Mohammad Saiful Islam

According to our database1, Mohammad Saiful Islam authored at least 18 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
DeepHealth: A Secure Framework to Manage Health Certificates Through Medical IoT, Blockchain and Deep Learning.
Proceedings of the IEEE International Symposium on Medical Measurements and Applications, 2021

Anomaly Detection in a Large-Scale Cloud Platform.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2021

2020
Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach.
IEEE Access, 2020

Anomaly Detection in Cloud Components.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2017
Cloud based framework for Parkinson's disease diagnosis and monitoring system for remote healthcare applications.
Future Gener. Comput. Syst., 2017

2015
On selecting a reliable topology in Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Distributed Search over Encrypted Big Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Dynamic Approach to Detect Anomalous Queries on Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
A Distributed Framework for Scalable Search over Encrypted Documents.
CoRR, 2014

Efficient privacy-aware search over encrypted databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inference attack against encrypted range queries on outsourced databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks
CoRR, 2012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Efficient Similarity Search over Encrypted Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Poster: inference attacks against searchable encryption protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Packet distribution based tuning of RTS Threshold in IEEE 802.11.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2008
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008


  Loading...