Md. Rafiqul Islam

Orcid: 0000-0001-8317-5727

Affiliations:
  • Charles Sturt University, Albury, School of Computing and Mathematics
  • University of Dhaka, Department of Computer Science and Engineering
  • Deakin University, Melbourne, School of Information Technology


According to our database1, Md. Rafiqul Islam authored at least 115 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modified anisotropic diffusion and level-set segmentation for breast cancer.
Multim. Tools Appl., February, 2024

Darknet Traffic Analysis: A Systematic Literature Review.
IEEE Access, 2024

2023
DFCV: a framework for evaluation deep learning in early detection and classification of lung cancer.
Multim. Tools Appl., November, 2023

Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.
Sensors, September, 2023

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach.
IEEE Trans. Ind. Informatics, 2023

Darknet Traffic Analysis A Systematic Literature Review.
CoRR, 2023

Malware Resistant Data Protection in Hyper-connected Networks: A survey.
CoRR, 2023

A Review of Methodologies for Fake News Analysis.
IEEE Access, 2023

On the Development of a Protection Profile Module for Encryption Key Management Components.
IEEE Access, 2023

Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification.
IEEE Access, 2023

A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms.
IEEE Access, 2023

Analysing the Threat Landscape Inside the Dark Web.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function.
Future Internet, 2022

Lightweight cryptography in IoT networks: A survey.
Future Gener. Comput. Syst., 2022

Do Religious Values Influence the Decision of Saudi Arabian Public Sector Employees to Adopt Government Resource Planning Systems?
IEEE Access, 2022

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022

How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond.
IEEE Access, 2022

The Anonymity of the Dark Web: A Survey.
IEEE Access, 2022

Real-Time Detection of TOR Attacks from the Dark Web.
Proceedings of the ICR'22 International Conference on Innovations in Computing Research, 2022

2021
HSDLM: A Hybrid Sampling With Deep Learning Method for Imbalanced Data Classification.
Int. J. Cloud Appl. Comput., 2021

De-Anonymisation Attacks on Tor: A Survey.
IEEE Commun. Surv. Tutorials, 2021

An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Detecting malicious COVID-19 URLs using machine learning techniques.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Active Learning with an Adaptive Classifier for Inaccessible Big Data Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey.
CoRR, 2020

Anonymity with Tor: A Survey on Tor Attacks.
CoRR, 2020

Detecting Malicious URLs of COVID-19 Pandemic using ML technologies.
CoRR, 2020

2019
Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Protecting Code Injection Attacks in Intelligent Transportation System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection.
Future Gener. Comput. Syst., 2018

GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks.
IEEE Access, 2018

A Survey of Big Data Security Solutions in Healthcare.
Proceedings of the Security and Privacy in Communication Networks, 2018

Malware Detection for Healthcare Data Security.
Proceedings of the Security and Privacy in Communication Networks, 2018

Alignment-free Cancellable Template Generation for Fingerprint based Authentication.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Security and Privacy Protection for eHealth Data.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

2017
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data.
Inf. Sci., 2017

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.
Concurr. Comput. Pract. Exp., 2017

Robust human detection and localization in security applications.
Concurr. Comput. Pract. Exp., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017

Applications and techniques in information and network security.
Concurr. Comput. Pract. Exp., 2017

Privacy in Social Media.
Proceedings of the Security and Privacy in Communication Networks, 2017

Securing Healthcare Data Using Biometric Authentication.
Proceedings of the Security and Privacy in Communication Networks, 2017

Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2017

Fast and Robust Biometric Authentication Scheme Using Human Ear.
Proceedings of the Security and Privacy in Communication Networks, 2017

AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017

Robust fingerprint verification for enhancing security in healthcare system.
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017

2016
Evolutionary optimization: A big data perspective.
J. Netw. Comput. Appl., 2016

Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Gener. Comput. Syst., 2016

A survey of anomaly detection techniques in financial domain.
Future Gener. Comput. Syst., 2016

A novel compact antenna design for secure eHealth wireless applications.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Distance Measurement of Objects using Stereo Vision.
Proceedings of the 9th Hellenic Conference on Artificial Intelligence, 2016

Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy.
Proceedings of the Security and Privacy in Communication Networks, 2016

Biometric Authentication Using Facial Recognition.
Proceedings of the Security and Privacy in Communication Networks, 2016

Fuzzy rule based approach for face and facial feature extraction in biometric authentication.
Proceedings of the 2016 International Conference on Image and Vision Computing New Zealand, 2016

Detection of Human Faces Using Neural Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Fuzzy logic based filtering for image de-noising.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

2015
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks.
Int. J. Wirel. Networks Broadband Technol., 2015

A novel approach to maximize the sum-rate for MIMO broadcast channels.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks.
Proceedings of the Security and Privacy in Communication Networks, 2015

Human Surveillance System for Security Application.
Proceedings of the Security and Privacy in Communication Networks, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach.
Proceedings of the 18th ACM International Conference on Modeling, 2015

2014
A Novel Approach for the Security Remedial in a Cloud-based E-learning Network.
J. Networks, 2014

Anomaly Detection in Wireless Sensor Network.
J. Networks, 2014

A Hybrid Wrapper-Filter Approach for Malware Detection.
J. Networks, 2014

Guest Editorial.
J. Networks, 2014

Mining frequent correlated graphs with a new measure.
Expert Syst. Appl., 2014

Uncertainty And Evolutionary Optimization: A Novel Approach.
CoRR, 2014

Intelligent Financial Fraud Detection Practices: An Investigation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Defence Against Code Injection Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Survey on Mining Program-Graph Features for Malware Analysis.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Classification of malware based on integrated static and dynamic features.
J. Netw. Comput. Appl., 2013

A multi-tier phishing detection and filtering approach.
J. Netw. Comput. Appl., 2013

Security Concerns and Remedy in a Cloud Based E-learning System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs.
Proceedings of the Security and Privacy in Communication Networks, 2013

(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Exploring Timeline-Based Malware Classification.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Establishing secured communications in cluster based wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

Correlation Mining in Graph Databases with a New Measure.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
J. Networks, 2012

A Comparative Study of Malware Family Classification.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Detecting Unwanted Email Using VAT.
Proceedings of the Software Engineering, 2011

2010
Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing
CoRR, 2010

Wrapper/TAM Co-Optimization and Test Scheduling for SOCs Using Rectangle Bin Packing Considering Diagonal Length of Rectangles
CoRR, 2010

Sorting Network for Reversible Logic Synthesis
CoRR, 2010

Building Toffoli Network for Reversible Logic Synthesis Based on Swapping Bit Strings
CoRR, 2010

Variable Block Carry Skip Logic using Reversible Gates
CoRR, 2010

Efficient Wrapper/TAM Co-Optimization for SOC Using Rectangle Packing
CoRR, 2010

Differentiating malware from cleanware using behavioural analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Machine Learning Approaches for Modeling Spammer Behavior.
Proceedings of the Information Retrieval Technology, 2010

2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009

Spam filtering for network traffic security on a multi-core environment.
Concurr. Comput. Pract. Exp., 2009

An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Minimizing the Limitations of GL Analyser of Fusion Based Email Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Email Categorization Using Multi-stage Classification Technique.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2005
An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Synthesis of Full-Adder Circuit Using Reversible Logic.
Proceedings of the 17th International Conference on VLSI Design (VLSI Design 2004), 2004

On the Minimization of Multiple-Valued Input Binary-Valued Output Functions.
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004

A heuristic approach to synthesize Boolean functions using TANT network.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Medical image classfication using an efficient data mining technique.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

A comparative study among three algorithms for frequent pattern generation.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Implementation of Multiple-Valued Flip-Flips Using Pass Transistor Logic.
Proceedings of the 2004 Euromicro Symposium on Digital Systems Design (DSD 2004), Architectures, Methods and Tools, 31 August, 2004

2003
A Technique for Logic Design of Voltage-Mode Pass Transistor Based Multi-Valued Multiple-Output Logic Circuits.
Proceedings of the 33rd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2003), 2003

Reversible Logic Synthesis for Minimization of Full-Adder Circuit.
Proceedings of the 2003 Euromicro Symposium on Digital Systems Design (DSD 2003), 2003

A Heuristic Approach for Design of Easily Testable PLAs Using Pass Transistor Logic.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002


  Loading...