Selected Journal Papers

  1. Tayebeh Rajabi+, Alvi Ataur Khalil+*, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, Mohammad Dakhilalian, Maurice Ngouen, Murtuza Jadliwala, and A. Selcuk Uluagac, Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains, ACM Distributed Ledger Technologies (DLT), Vol. 2, No. 4, December 2023 [Early Access: September 2023].
  2. Mohamadsaleh Jafari*, Mohammad Ashiqur Rahman, and Sumit Paudyal, Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems, IEEE Transactions on Information Forensics and Security (TFIS), Vol. 18, August 2023.
  3. Alvi Ataur Khalil*, Mohamed Y. Selim, Mohammad Ashiqur Rahman, Deep Learning-based Energy Harvesting with Intelligent Deployment of RIS-assisted UAV-CFmMIMOs, Computer Networks, Elsevier, Vol. 229, No. C, June 2023.
  4. A H M Jakaria*, Mohammad Ashiqur Rahman, Muneeba Asif*, Alvi Ataur Khalil*, Hisham Kholidy, Matthew Anderson, and Steven Drager, Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives, IEEE Transactions on Network and Service Management (TNSM), Vol. 20, No. 1, March 2023 [Early Access: September 2022].
  5. Mohamadsaleh Jafari*, Mohammad Ashiqur Rahman, and Sumit Paudyal, Optimal False Data Injection Attacks Against Power System Frequency Stability, IEEE Transactions on Smart Grid (TSG), Vol. 14, No. 2, March 2023 [Early Access: September 2022].
  6. Madhukrishna Priyadarsini, Padmalochan Bera, Sajal Das, Mohammad Ashiqur Rahman, A Security Enforcement Framework for SDN Controller using Game Theoretic Approach, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 20, No. 2, March-April 2023 [Early Access: March 2022].
  7. Mohammad Ashiqur Rahman, Amarjit Datta*, and Ehab Al-Shaer, Automated Configuration Synthesis for Resilient Smart Metering Infrastructure, EAI Endorsed Transactions on Security and Safety, Vol. 8, No. 28, September 2021.
  8. A K M Iqtidar Newaz, Nur Haque*, Amit Sikdar, Mohammad Ashiqur Rahman, and A. Selcuk Uluagac, A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses, ACM Transactions on Computing for Healthcare, Vol. 2, No. 3, July 2021.
  9. A H M Jakaria*, Mohammad Ashiqur Rahman, and Aniruddha Gokhale, Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model, IEEE Transactions on Network and Service Management (TNSM), Vol. 18, No. 2, June 2021 [Early Access: January 2021]
  10. Abdullah Aydeger, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya, Strategic Defense against Stealthy Link Flooding Attacks: A Signaling Game Approach, Transactions on Network Science and Engineering (TNSE), Vol. 1, No. 1, January 2021.
  11. Mohammad Ashiqur Rahman, Md. Golam Mehedi Hasan*, Mohammad Hossein Manshaei*, and Ehab Al-Shaer, A Game-Theoretic Analysis to Defend against Remote Operating System Fingerprinting, Journal of Information Security and Applications, Elsevier, Vol. 52, June 2020.
  12. Md. Golam Mehedi Hasan* and Mohammad Ashiqur Rahman, A Signaling Game Approach to Mitigate Co-Resident Attacks in an IaaS Cloud Environment, Journal of Information Security and Applications, Elsevier, Vol. 50, February 2020.
  13. Madhukrishna Priyadarsini, Joy Chandra Mukherjee, Padmalochan Bera, Shailesh Kumar, AHM Jakaria*, M Ashiqur Rahman, An Adaptive Load Balancing Scheme for-Software-defined Network Controllers, Computer Networks, Elsevier, Vol. 164, December 2019.
  14. Madhukrishna Priyadarsini, Shailesh Kumar, Padmalochan Bera, and Mohammad Ashiqur Rahman, An Energy-efficient Load Distribution Framework for SDN Controllers, Computing, Springer, August 2019.
  15. A H M Jakaria*, Mohammad Ashiqur Rahman, and Carol Fung, A Requirement-Oriented Design of NFV Topology by Formal Synthesis, IEEE Transactions on Network and Service Management (TNSM), Vol. 16,  No. 4, December 2019 [Early Access: May 2019].
  16. Mohammad Ashiqur Rahman, Amarjit Datta*, and Ehab Al-Shaer, Security Design against Stealthy Attacks on Power System State Estimation: A Formal Approach, Computers & Security, Elsevier, Vol. 84, July 2019 [Early Access: April 2019].

 

* Directly supervised student or postdoctoral fellow.
+ The authors have the same contribution.