Mohiuddin Ahmed

Orcid: 0000-0002-4559-4768

According to our database1, Mohiuddin Ahmed authored at least 78 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Malware Detection with Artificial Intelligence: A Systematic Literature Review.
ACM Comput. Surv., June, 2024

2023
A dependable and secure consensus algorithm for blockchain assisted microservice architecture.
Comput. Electr. Eng., August, 2023

A combined feature-vector based multiple instance learning convolutional neural network in breast cancer classification from histopathological images.
Biomed. Signal Process. Control., July, 2023

A Review on Deep-Learning-Based Cyberbullying Detection.
Future Internet, May, 2023

Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation.
IEEE Access, 2023

Channel Truncation Inspired Short-Packet Covert Communication with Poisson Packet Generation.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature.
Proceedings of the IEEE INFOCOM 2023, 2023

Developing a Comprehensive Risk Management Framework for E-Health Care Delivery.
Proceedings of the Health Information Science - 12th International Conference, 2023

Australia's Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare.
Proceedings of the Health Information Science - 12th International Conference, 2023

Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection.
ACM Trans. Manag. Inf. Syst., 2022

A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET.
IEEE Trans. Intell. Transp. Syst., 2022

Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model.
Sensors, 2022

Blockchain in vehicular ad hoc networks: applications, challenges and solutions.
Int. J. Sens. Networks, 2022

Establishment and mapping of heterogeneous anomalies in network intrusion datasets.
Connect. Sci., 2022

Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm.
Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, 2022

RAIDER: Reinforcement-Aided Spear Phishing Detector.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
Biometrics for Internet-of-Things Security: A Review.
Sensors, 2021

Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation.
Sensors, 2021

A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network.
Sensors, 2021

Predicting Users' Value Changes by the Friends' Influence from Social Media Usage.
CoRR, 2021

RAIDER: Reinforcement-aided Spear Phishing Detector.
CoRR, 2021

Explainable Artificial Intelligence Approaches: A Survey.
CoRR, 2021

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things.
Ad Hoc Networks, 2021

A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021

An Investigation of Vulnerabilities in Internet of Health Things.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021

A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead.
Proceedings of the Fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2021

2020
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020

Cooperative co-evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020

Deep learning for collective anomaly detection.
Int. J. Comput. Sci. Eng., 2020

A Case Study on the Development of Adult Language, Literacy and Numeracy Skills.
EAI Endorsed Trans. e Learn., 2020

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets.
CoRR, 2020

Toward a Sustainable Cybersecurity Ecosystem.
Comput., 2020

Blockchain: Can It Be Trusted?
Computer, 2020

False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure.
Complex Adapt. Syst. Model., 2020

A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution.
IEEE Access, 2020

Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Data summarization: a survey.
Knowl. Inf. Syst., 2019

Intelligent Big Data Summarization for Rare Anomaly Detection.
IEEE Access, 2019

Measures and metrics for the enforcement of critical security controls: a case study of boundary defense.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2018
Infrequent pattern mining in smart healthcare environment using data summarization.
J. Supercomput., 2018

Reservoir-based network traffic stream summarization for anomaly detection.
Pattern Anal. Appl., 2018

Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Evaluation Metrics for Big Data Project Management.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

Effectiveness of Hard Clustering Algorithms for Securing Cyber Space.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective.
Proceedings of International Joint Conference on Computational Intelligence, 2018

A Poisoning Attack Against Cryptocurrency Mining Pools.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Proceedings of the 8th Software Security, 2018

2017
An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network.
EAI Endorsed Trans. Scalable Inf. Syst., 2017

Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering.
Computer, 2017

False Data Injection Attacks in Healthcare.
Proceedings of the Data Mining, 2017

Anomaly Detection on Big Data in Financial Markets.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
A survey of network anomaly detection techniques.
J. Netw. Comput. Appl., 2016

A survey of anomaly detection techniques in financial domain.
Future Gener. Comput. Syst., 2016

2015
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling.
EAI Endorsed Trans. Scalable Inf. Syst., 2015

An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015

2014
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Heart Disease Diagnosis Using Co-clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

A Novel Approach for Network Traffic Summarization.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

An Efficient Approach for Complex Data Summarization Using Multiview Clustering.
Proceedings of the Scalable Information Systems - 5th International Conference, 2014

2011
Performance analysis of a highly available home agent in mobile networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
IPv6 mobility: performance evaluation of VoIP on MIPv6.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

A novel algorithm to prevent man in the middle attack in LAN environment.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
Implementation and Performance Analysis of a Live Linux Cluster in a Dynamic Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

An Intelligent Data Dissemination System Under Publish/Subscribe Mechanism (abstract).
Proceedings of the Huntsville Simulation Conference, 2009

2007
Application of Quality Function Deployment in redesigning website: a case study on TV3.
Int. J. Bus. Inf. Syst., 2007

Evaluating QoS performance of streaming video on both IPv4 and IPv6 protocols.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

2006
Developing quality healthcare software using quality function deployment: a case study based on Sultan Qaboos University Hospital.
Int. J. Bus. Inf. Syst., 2006

Using computers as visual aids to enhance communication in therapy.
Comput. Hum. Behav., 2006

2003
Protocols for Enhancing Gateway Dependability in Hybrid Mobile Ad Hoc Networks.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2002
Trajectory control of mobile gateways for range extension in ad hoc networks.
Comput. Networks, 2002

An architecture for providing range extension by deploying mobile gateways in ad hoc networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002


  Loading...