default search action
Md. Endadul Hoque
Person information
- affiliation: Northeastern University, Boston, MA, USA
- affiliation: Purdue University, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Akib Jawad Nafis, Omar Chowdhury, Md. Endadul Hoque:
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime. CNS 2023: 1-9 - [c30]M. Hammad Mazhar, Li Li, Md. Endadul Hoque, Omar Chowdhury:
Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. WISEC 2023: 73-84 - [i2]M. Hammad Mazhar, Li Li, Md. Endadul Hoque, Omar Chowdhury:
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime. CoRR abs/2302.01452 (2023) - [i1]Akib Jawad Nafis, Omar Chowdhury, Md. Endadul Hoque:
VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime. CoRR abs/2308.12417 (2023) - 2022
- [c29]Md. Endadul Hoque:
Network (In)security: Leniency in Protocols' Design, Code and Configuration. SACMAT 2022: 5-6 - 2021
- [c28]Man Hong Hue, Joyanta Debnath, Kin Man Leung, Li Li, Mohsen Minaei, M. Hammad Mazhar, Kailiang Xian, Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau:
All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations. CCS 2021: 1100-1117 - [c27]Moosa Yahyazadeh, Sze Yiu Chau, Li Li, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque, Omar Chowdhury:
Morpheus: Bringing The (PKCS) One To Meet the Oracle. CCS 2021: 2474-2496 - 2020
- [c26]Li Li, Proyash Podder, Md. Endadul Hoque:
A formal security analysis of ZigBee (1.0 and 3.0). HotSoS 2020: 12:1-12:11 - [c25]Anthony Peterson, Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Cristina Nita-Rotaru:
aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach. RAID 2020: 225-240 - [c24]Moosa Yahyazadeh, Syed Rafiul Hussain, Md. Endadul Hoque, Omar Chowdhury:
PatrIoT: Policy Assisted Resilient Programmable IoT System. RV 2020: 151-171
2010 – 2019
- 2019
- [c23]Moosa Yahyazadeh, Proyash Podder, Md. Endadul Hoque, Omar Chowdhury:
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. SACMAT 2019: 61-72 - 2018
- [c22]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. ANRW 2018: 95 - [c21]Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. NDSS 2018 - 2017
- [j7]Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:
AnonPri: A secure anonymous private authentication protocol for RFID systems. Inf. Sci. 379: 195-210 (2017) - [c20]Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - [c19]Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - 2016
- [j6]Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Edwin Killian, Cristina Nita-Rotaru:
Automated Adversarial Testing of Unmodified Wireless Routing Implementations. IEEE/ACM Trans. Netw. 24(6): 3369-3382 (2016) - [c18]Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru:
Practical Intrusion-Tolerant Networks. ICDCS 2016: 45-56 - [c17]Md. Endadul Hoque, Cristina Nita-Rotaru:
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. SecDev 2016: 138-145 - 2015
- [b1]Md. Endadul Hoque:
Ensuring specification compliance, robustness, and security of wireless network protocols. Purdue University, USA, 2015 - [j5]Md. Endadul Hoque, Rahul Potharaju, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Taming epidemic outbreaks in mobile adhoc networks. Ad Hoc Networks 24: 57-72 (2015) - 2014
- [c16]Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Edwin Killian, Cristina Nita-Rotaru:
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. ICDCS 2014: 660-669 - 2013
- [c15]Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed, Mohammad Arif Ul Alam:
Preserving User Privacy in Pervasive Environments with a Collaborative Model. SERE (Companion) 2013: 84-93 - [c14]Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Edwin Killian, Cristina Nita-Rotaru:
Adversarial testing of wireless routing implementations. WISEC 2013: 143-148 - 2012
- [j4]Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:
User privacy protection in pervasive social networking applications using PCO. Int. J. Soc. Comput. Cyber Phys. Syst. 1(3): 242-267 (2012) - [c13]Rahul Potharaju, Md. Endadul Hoque, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh:
Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks. MASS 2012: 200-208 - 2011
- [c12]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed:
AnonPri: An efficient anonymous private authentication protocol. PerCom 2011: 102-110 - [c11]Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:
REBIVE: a reliable private data aggregation scheme for wireless sensor networks. SAC 2011: 439-444 - [c10]Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:
ProQuPri: towards anonymity protection with privacy quantification for context-aware applications. SAC 2011: 453-454 - 2010
- [j3]Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. J. Syst. Softw. 83(2): 253-270 (2010) - [j2]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed, Jong Hyuk Park:
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments. Wirel. Pers. Commun. 55(1): 65-79 (2010) - [c9]Farzana Rahman, Sheikh Iqbal Ahamed, Md. Endadul Hoque, Casey O'Brien, He Zhang, Lin Liu:
UCFC - Ubiquitous personal Carbon Footprint Calculation Platform. Green Computing Conference 2010: 425-432 - [c8]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed:
S-search: finding RFID tags using scalable and secure search protocol. SAC 2010: 439-443 - [c7]Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:
Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications. SocialCom/PASSAT 2010: 41-48
2000 – 2009
- 2009
- [j1]Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu, Pawel Gburzynski:
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks. J. Networks 4(9): 895-904 (2009) - [c6]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed:
An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments. PerCom Workshops 2009: 1-6 - [c5]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed:
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. SAC 2009: 1062-1066 - [c4]Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed, Lin Liu:
Trust based security auto-configuration for smart assisted living environments. SafeConfig 2009: 7-12 - 2008
- [c3]Sheikh Iqbal Ahamed, Farzana Rahman, Md. Endadul Hoque:
ERAP: ECC Based RFID Authentication Protocol. FTDCS 2008: 219-225 - [c2]Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. HASE 2008: 89-96 - [c1]Sheikh Iqbal Ahamed, Farzana Rahman, Md. Endadul Hoque:
Secured tag identification using EDSA (enhanced distributed scalable architecture). SAC 2008: 1902-1907
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint