U-LEACH: a routing protocol for prolonging lifetime of wireless sensor networks N Majadi International Journal of Engineering Research and Applications 2 (4), 1649-1652, 2012 | 29 | 2012 |
Real-time detection of shill bidding in online auctions: A literature review N Majadi, J Trevathan, H Gray, V Estivill-Castro, N Bergmann Computer Science Review 25, 1-18, 2017 | 17 | 2017 |
Collusive shill bidding detection in online auctions using Markov Random Field N Majadi, J Trevathan, N Bergmann Electronic Commerce Research and Applications 34, 100831, 2019 | 16 | 2019 |
A run-time algorithm for detecting shill bidding in online auctions N Majadi, J Trevathan, H Gray Journal of theoretical and applied electronic commerce research 13 (3), 17-49, 2018 | 16 | 2018 |
uAuction: Analysis, design, and implementation of a secure online auction system N Majadi, J Trevathan, N Bergmann 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 16 | 2016 |
Cloud computing technology in Bangladesh: a framework of social & economic development S Islam, MH Kabir, MJ Hossain, A Chakraborty, N Majadi European Scientific Journal 11 (18), 393-410, 2015 | 15 | 2015 |
Analysis on bidding behaviours for detecting shill bidders in online auctions N Majadi, J Trevathan, N Bergmann 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 12 | 2016 |
Cloud computing: Security issues and challenges N Majadi International Journal of Scientific & Engineering Research 4 (7), 1515, 2013 | 12 | 2013 |
A real-time detection algorithm for identifying shill bidders in multiple online auctions N Majadi, J Trevathan | 9 | 2018 |
A soft voting ensemble learning approach for credit card fraud detection M Azim Mim, N Majadi, P Mazumder Heliyon 10 (3), 1-19, 2024 | 7 | 2024 |
Energy efficient local search based target localization in an UWSN N Majadi, M Naznin, T Ahmed 2016 IEEE 12th International Conference on Wireless and Mobile Computing …, 2016 | 4 | 2016 |
Uniform distribution technique of cluster heads in leach protocol N Majadi, SR Mahmud, M Sultana International Journal on Recent Trends in Engineering & Technology 8 (1), 84, 2013 | 3 | 2013 |
Cloud Computing-Research Issues and Challenges N Majadi Proceedings of the Global Engineering, Science and Technology Conference 2012, 2012 | 3 | 2012 |
Mobile phone SIM card: A security concern in the perspective of Bangladesh N Hasan, MR Ahmed, R Islam, N Majadi 16th Int'l Conf. Computer and Information Technology, 213-217, 2014 | 2 | 2014 |
NSTU-BDTAKA: An open dataset for Bangladeshi paper currency detection and recognition MJA Rafi, M Rony, N Majadi Data in Brief 55, 110701, 2024 | | 2024 |
Detecting Collusive Seller Shill Bidding using Social Network Analysis N Majadi, J Trevathan Journal of Information System Security 20 (2), 109-137, 2024 | | 2024 |
SHILL BIDDING DETECTION IN REAL-TIME ACROSS MULTIPLE ONLINE AUCTIONS N Majadi, J Trevathan Journal of Information System Security 19 (1), 57-87, 2023 | | 2023 |
Real-Time Detection and Prevention of Shill Bidding in Online Auctions N Majadi | | 2019 |
computer science review N Majadi, J Trevathan, H Gray, V Estivill-Castro | | 2017 |
Poster: ETRACK: Energy Efficient Tracking a Mobile Object Using Under Water Sensors N Majadi, M Naznin, T Ahmed Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | | 2016 |