Md. Rafiqul Islam

According to our database1, Md. Rafiqul Islam authored at least 59 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection.
Future Generation Comp. Syst., 2018

GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks.
IEEE Access, 2018

Alignment-free Cancellable Template Generation for Fingerprint based Authentication.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data.
Inf. Sci., 2017

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.
Concurrency and Computation: Practice and Experience, 2017

Applications and techniques in information and network security.
Concurrency and Computation: Practice and Experience, 2017

2016
Evolutionary optimization: A big data perspective.
J. Network and Computer Applications, 2016

Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Generation Comp. Syst., 2016

A survey of anomaly detection techniques in financial domain.
Future Generation Comp. Syst., 2016

A novel compact antenna design for secure eHealth wireless applications.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

2015
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks.
IJWNBT, 2015

A novel approach to maximize the sum-rate for MIMO broadcast channels.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach.
Proceedings of the 18th ACM International Conference on Modeling, 2015

2014
A Novel Approach for the Security Remedial in a Cloud-based E-learning Network.
JNW, 2014

Anomaly Detection in Wireless Sensor Network.
JNW, 2014

A Hybrid Wrapper-Filter Approach for Malware Detection.
JNW, 2014

Guest Editorial.
JNW, 2014

Mining frequent correlated graphs with a new measure.
Expert Syst. Appl., 2014

Intelligent Financial Fraud Detection Practices: An Investigation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Defence Against Code Injection Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Survey on Mining Program-Graph Features for Malware Analysis.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Classification of malware based on integrated static and dynamic features.
J. Network and Computer Applications, 2013

A multi-tier phishing detection and filtering approach.
J. Network and Computer Applications, 2013

Security Concerns and Remedy in a Cloud Based E-learning System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs.
Proceedings of the Security and Privacy in Communication Networks, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Exploring Timeline-Based Malware Classification.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Establishing secured communications in cluster based wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

Correlation Mining in Graph Databases with a New Measure.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
JNW, 2012

A Comparative Study of Malware Family Classification.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Detecting Unwanted Email Using VAT.
Proceedings of the Software Engineering, 2011

2010
Differentiating malware from cleanware using behavioural analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Machine Learning Approaches for Modeling Spammer Behavior.
Proceedings of the Information Retrieval Technology, 2010

2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Network and Computer Applications, 2009

Spam filtering for network traffic security on a multi-core environment.
Concurrency and Computation: Practice and Experience, 2009

An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Minimizing the Limitations of GL Analyser of Fusion Based Email Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Email Categorization Using Multi-stage Classification Technique.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2005
An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Synthesis of Full-Adder Circuit Using Reversible Logic.
Proceedings of the 17th International Conference on VLSI Design (VLSI Design 2004), 2004

On the Minimization of Multiple-Valued Input Binary-Valued Output Functions.
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004

A heuristic approach to synthesize Boolean functions using TANT network.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Medical image classfication using an efficient data mining technique.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

A comparative study among three algorithms for frequent pattern generation.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Implementation of Multiple-Valued Flip-Flips Using Pass Transistor Logic.
Proceedings of the 2004 Euromicro Symposium on Digital Systems Design (DSD 2004), Architectures, Methods and Tools, 31 August, 2004

2003
A Technique for Logic Design of Voltage-Mode Pass Transistor Based Multi-Valued Multiple-Output Logic Circuits.
Proceedings of the 33rd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2003), 2003

Reversible Logic Synthesis for Minimization of Full-Adder Circuit.
Proceedings of the 2003 Euromicro Symposium on Digital Systems Design (DSD 2003), 2003

A Heuristic Approach for Design of Easily Testable PLAs Using Pass Transistor Logic.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002


  Loading...