default search action
Md. Rafiqul Islam 0001
Person information
- affiliation: Charles Sturt University, Albury, School of Computing and Mathematics
- affiliation: University of Dhaka, Department of Computer Science and Engineering
- affiliation: Deakin University, Melbourne, School of Information Technology
Other persons with the same name
- Md. Rafiqul Islam — disambiguation page
- Md. Rafiqul Islam 0002 — Khulna University of Engineering & Technology, Bangladesh
- Md. Rafiqul Islam 0003 — International Islamic University, Department of Political Science, Kuala Lumpur, Malaysia
- Md. Rafiqul Islam 0004 — University of Technology Sydney, Advanced Analytics Institute, Sydney, Australia (and 2 more)
- Md. Rafiqul Islam 0005 — International Islamic University Malaysia, Department of Electrical and Computer Engineering, Kuala Lumpur, Malaysia
- Md. Rafiqul Islam 0007 — Australian Institute of Higher Education, Australia
- Rafiqul Islam — disambiguation page
- Rafiqul Islam 0001 — University of New South Wales, Canberra, Australia
- M. Rafiqul Islam 0001 (aka: Rafiqul Islam 0003) — Emertec Research and Development (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Javeriah Saleem, Md. Rafiqul Islam, Md Zahidul Islam:
Darknet Traffic Analysis: A Systematic Literature Review. IEEE Access 12: 42423-42452 (2024) - [j45]Jamil Ispahany, Md. Rafiqul Islam, Md Zahidul Islam, M. Arif Khan:
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions. IEEE Access 12: 68785-68813 (2024) - [j44]Jannatul Ferdous, Md. Rafiqul Islam, Arash Mahboubi, Md Zahid Islam:
AI-Based Ransomware Detection: A Comprehensive Review. IEEE Access 12: 136666-136695 (2024) - [j43]Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput. Secur. 140: 103754 (2024) - [j42]Abeer Alsadoon, Ghazi Al-Naymat, Md. Rafiqul Islam:
Deep learning models for human age prediction to prevent, treat and extend life expectancy: DCPV taxonomy. Multim. Tools Appl. 83(2): 4825-4857 (2024) - [j41]Mustapha Olota, Abeer Alsadoon, Omar Hisham Alsadoon, Ahmed Dawoud, P. W. C. Prasad, Md. Rafiqul Islam, Oday D. Jerew:
Modified anisotropic diffusion and level-set segmentation for breast cancer. Multim. Tools Appl. 83(5): 13503-13525 (2024) - [c66]Muhammad Rana, Quazi Mamun, Md. Rafiqul Islam:
P-Box Design in Lightweight Block Ciphers: Leveraging Nonlinear Feedback Shift Registers. WCNC 2024: 1-8 - [c65]Yinhao Jiang, Michael Bewong, Arash Mahboubi, Sajal Halder, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Praveen Gauravaram, Jason Xue:
A Graph-Based Approach for Software Functionality Classification on the Web. WISE (5) 2024: 58-73 - [c64]Mohammad Zavid Parvez, Md. Rafiqul Islam, Md Zahid Islam:
CL3: A Collaborative Learning Framework for the Medical Data Ensuring Data Privacy in the Hyperconnected Environment. WISE (4) 2024: 90-100 - [c63]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. WWW 2024: 1779-1789 - [i26]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. CoRR abs/2402.07444 (2024) - [i25]Mehedi Tajrian, Azizur Rahman, Muhammad Ashad Kabir, Md. Rafiqul Islam:
Analysis of child development facts and myths using text mining techniques and classification models. CoRR abs/2408.13091 (2024) - [i24]Mohamamd Zavid Parvez, Rafiqul Islam, Md Zahidul Islam:
CL3: A Collaborative Learning Framework for the Medical Data Ensuring Data Privacy in the Hyperconnected Environment. CoRR abs/2410.07900 (2024) - 2023
- [j40]Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md. Rafiqul Islam, Warren Armstrong:
On the Development of a Protection Profile Module for Encryption Key Management Components. IEEE Access 11: 9113-9121 (2023) - [j39]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Md. Rafiqul Islam, Sanjay K. Jha:
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification. IEEE Access 11: 70011-70022 (2023) - [j38]Mehedi Tajrian, Azizur Rahman, Muhammad Ashad Kabir, Md. Rafiqul Islam:
A Review of Methodologies for Fake News Analysis. IEEE Access 11: 73879-73893 (2023) - [j37]Jannatul Ferdous, Md. Rafiqul Islam, Arash Mahboubi, Md Zahidul Islam:
A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms. IEEE Access 11: 121118-121141 (2023) - [j36]Abeer Alsadoon, Ghazi Al-Naymat, Ahmed Hamza Osman, Belal Alsinglawi, Majdi Maabreh, Md. Rafiqul Islam:
DFCV: a framework for evaluation deep learning in early detection and classification of lung cancer. Multim. Tools Appl. 82(28): 44387-44430 (2023) - [j35]Muhammad Rana, Quazi Mamun, Rafiqul Islam:
Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers. Sensors 23(18): 7678 (2023) - [j34]Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam:
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach. IEEE Trans. Ind. Informatics 19(1): 1006-1017 (2023) - [c62]Peter Padiet, Md. Rafiqul Islam, M. Arif Khan:
Analysis of Malicious Intruder Threats to Data Integrity. ACR 2023: 359-368 - [p2]Selahattin Hürol Türen, Md. Rafiqul Islam, Kenneth Eustace:
Analysing the Threat Landscape Inside the Dark Web. Emerging Trends in Cybersecurity Applications 2023: 95-122 - [p1]Yvette Colomb, Peter White, Rafiqul Islam, Abeer Alsadoon:
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. Emerging Trends in Cybersecurity Applications 2023: 137-169 - [i23]Jannatul Ferdous, Md. Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam:
Malware Resistant Data Protection in Hyper-connected Networks: A survey. CoRR abs/2307.13164 (2023) - [i22]Javeriah Saleem, Md. Rafiqul Islam, Zahidul Islam:
Darknet Traffic Analysis A Systematic Literature Review. CoRR abs/2311.16276 (2023) - 2022
- [j33]Javeriah Saleem, Rafiqul Islam, Muhammad Ashad Kabir:
The Anonymity of the Dark Web: A Survey. IEEE Access 10: 33628-33660 (2022) - [j32]Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md. Rafiqul Islam, Warren Armstrong:
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges. IEEE Access 10: 44756-44777 (2022) - [j31]Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md. Rafiqul Islam, Warren Armstrong:
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond. IEEE Access 10: 71749-71763 (2022) - [j30]Majharul Talukder, Abdullah Alsheddi, Dharmendra Sharma, Rafiqul Islam:
Do Religious Values Influence the Decision of Saudi Arabian Public Sector Employees to Adopt Government Resource Planning Systems? IEEE Access 10: 90271-90286 (2022) - [j29]Muhammad Rana, Quazi Mamun, Md. Rafiqul Islam:
Lightweight cryptography in IoT networks: A survey. Future Gener. Comput. Syst. 129: 77-89 (2022) - [j28]Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad Baheej Al-Khalil, Penatiyana W. C. Prasad, Sabih ur Rehman, Rafiqul Islam:
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function. Future Internet 14(3): 77 (2022) - [c61]Selahattin Hürol Türen, Kenneth Eustace, Rafiqul Islam, Geoffrey Fellows:
Real-Time Detection of TOR Attacks from the Dark Web. ICR 2022: 346-355 - [i21]Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md. Rafiqul Islam, Warren Armstrong:
Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges. CoRR abs/2201.07417 (2022) - [i20]Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md. Rafiqul Islam, Warren Armstrong:
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond. CoRR abs/2203.01526 (2022) - [i19]Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam:
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles. CoRR abs/2203.05192 (2022) - [i18]Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam:
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach. CoRR abs/2204.04837 (2022) - [i17]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. CoRR abs/2205.00384 (2022) - [i16]Anichur Rahman, Md. Jahidul Islam, Rafiqul Islam, Ayesha Aziz, Dipanjali Kundu, Sadia Sazzad, Md. Razaul Karim, Mahedi Hasan, Ziaur Rahman, Said Elnaffar, Shahab S. Band:
Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks. CoRR abs/2211.15013 (2022) - [i15]Mustain Billah, Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Rafiqul Islam:
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles. IACR Cryptol. ePrint Arch. 2022: 356 (2022) - [i14]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. IACR Cryptol. ePrint Arch. 2022: 504 (2022) - [i13]Mashrukh Zayed, Adnan Anwar, Ziaur Rahman, Sk. Shezan Arefin, Rafiqul Islam:
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution. IACR Cryptol. ePrint Arch. 2022: 1660 (2022) - 2021
- [j27]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha:
De-Anonymisation Attacks on Tor: A Survey. IEEE Commun. Surv. Tutorials 23(4): 2324-2350 (2021) - [j26]Khan Md. Hasib, Nurul Akter Towhid, Md. Rafiqul Islam:
HSDLM: A Hybrid Sampling With Deep Learning Method for Imbalanced Data Classification. Int. J. Cloud Appl. Comput. 11(4): 1-13 (2021) - [c60]Sadia Jahan, Md. Rafiqul Islam, Khan Md. Hasib, Usman Naseem, Md. Saiful Islam:
Active Learning with an Adaptive Classifier for Inaccessible Big Data Analysis. IJCNN 2021: 1-7 - [c59]Jamil Ispahany, Rafiqul Islam:
Detecting malicious COVID-19 URLs using machine learning techniques. PerCom Workshops 2021: 718-723 - [c58]Muhammad Rana, Quazi Mamun, Md. Rafiqul Islam:
An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher. QSHINE 2021: 214-227 - 2020
- [i12]Jamil Ispahany, Rafiqul Islam:
Detecting Malicious URLs of COVID-19 Pandemic using ML technologies. CoRR abs/2009.09224 (2020) - [i11]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha:
Anonymity with Tor: A Survey on Tor Attacks. CoRR abs/2009.13018 (2020) - [i10]Muhammad Rana, Quazi Mamun, Md. Rafiqul Islam:
Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey. CoRR abs/2010.00852 (2020)
2010 – 2019
- 2019
- [j25]Md Shaheb Ali, Rafiqul Islam, Ferdausur Rahman:
Institutionalization of Business Intelligence for the Decision-Making Iteration. Int. J. Intell. Inf. Technol. 15(1): 101-118 (2019) - [j24]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special issue on cybersecurity in the critical infrastructure: Advances and future directions. J. Comput. Syst. Sci. 102: 40-41 (2019) - [c57]Hussein Alnabulsi, Md. Rafiqul Islam:
Protecting Code Injection Attacks in Intelligent Transportation System. TrustCom/BigDataSE 2019: 799-806 - [e1]Md. Rafiqul Islam, Yun Sing Koh, Yanchang Zhao, Warwick Graco, David Stirling, Chang-Tsun Li, Md Zahidul Islam:
Data Mining - 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28-30, 2018, Revised Selected Papers. Communications in Computer and Information Science 996, Springer 2019, ISBN 978-981-13-6660-4 [contents] - 2018
- [j23]Hussein Alnabulsi, Md. Rafiqul Islam, Majharul Talukder:
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks. IEEE Access 6: 77829-77840 (2018) - [j22]Md. Shamsul Huda, Md. Rafiqul Islam, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan, Giancarlo Fortino:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 83: 193-207 (2018) - [c56]Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, Junbin Gao:
Security and Privacy Protection for eHealth Data. FNSS 2018: 197-205 - [c55]Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury:
Alignment-free Cancellable Template Generation for Fingerprint based Authentication. ICISSP 2018: 361-366 - [c54]Musfira Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, Junaid Chaudhry, Rafiqul Islam:
A Survey of Big Data Security Solutions in Healthcare. SecureComm (2) 2018: 391-406 - [c53]Mozammel Chowdhury, Sharmin Jahan, Rafiqul Islam, Junbin Gao:
Malware Detection for Healthcare Data Security. SecureComm (2) 2018: 407-416 - 2017
- [j21]Jemal H. Abawajy, Md. Rafiqul Islam:
Applications and techniques in information and network security. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j20]Ala' F. A. Aburumman, Wei Jye Seo, Christian Esposito, Aniello Castiglione, Md. Rafiqul Islam, Kim-Kwang Raymond Choo:
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j19]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Robust human detection and localization in security applications. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j18]Md. Shamsul Huda, Jemal H. Abawajy, Mali Abdollahian, Md. Rafiqul Islam, John Yearwood:
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j17]Md. Shamsul Huda, Md. Suruz Miah, Mohammad Mehedi Hassan, Md. Rafiqul Islam, John Yearwood, Majed A. AlRubaian, Ahmad Almogren:
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf. Sci. 379: 211-228 (2017) - [j16]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. J. Comput. Syst. Sci. 83(1): 1-2 (2017) - [c52]Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam:
Robust fingerprint verification for enhancing security in healthcare system. IVCNZ 2017: 1-5 - [c51]Junaid Ahsenali Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, Craig Valli:
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. LCN Workshops 2017: 121-127 - [c50]Erdal Ozkaya, Rafiqul Islam:
Privacy in Social Media. ATCS/SePrIoT@SecureComm 2017: 3-10 - [c49]Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, Junaid Ahsenali Chaudhry:
Securing Healthcare Data Using Biometric Authentication. ATCS/SePrIoT@SecureComm 2017: 123-132 - [c48]Mozammel Chowdhury, Rafiqul Islam, Junbin Gao:
Fast and Robust Biometric Authentication Scheme Using Human Ear. ATCS/SePrIoT@SecureComm 2017: 133-144 - [c47]Ken Eustace, Rafiqul Islam, Philip Tsang, Geoffrey Fellows:
Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. ATCS/SePrIoT@SecureComm 2017: 166-181 - 2016
- [j15]Mohiuddin Ahmed, Abdun Naser Mahmood, Md. Rafiqul Islam:
A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55: 278-288 (2016) - [j14]Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab, Mali Abdollahian, Md. Rafiqul Islam, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55: 376-390 (2016) - [j13]Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam:
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. Inf. Secur. J. A Glob. Perspect. 25(4-6): 197-212 (2016) - [j12]Maumita Bhattacharya, Md. Rafiqul Islam, Jemal H. Abawajy:
Evolutionary optimization: A big data perspective. J. Netw. Comput. Appl. 59: 416-426 (2016) - [c46]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Fuzzy logic based filtering for image de-noising. FUZZ-IEEE 2016: 2372-2376 - [c45]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Detection of Human Faces Using Neural Networks. ICONIP (2) 2016: 690-698 - [c44]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Fuzzy rule based approach for face and facial feature extraction in biometric authentication. IVCNZ 2016: 1-5 - [c43]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Biometric Authentication Using Facial Recognition. SecureComm 2016: 287-295 - [c42]Fidel Ikundi, Rafiqul Islam, Peter White:
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. SecureComm 2016: 296-304 - [c41]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Distance Measurement of Objects using Stereo Vision. SETN 2016: 33:1-33:4 - [c40]M. Aziz ul Haq, M. Arif Khan, Md. Rafiqul Islam:
A novel compact antenna design for secure eHealth wireless applications. SNPD 2016: 281-286 - 2015
- [j11]Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks. Int. J. Wirel. Networks Broadband Technol. 4(1): 29-44 (2015) - [c39]Habib Mostafaei, Morshed U. Chowdhury, Md. Rafiqul Islam, Hojjat Gholizadeh:
Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach. MSWiM 2015: 157-160 - [c38]Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. SecureComm 2015: 649-664 - [c37]M. Arif Khan, Rafiqul Islam:
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. SecureComm 2015: 697-710 - [c36]Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Human Surveillance System for Security Application. SecureComm 2015: 711-724 - [c35]M. Arif Khan, Md. Rafiqul Islam, Morshed U. Chowdhury:
A novel approach to maximize the sum-rate for MIMO broadcast channels. SNPD 2015: 155-159 - [i9]Jarrod West, Maumita Bhattacharya, Md. Rafiqul Islam:
Intelligent Financial Fraud Detection Practices: An Investigation. CoRR abs/1510.07165 (2015) - 2014
- [j10]Md. Samiullah, Chowdhury Farhan Ahmed, Anna Fariha, Md. Rafiqul Islam, Nicolas Lachiche:
Mining frequent correlated graphs with a new measure. Expert Syst. Appl. 41(4): 1847-1863 (2014) - [j9]Jemal H. Abawajy, Md. Rafiqul Islam:
Guest Editorial. J. Networks 9(11): 2875-2877 (2014) - [j8]Mamoun Alazab, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. J. Networks 9(11): 2878-2891 (2014) - [j7]Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Anomaly Detection in Wireless Sensor Network. J. Networks 9(11): 2914-2924 (2014) - [j6]Anwar Hossain Masud, Xiaodi Huang, Md. Rafiqul Islam:
A Novel Approach for the Security Remedial in a Cloud-based E-learning Network. J. Networks 9(11): 2934-2942 (2014) - [c34]Khandakar Rabbi, Mohammed Kaosar, Md. Rafiqul Islam, Quazi Mamun:
A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System. SecureComm (2) 2014: 141-156 - [c33]Jarrod West, Maumita Bhattacharya, Md. Rafiqul Islam:
Intelligent Financial Fraud Detection Practices: An Investigation. SecureComm (2) 2014: 186-203 - [c32]Md. Saiful Islam, Md. Rafiqul Islam, A. S. M. Kayes, Chengfei Liu, Irfan Altas:
A Survey on Mining Program-Graph Features for Malware Analysis. SecureComm (2) 2014: 220-236 - [c31]Hussein Alnabulsi, Quazi Mamun, Md. Rafiqul Islam, Morshed U. Chowdhury:
Defence Against Code Injection Attacks. SecureComm (2) 2014: 237-251 - [i8]Maumita Bhattacharya, Md. Rafiqul Islam, Abdun Naser Mahmood:
Uncertainty And Evolutionary Optimization: A Novel Approach. CoRR abs/1407.4000 (2014) - 2013
- [j5]Md. Rafiqul Islam, Jemal H. Abawajy:
A multi-tier phishing detection and filtering approach. J. Netw. Comput. Appl. 36(1): 324-335 (2013) - [j4]Md. Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36(2): 646-656 (2013) - [c30]Md. Samiullah, Chowdhury Farhan Ahmed, Manziba Akanda Nishi, Anna Fariha, S. M. Abdullah, Md. Rafiqul Islam:
Correlation Mining in Graph Databases with a New Measure. APWeb 2013: 88-95 - [c29]Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Establishing secured communications in cluster based wireless sensor networks. ISWPC 2013: 1-6 - [c28]Md. Rafiqul Islam, Irfan Altas, Md. Saiful Islam:
Exploring Timeline-Based Malware Classification. SEC 2013: 1-13 - [c27]Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy:
Security Concerns and Remedy in a Cloud Based E-learning System. SecureComm 2013: 356-366 - [c26]Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. SecureComm 2013: 367-379 - [c25]Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi:
(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. SecureComm 2013: 380-392 - 2012
- [j3]Md. Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn Margaret Batten:
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. J. Networks 7(6): 946-955 (2012) - [c24]Md. Rafiqul Islam, Irfan Altas:
A Comparative Study of Malware Family Classification. ICICS 2012: 488-496 - 2011
- [c23]Md. Rafiqul Islam, Morshed U. Chowdhury:
Detecting Unwanted Email Using VAT. SNPD (Selected Papers) 2011: 113-126 - 2010
- [c22]Md. Saiful Islam, Abdullah Al Mahmud, Md. Rafiqul Islam:
Machine Learning Approaches for Modeling Spammer Behavior. AIRS 2010: 251-260 - [c21]Ronghua Tian, Md. Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg:
Differentiating malware from cleanware using behavioural analysis. MALWARE 2010: 23-30 - [i7]Md. Rafiqul Islam, Muhammad Rezaul Karim, Abdullah Al Mahmud, Md. Saiful Islam, Hafiz Md. Hasan Babu:
Efficient Wrapper/TAM Co-Optimization for SOC Using Rectangle Packing. CoRR abs/1008.3320 (2010) - [i6]Md. Rafiqul Islam, Md. Saiful Islam, Muhammad Rezaul Karim, Abdullah Al Mahmud, Hafiz Md. Hasan Babu:
Variable Block Carry Skip Logic using Reversible Gates. CoRR abs/1008.3352 (2010) - [i5]Hafiz Md. Hasan Babu, Md. Saiful Islam, Md. Rafiqul Islam, Lafifa Jamal, Abu Ahmed Ferdaus, Muhammad Rezaul Karim, Abdullah Al Mahmud:
Building Toffoli Network for Reversible Logic Synthesis Based on Swapping Bit Strings. CoRR abs/1008.3357 (2010) - [i4]Md. Saiful Islam, Md. Rafiqul Islam, Abdullah Al Mahmud, Muhammad Rezaul Karim:
Sorting Network for Reversible Logic Synthesis. CoRR abs/1008.3694 (2010) - [i3]Md. Saiful Islam, Abdullah Al Mahmud, Md. Rafiqul Islam:
Machine Learning Approaches for Modeling Spammer Behavior. CoRR abs/1008.4249 (2010) - [i2]Md. Rafiqul Islam, Muhammad Rezaul Karim, Abdullah Al Mahmud, Md. Saiful Islam, Hafiz Md. Hasan Babu:
Wrapper/TAM Co-Optimization and Test Scheduling for SOCs Using Rectangle Bin Packing Considering Diagonal Length of Rectangles. CoRR abs/1008.4446 (2010) - [i1]Hafiz Md. Hasan Babu, Md. Rafiqul Islam, Muhammad Rezaul Karim, Abdullah Al Mahmud, Md. Saiful Islam:
Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing. CoRR abs/1008.4448 (2010)
2000 – 2009
- 2009
- [j2]Md. Rafiqul Islam, Wanlei Zhou, Yang Xiang, Abdun Naser Mahmood:
Spam filtering for network traffic security on a multi-core environment. Concurr. Comput. Pract. Exp. 21(10): 1307-1320 (2009) - [j1]Md. Rafiqul Islam, Wanlei Zhou, Minyi Guo, Yang Xiang:
An innovative analyser for multi-classifier e-mail classification based on grey list analysis. J. Netw. Comput. Appl. 32(2): 357-366 (2009) - [c20]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
MVGL Analyser for Multi-classifier Based Spam Filtering System. ACIS-ICIS 2009: 394-399 - [c19]Md. Rafiqul Islam, Wanlei Zhou:
Minimizing the Limitations of GL Analyser of Fusion Based Email Classification. ICA3PP 2009: 761-774 - [c18]Md. Rafiqul Islam, Jemal H. Abawajy, Matthew J. Warren:
Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. ISPAN 2009: 789-793 - [c17]Ronghua Tian, Lynn Margaret Batten, Md. Rafiqul Islam, Steven Versteeg:
An automated classification system based on the strings of trojan and virus families. MALWARE 2009: 23-30 - 2008
- [c16]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Email Categorization Using (2+1)-Tier Classification Algorithms. ACIS-ICIS 2008: 276-281 - [c15]Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. NPC Workshops 2008: 210-217 - 2007
- [c14]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. ACIS-ICIS 2007: 757-762 - [c13]Md. Rafiqul Islam, Wanlei Zhou:
Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms. ICA3PP 2007: 458-469 - [c12]Md. Rafiqul Islam, Wanlei Zhou:
Email Categorization Using Multi-stage Classification Technique. PDCAT 2007: 51-58 - 2005
- [c11]Md. Rafiqul Islam, Morshed U. Chowdhury, Wanlei Zhou:
An Innovative Spam Filtering Model Based on Support Vector Machine. CIMCA/IAWTIC 2005: 348-353 - 2004
- [c10]Hafiz Md. Hasan Babu, Moinul Islam Zaber, Md. Mazder Rahman, Md. Rafiqul Islam:
Implementation of Multiple-Valued Flip-Flips Using Pass Transistor Logic. DSD 2004: 603-606 - [c9]Md. Rafiqul Islam, Safwan Mahmud Khan, Mohammad Azud us zaman, Syed Shahed Kabir Robin:
A comparative study among three algorithms for frequent pattern generation. ICMLA 2004: 336-343 - [c8]Safwan Mahmud Khan, Md. Rafiqul Islam, Morshed U. Chowdhury:
Medical image classfication using an efficient data mining technique. ICMLA 2004: 397-402 - [c7]Hafiz Md. Hasan Babu, Md. Rafiqul Islam, Rumana Nazmul, Md. Anwarul Haque, Ahsan Raja Chowdhury:
A heuristic approach to synthesize Boolean functions using TANT network. ISCAS (2) 2004: 373-376 - [c6]Hafiz Md. Hasan Babu, Moinul Islam Zaber, Md. Rafiqul Islam, Md. Mazder Rahman:
On the Minimization of Multiple-Valued Input Binary-Valued Output Functions. ISMVL 2004: 321-326 - [c5]Hafiz Md. Hasan Babu, Md. Rafiqul Islam, Syed Mostahed Ali Chowdhury, Ahsan Raja Chowdhury:
Synthesis of Full-Adder Circuit Using Reversible Logic. VLSI Design 2004: 757-760 - 2003
- [c4]Md. Rafiqul Islam, Hafiz Md. Hasan Babu, Mohammad Abdur Rahim Mustafa, Md. Sumon Shahriar:
A Heuristic Approach for Design of Easily Testable PLAs Using Pass Transistor Logic. Asian Test Symposium 2003: 90-95 - [c3]Hafiz Md. Hasan Babu, Md. Rafiqul Islam, Ahsan Raja Chowdhury, Syed Mostahed Ali Chowdhury:
Reversible Logic Synthesis for Minimization of Full-Adder Circuit. DSD 2003: 50-54 - [c2]Hafiz Md. Hasan Babu, Md. Rafiqul Islam, Amin Ahsan Ali, Mohammad Musa Salehin Akon:
A Technique for Logic Design of Voltage-Mode Pass Transistor Based Multi-Valued Multiple-Output Logic Circuits. ISMVL 2003: 111-116 - 2002
- [c1]Md. Rafiqul Islam, Morshed U. Chowdhury:
Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement. CAINE 2002: 239-242
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint