Mohammad M. Masud
According to our database1, Mohammad M. Masud authored at least 39 papers between 2006 and 2017.
Legend:Book In proceedings Article PhD thesis Other
Resource-Aware Mobile-Based Health Monitoring.
IEEE J. Biomedical and Health Informatics, 2017
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management.
IET Information Security, 2017
Android based mobile apps for information security hands-on education.
Efficient topology discovery and routing in thick wireless Linear Sensor Networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Toward Optimal Streaming Feature Selection.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017
Multistream regression with asynchronous concept drift detection.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream.
IEEE Trans. Knowl. Data Eng., 2016
An extended identity-based cryptography protocol based on biometric.
Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.
J. Intelligent Systems, 2015
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement.
Computers & Security, 2015
Online Prediction of Chess Match Result.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Trusting the same: Using similarity to establish trust among vehicles.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015
A data driven firewall for faster packet filtering.
Proceedings of the Fourth International Conference on Communications and Networking, 2014
FSBD: A Framework for Scheduling of Big Data Mining in Cloud Computing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams.
IEEE Trans. Knowl. Data Eng., 2013
Firewall performance optimization using data mining techniques.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Cloud Guided Stream Classification Using Class-Based Ensemble.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
Cloud-based malware detection for evolving data streams.
ACM Trans. Management Inf. Syst., 2011
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints.
IEEE Trans. Knowl. Data Eng., 2011
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing.
IEEE Trans. Knowl. Data Eng., 2011
Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011
Detecting Recurring and Novel Classes in Concept-Drifting Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011
Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010
Classification and Novel Class Detection in Data Streams with Active Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Addressing Concept-Evolution in Concept-Drifting Data Streams.
Proceedings of the ICDM 2010, 2010
Exploiting an antivirus interface.
Computer Standards & Interfaces, 2009
Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Lacking Labels in the Stream: Classifying Evolving Stream Data with Few Labels.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009
A scalable multi-level feature extraction technique to detect malicious executables.
Information Systems Frontiers, 2008
Detecting Remote Exploits Using Data Mining.
Proceedings of the Advances in Digital Forensics IV, 2008
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
E-Mail Worm Detection Using Data Mining.
Feature Based Techniques for Auto-Detection of Novel Email Worms.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
A Hybrid Model to Detect Malicious Executables.
Proceedings of IEEE International Conference on Communications, 2007
Email Worm Detection Using Naïve Bayes and Support Vector Machine.
Proceedings of the Intelligence and Security Informatics, 2006