic game solution to malware attack MHR Khouzani, S Sarkar, E Altman 2011 Proceedings IEEE INFOCOM, 2138-2146, 2011 | 41 | 2011 |
Malware detection using 1-dimensional convolutional neural networks A Sharma, P Malacaria, MHR Khouzani 2019 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2019 | 40 | 2019 |
Strategic discovery and sharing of vulnerabilities in competitive environments MHR Khouzani, V Pham, C Cid Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 40 | 2014 |
Optimal routing and scheduling in multihop wireless renewable energy networks S Sarkar, MHR Khouzani, K Kar IEEE Transactions on Automatic Control 58 (7), 1792-1798, 2013 | 36 | 2013 |
Optimal quarantining of wireless malware through reception gain control MHR Khouzani, E Altman, S Sarkar IEEE Transactions on Automatic Control 57 (1), 49-61, 2011 | 36 | 2011 |
Pseudo-random number generation using generative adversarial networks M De Bernardi, MHR Khouzani, P Malacaria ECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe …, 2019 | 33 | 2019 |
Symbolic side-channel analysis for probabilistic programs P Malacaria, MHR Khouzani, CS Pasareanu, QS Phan, K Luckow 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 313-327, 2018 | 31 | 2018 |
Optimal contracts for outsourced computation V Pham, MHR Khouzani, C Cid Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 30 | 2014 |
Optimal quarantining of wireless malware through power control MHR Khouzani, E Altman, S Sarkar 2009 Information Theory and Applications Workshop, 301-310, 2009 | 24 | 2009 |
Relative perfect secrecy: Universally optimal strategies and channel design MHR Khouzani, P Malacaria 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 61-76, 2016 | 23 | 2016 |