Cyber Security Research Group (CSRG)

Filter
Chapter (peer-reviewed)

Search results

  • 2025

    iCNN-LSTM: An Incremental CNN-LSTM Based Ransomware Detection System

    Ispahany, J., Islam, R., Khan, M. A. & Islam, Z., Feb 2025, iCNN-LSTM: An Incremental CNN-LSTM Based Ransomware Detection System. Mahmoud, B., Wang, H., Aimeur, E., Mrissa, M., Chikhaoui, B., Boukadi, K., Grati, R. & Maamar, Z. (eds.). Springer, p. 46-60 15 p. (LCNS; vol. 15463).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Sensor networks and blockchain platforms for the future healthcare

    Mamun, Q., 01 Feb 2025, Sensor networks and blockchain platforms for the future healthcare. Nguyen, T. (ed.). Elsevier, p. 155 - 216 62 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2023

    A comparison of geocomputational models for validating geospatial distribution of water quality index

    Uddin, M. G., Nash, S., Diganta, M. T. M., Rahman, A. & Olbert, A. I., 2023, Computational Statistical Methodologies and Modeling for Artificial Intelligence. Harjule, P., Rahman, A., Agarwal, B. & Tiwari, V. (eds.). 1st ed. Boca Raton FL: CRC Press, p. 243-276 34 p. (Edge AI in Future Computing).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    11 Citations (Scopus)
  • Analyzing the threat landscape inside the dark web

    Turen, S. H., Islam, R. & Eustace, K., 2023, Emerging trends in cybersecurity applications. Daimi, K., Alsadoon, A., Peoples, C. & Madhoun, N. E. (eds.). 1st ed. Switzerland: Springer, p. 95-122 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Applying zero trust architecture and probability-based authentication to preserve security and privacy of data in the cloud

    Colomb, Y., White, P., Islam, R. & Alsadoon, A., 2023, Emerging Trends in Cybersecurity Applications. Daimi, K., Alsadoon, A., Peoples, C. & El Madhoun, N. (eds.). Switzerland: Springer, p. 137-169 33 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • Computational statistical methods for uncertainty assessment in geoscience

    McManus, S., Rahman, A., Coombes, J. & Horta, A., 01 Jan 2023, Computational statistical methodologies and modeling for Artificial Intelligence. Harjule, P., Rahman, A., Agarwal, B. & Tiwari, V. (eds.). 1st ed. Boca Raton, FL: Taylor & Francis, p. 221-242 22 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Influencing project success outcomes by utilising advanced statistical techniques and AI during the project initiating process

    Hayes, J., Rahman, A. & Mendis, C., 01 Jan 2023, Computational statistical methodologies and modelling for Artificial Intelligence. Harjule, P., Rahman, A., Agarwal, B. & Tiwari, V. (eds.). 1 ed. Boca Raton: CRC Press, p. 254-272 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Privacy in social network sites (SNS): The threats from data mining

    Al-Saggaf, Y. & Islam, M. Z., 2023, Ethical Space- Journal with a difference: celebrating 20 years. Bradshaw, T., Joseph, S., Keeble , R. L. & Matheson, D. (eds.). Suffolk, UK: Abramis Academic, Vol. 1. p. 171-186 15 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Review analysis of ride-sharing applications using machine learning approaches: Bangladesh perspective

    Islam, T., Kundu, A., Lima, R. J., Hena, M. H., Sharif, O., Rahman, A. & Hasan, M. Z., 01 Jan 2023, Computational statistical methodologies and modelling for Artificial Intelligence. Harjule, P., Rahman, A., Agarwal, B. & Tiwari, V. (eds.). 1 ed. Boca Raton: CRC Press, p. 130-158 24 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    19 Citations (Scopus)
  • 2021

    High-isolation compact wideband MIMO antennas for 5G wireless communication

    Haq, M. A. U., Koziel, S. & Khan, M. A., 2021, Wideband, Multiband, and Smart Antenna Systems. Matin, M. A. (ed.). Cham, Switzerland: Springer, p. 131-144 14 p. (Signals and Communication Technology).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Institutionalization of business intelligence for the decision-making iteration

    Ali, S., Islam, R. & Rahman, F., 2021, Research Anthology on Decision Support Systems and Decision Management in Healthcare, Business, and Engineering . IGI Global, p. 267-287 21 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Mental health and sensing

    Tushar, A. K., Kabir, A. & Ahmed, S. I., 2021, Signal processing techniques for computational health informatics. Ahad, M. A. R. & Ahmed, M. U. (eds.). Cham, Switzerland: Springer, p. 247-260 14 p. ( Intelligent Systems Reference Library; vol. 192).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • State phubbing fully mediates the relationship between state fear of missing out and time spent on social media

    Al-Saggaf, Y., 2021, Moving technology ethics at the forefront of society, organisations and governments. Pelegrín Borondo , J., Arias Oliva, M., Murata, K. & María Lara Palma, A. (eds.). Logroño, Spain: Universidad de La Rioja, p. 253-261 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
  • 2020

    Applied Bayesian modeling for assessment of interpretation uncertainty in spatial domains

    McManus, S., Rahman, A., Horta, A. & Coombes, J., 2020, Statistics for data science and policy analysis. Rahman, A. (ed.). 1st ed. Singapore: Springer, p. 3-13 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    47 Downloads (Pure)
  • Associated risk factors for acute malnutrition among rural Bangladeshi children: A cross-sectional analysis

    Rahman, M. A., Rahman, M. S. & Rahman, A., May 2020, Malnutrition: Prevalence, risk factors and outcomes. Rahman, A. (ed.). New York: Nova Science Publishers, p. 73-93 21 p. (Nutrition and Diet Research Progress).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
  • Data privacy and security in the cloud

    Padiet, P., Islam, R. & Rahman, A., 2020, Statistics for data science and policy analysis. Rahman, A. (ed.). Singapore: Springer, p. 173-183 11 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Estimation of child undernutrition at disaggregated administrative tiers of a north-eastern district of Bangladesh: An application of small area estimation method

    Das, S., Kumar, B., Hossain, M. Z., Rahman, S. T. & Rahman, A., 2020, Statistics for data science and policy analysis . Rahman, A. (ed.). Singapore: Springer, p. 267-281 15 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Finite mixture modelling approach to identify factors affecting children ever born for 15-49 year old women in Asian country

    Karimuzzaman, M., Hossain, M. M. & Rahman, A., Apr 2020, Statistics for data science and policy analysis. Rahman, A. (ed.). Singapore: Springer, p. 221-236 16 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Instagram photo-sharing and its relationships with social rewards and social connectedness

    Maclean, J., Al-Saggaf, Y. & Hogg, R., 2020, Human interaction, emerging technologies and future applications III: Proceedings of the 3rd International Conference on Human Interaction and Emerging Technologies: Future Applications (IHIET 2020), August 27-29, 2020, Paris, France. Ahram, T., Taiar, R., Langlois, K. & Choplin, A. (eds.). 1 ed. Cham, Switzerland: Springer, p. 231-237 7 p. (Advances in Intelligent Systems and Computing; vol. 1253 AISC).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Issues of disaster justice confronting local community leaders in disaster recovery

    Ingham, V., Islam, M. R., Hicks, J. & Burmeister, O., Jan 2020, Natural hazards and disaster justice : Challenges for Australia and its neighbours. Lukasiewicz , A. & Baldwin, C. (eds.). Singapore: Palgrave Macmillan, p. 221-238 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Shaping the future of multidimensional project management in retail industry using statistical and big-data theories

    Hayes, J., Rahman, A. & Islam, R., 2020, Statistics for data science and policy analysis . Rahman, A. (ed.). Singapore: Springer, p. 347-360 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2019

    Positive vs. Negative emotions and network size: An exploratory study of twitter users

    Al-Saggaf, Y., Apr 2019, Developments in information security and cybernetic wars. Sarfraz, M. (ed.). USA: IGI Global, p. 284-297 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Understanding online radicalisation using data science

    Al-Saggaf, Y., 2019, Violent extremism: Breakthroughs in research and practice. Hershey, PA: IGI Global, p. 471-486 16 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2018

    Cybersecurity: Timeline malware analysis and classification

    Islam, M. R., Apr 2018, Information security: Foundations, technologies and applications. Awad, A. I. & Fairhurst, M. (eds.). 1st ed. United Kingdom: Institution of Engineering and Technology (IET), p. 215-239 25 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Good governance and virtue in South Africa's cyber security policy implementation

    Burmeister, O., Phahlamohlaka, J. & Al-Saggaf, Y., 04 May 2018, Cyber security and threats: Concepts, methodologies, tools, and applications. I. R. M. A. (ed.). United States: IGI Global, p. 325-336 12 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Professional ethics involving cyber security and autonomous robots

    Burmeister, O. K., Thomas, G. & Poulsen, A., Oct 2018, Information, communication and automation ethics in the knowledge society age: Ethical issues in the 21st Century. Tzafestas, S. G. (ed.). 1st ed. New York: Nova Science Publishers, p. 167-180 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2016

    Evolutionary landscape and management of population diversity

    Bhattacharya, M., 2016, Combinations of intelligent methods and applications: Proceedings of the 4th International Workshop, CIMA 2014, Limassol, Cyprus, November 2014 (at ICTAI 2014). Hatzilygeroudis, I., Palade, V. & Prentzas, J. (eds.). Switzerland: Springer-Verlag London Ltd., p. 1-18 18 p. (Smart Innovation, Systems and Technologies; vol. 46).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
    5 Downloads (Pure)
  • Prediction and detection of epileptic seizure

    Parvez, M. & Paul, M., 2016, Biomedical image analysis and mining techniques for improved health outcomes. Abdessalem Karaa, W. B. & Dey, N. (eds.). United States: IGI Global, p. 314-336 18 p. (Advances in Bioinformatics and Biomedical Engineering (ABBE)).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2015

    A Bayesian reweighting technique for small area estimation

    Rahman, A. & Upadhyay, S. K., 2015, Current trends in Bayesian methodology with applications. Singh, U., Loganathan, A., Upadhyay, S. K. & Dey, D. K. (eds.). 1st ed. Boca Raton, USA: CRC Press, p. 503-519 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    15 Citations (Scopus)
  • Bioclimatic modelling: A machine learning perspective

    Bhattacharya, M., 2015, Innovations and advances in computing, informatics, systems sciences, networking and engineering. Sobh, T. & Elleithy, K. (eds.). 50 ed. Springer-Verlag London Ltd., Vol. 313. p. 413-421 9 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • MIMO antenna design for future 5G wireless communication systems

    Khan, M., Islam, M. R. & Aziz-ul-Haq, M., 2015, Software engineering, artificial intelligence, networking and parallel / distributed computing 2015. Lee, R. (ed.). Switzerland: Springer, p. 175-183 9 p. (Studies in Computational Intelligence; vol. 653).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • 2014

    SocioPlatform: A platform for social context-aware applications

    Kabir, M. A., Colman, A. & Han, J., 2014, Context in computing: A cross-disciplinary approach for modeling the real world. Brezillon, P. & Gonzalez, A. J. (eds.). Heidelberg, Germany: Springer, p. 291-308 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Technological social inclusion of rural and regional seniors and well-being

    Burmeister, O., 2014, Rural lifestyles, community well-being and social change: Lessons from country Australia for global citizens. Ragusa, A. T. (ed.). Sharjah, UAE: Bentham Science Publishers, p. 338-379 42 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Downloads (Pure)
  • 2013

    An efficient attribute-based signature with application to secure attribute-based messaging system

    Yang, P. & Zia, T., 2013, Theory and practice of cryptography solutions for secure information systems. Elci, A., Pieprzyk, J., Chefranov, A., Orgun, M., Wang, H. & Shankaran, R. (eds.). 1st ed. United States: Information Science Reference, p. 159-177 18 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
  • Business benefits from keeping codes of ethics up to date

    Bowern, M. & Burmeister, O., 2013, Professionalism in the information and communication technology industry. Weckert, J. & Lucas, R. (eds.). Canberra, Australia: ANU E Press, p. 295-311 17 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    Open Access
    File
    215 Downloads (Pure)
  • Computer vision-aided video coding

    Paul, M. & Lin, W., 2013, Advanced video communications over wireless networks. Zhu, C. & Li, Y. (eds.). Boca Raton, FL: CRC Press, p. 57-84 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Downloads (Pure)
  • Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, M. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, M. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
    6 Downloads (Pure)
  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, M. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    5 Citations (Scopus)
  • 2012

    A comparative study of malware family classification

    Islam, M. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    7 Citations (Scopus)
  • Starting the revolution: Implementing an identity management architecture

    White, P., 2012, Digital identity and access management: Technologies and frameworks. Gupta, M. G. M. (ed.). Hershey PA: Information Science Reference, p. 148-167 20 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2011

    Detecting unwanted email using VAT

    Islam, M. R. & Chowdhury, M. U., 2011, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Lee, R. (ed.). Berlin Heidelberg: Springer, p. 113-126 14 p. (Studies in computational intelligence; vol. 368).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Meta-learning of instance selection for data summarization

    Smith-Miles, K. A. & Islam, M. R., 2011, Meta-learning in computational intelligence. Norbert, J., Duch, W. & Krzysztof, G. (eds.). Berlin: Springer-Verlag London Ltd., p. 77-95 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
  • 2002

    A Linear Genetic Programming Approach for Modelling Electricity Demand Prediction in Victoria

    Bhattacharya, M., Abraham, A. & Nath, B., 2002, Hybrid Information Systems. Abraham, A. & Köppen, M. (eds.). Heidelberg: Physica, Vol. 14. p. 379-393 15 p. (Advances in Soft Computing).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2001

    Genetic Programming: A Review of Some Concerns

    Bhattacharya, M. & Nath, B., 2001, Computational Science. Alexandrov, V. N. ,. D. J. J., Juliano, B. A., Renner, R. S. & Tan, C. J. K. (eds.). Springer Heidelberg, Vol. 2074. p. 1031 1040 p. (Lecture Notes in Computer Science).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)