Mohammad M. Masud

According to our database1, Mohammad M. Masud authored at least 40 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Resource-Aware Mobile-Based Health Monitoring.
IEEE J. Biomedical and Health Informatics, 2017

Hybrid mechanism towards network packet early acceptance and rejection for unified threat management.
IET Information Security, 2017

Android based mobile apps for information security hands-on education.
EAIT, 2017

Efficient topology discovery and routing in thick wireless Linear Sensor Networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Toward Optimal Streaming Feature Selection.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

Multistream regression with asynchronous concept drift detection.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream.
IEEE Trans. Knowl. Data Eng., 2016

An extended identity-based cryptography protocol based on biometric.
IJIPSI, 2016

Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.
J. Intelligent Systems, 2015

ICU Patient Deterioration prediction: a Data-Mining Approach.
CoRR, 2015

Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement.
Computers & Security, 2015

Online Prediction of Chess Match Result.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Trusting the same: Using similarity to establish trust among vehicles.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
A data driven firewall for faster packet filtering.
Proceedings of the Fourth International Conference on Communications and Networking, 2014

FSBD: A Framework for Scheduling of Big Data Mining in Cloud Computing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams.
IEEE Trans. Knowl. Data Eng., 2013

Firewall performance optimization using data mining techniques.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Cloud Guided Stream Classification Using Class-Based Ensemble.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Cloud-based malware detection for evolving data streams.
ACM Trans. Management Inf. Syst., 2011

Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints.
IEEE Trans. Knowl. Data Eng., 2011

Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing.
IEEE Trans. Knowl. Data Eng., 2011

Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011

Detecting Recurring and Novel Classes in Concept-Drifting Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

2010
Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010

Classification and Novel Class Detection in Data Streams with Active Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Addressing Concept-Evolution in Concept-Drifting Data Streams.
Proceedings of the ICDM 2010, 2010

2009
Exploiting an antivirus interface.
Computer Standards & Interfaces, 2009

Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Lacking Labels in the Stream: Classifying Evolving Stream Data with Few Labels.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

2008
A scalable multi-level feature extraction technique to detect malicious executables.
Information Systems Frontiers, 2008

Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008

A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
E-Mail Worm Detection Using Data Mining.
IJISP, 2007

Feature Based Techniques for Auto-Detection of Novel Email Worms.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Hybrid Model to Detect Malicious Executables.
Proceedings of IEEE International Conference on Communications, 2007

2006
Email Worm Detection Using Naïve Bayes and Support Vector Machine.
Proceedings of the Intelligence and Security Informatics, 2006


  Loading...