IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems A Al Farooq, E Al-Shaer, T Moyer, K Kant 2019 IFIP/IEEE symposium on integrated network and service management (IM …, 2019 | 40 | 2019 |
Performance of PCA Based Semi-supervised Learning in Face Recognition Using MPEG-7 Edge Histogram Descriptor. S Rahman, SM Naim, AA Farooq, MM Islam Journal of Multimedia 6 (5), 2011 | 17 | 2011 |
Curvelet texture based face recognition using principal component analysis S Rahman, SM Naim, A Al Farooq, MM Islam 2010 13th International Conference on Computer and Information Technology …, 2010 | 16 | 2010 |
Performance of mpeg-7 edge histogram descriptor in face recognition using principal component analysis S Rahman, SM Naim, A Al Farooq, MM Islam 2010 13th International Conference on Computer and Information Technology …, 2010 | 12 | 2010 |
A Machine Learning Approach to Classify Anti-social Bengali Comments on Social Media M Sarker, MF Hossain, FR Liza, SN Sakib, AA Farooq 2022 International Conference on Advancement in Electrical and Electronic …, 2022 | 10 | 2022 |
Detecting Safety and Security Faults in PLC Systems with Data Provenance A Farooq, J Marquard, K George, T Moyer IEEE International Symposium on Technologies for Homeland Security, 2019 | 10 | 2019 |
A formal method for detecting rule conflicts in large scale iot systems A Al-Farooq, E Al-Shaer, K Kant IFIP/IEEE IM, 2019 | 9 | 2019 |
Bio-inspired innovations in cyber security A Guthikonda, E Al-Shaer, A Farooq, MYA Raja 2017 14th International Conference on Smart Cities: Improving Quality of …, 2017 | 9 | 2017 |
Combination of Gabor and curvelet texture features for face recognition using principal component analysis S Rahman, SM Naim, AA Farooq, M Islam International Journal of Computer and Electrical Engineering 4 (3), 2012 | 6 | 2012 |
Automated synthesis of resiliency configurations for cyber networks MA Rahman, A Farooq, A Datta, E Al-Shaer 2016 IEEE Conference on Communications and Network Security (CNS), 243-251, 2016 | 3 | 2016 |
Enforcing Security Policies with Data Provenance to Enrich the Security of IoT/Smart Building System A Al Farooq The University of North Carolina at Charlotte, 2020 | 1 | 2020 |
Probabilistic Modeling of Erroneous Human Response to In-Vehicle Route Guidance Systems: A Domain Decomposition-Based Algorithm AA Farooq Old Dominion University, 2013 | 1 | 2013 |
Defeasible-PROV: Conflict Resolution in Smart Building Devices A Al Farooq, Z Taylor, K Ruona, T Moyer 2023 IEEE 47th Annual Computers, Software, and Applications Conference …, 2023 | | 2023 |
InstruPro: Instrumenting Programmable Logic Controller (PLC) based on Model Checking A Al Farooq, M Sarker 2022 IEEE Symposium Series on Computational Intelligence (SSCI), 421-428, 2022 | | 2022 |
OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack AA Farooq, T Moyer, DT Ahmed 2021 IEEE 45th Annual Computers, Software, and Applications Conference …, 2021 | | 2021 |
Verification & Synthesis of K-resiliency for Dependable SCADA E Rahman, M. A., Farooq, Abdullah Al, & Al-Shaer Science of Security Lablet Meeting, 2016, 2016 | | 2016 |
A Model for Labeling Rank of Each Node in a Directed Transportation Network AA Farooq Virginia Modeling, Analysis and Simulation Center Student Capstone Conference, 2013 | | 2013 |