A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 580 | 2016 |
Classification of malware based on integrated static and dynamic features R Islam, R Tian, LM Batten, S Versteeg Journal of Network and Computer Applications 36 (2), 646-656, 2013 | 380 | 2013 |
Differentiating malware from cleanware using behavioural analysis R Tian, R Islam, L Batten, S Versteeg Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010 | 259 | 2010 |
An automated classification system based on the strings of trojan and virus families R Tian, L Batten, R Islam, S Versteeg Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009 | 182 | 2009 |
A Multi-tier Phishing Detection and Filtering Approach R Islam, J Abawajy Journal of Network and Computer Applications, 2012 | 171 | 2012 |
Hybrids of support vector machine wrapper and filter based framework for malware detection S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood Future Generation Computer Systems 55, 376-390, 2016 | 146 | 2016 |
Synthesis of full-adder circuit using reversible logic HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury 17th International Conference on VLSI Design. Proceedings., 757-760, 2004 | 128 | 2004 |
Classification of malware based on string and function feature selection R Islam, R Tian, L Batten, S Versteeg 2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010 | 115 | 2010 |
Reversible logic synthesis for minimization of full-adder circuit HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003 | 107 | 2003 |
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ... Information Sciences 379, 211-228, 2017 | 104 | 2017 |
Design and implementation of an optimal fuzzy logic controller using genetic algorithm S Khan, SF Abdulazeez, LW Adetunji, AHMZ Alam, MJE Salami, ... Journal of computer science, 2008 | 84 | 2008 |
Minimization of reversible adder circuits S Islam, MD Islam Deakin University, 2005 | 83 | 2005 |
Malware analysis and detection using data mining and machine learning classification M Chowdhury, A Rahman, R Islam International conference on applications and techniques in cyber security …, 2018 | 78 | 2018 |
Evolutionary optimization: a big data perspective M Bhattacharya, R Islam, J Abawajy Journal of network and computer applications 59, 416-426, 2016 | 75 | 2016 |
A hybrid wrapper-filter approach for malware detection M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ... Journal of networks 9 (11), 2878-2891, 2014 | 71 | 2014 |
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures AK Bairagi, R Khondoker, R Islam Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016 | 70 | 2016 |
Detecting SQL injection attacks using SNORT IDS H Alnabulsi, MR Islam, Q Mamun Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014 | 69 | 2014 |
Intelligent financial fraud detection practices: an investigation J West, M Bhattacharya, R Islam International Conference on Security and Privacy in Communication Networks …, 2015 | 61 | 2015 |
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection S Huda, R Islam, J Abawajy, J Yearwood, MM Hassan, G Fortino Future Generation Computer Systems 83, 193-207, 2018 | 50 | 2018 |
Systematic review on ai-blockchain based e-healthcare records management systems A Haddad, MH Habaebi, MR Islam, NF Hasbullah, SA Zabidi IEEE Access 10, 94583-94615, 2022 | 43 | 2022 |