• Charles Sturt University Panorama Avenue BATHURST NSW

    Australia

  • 56 Citations
  • 3 h-Index
20012014
If you made any changes in Pure these will be visible here soon.

Personal profile

Personal profile

Currently Involved in research at Charles Sturt University.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Surface Fitting Mathematics
Thin-plate Spline Mathematics
Application programming interfaces (API) Engineering & Materials Science
Biharmonic Equation Mathematics
Polynomials Engineering & Materials Science
Splines Engineering & Materials Science
information technology Social Sciences
Data mining Engineering & Materials Science

Research Output 2001 2014

  • 56 Citations
  • 3 h-Index
  • 18 Conference paper
  • 8 Article
  • 3 Chapter
  • 1 Doctoral/Master's Thesis
1 Citations

A Survey on Mining Program-Graph Features for Malware Analysis

Islam, MD. S., Islam, MD. R., Kayes, A. S. M., Liu, C. & Altas, I., 2014, ATCS 2014. Belgium: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 153, p. 220-236 17 p.

Research output: Book chapter/Published conference paperConference paper

Computer operating procedures
Static analysis
Dynamic analysis
Malware
Computer systems
1 Citations

Exploring Timeline-Based Malware Classification

Islam, MD. R., Altas, I. & Islam, S., 2013, Security and Privacy Protection in Information Processing Systems. Janczewski, H. B. W. L. J. & Shenoi, S. S. S. (eds.). 1 ed. Germany: Springer, p. 1-13 13 p.

Research output: Book chapter/Published conference paperChapter

Malware
3 Citations

A comparative study of malware family classification

Islam, MD. R. & Altas, I., 2012, Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Germany: Springer, p. 488-496 9 p.

Research output: Book chapter/Published conference paperChapter

Application programming interfaces (API)
Learning algorithms
Learning systems
Malware
2 Citations

Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI).

Howarth, J., Altas, I. & Dalgarno, B., 2010, IEEE International Conference on Availability, Reliability and Security (AReS). USA: IEEE, p. 689-695 7 p.

Research output: Book chapter/Published conference paperConference paper

Machine tools
Flow control
Access control
Interfaces (computer)
Containers
Open Access
File
Identity management
Resources
Management system
Industry
Public sector

Press / Media

Masters prepares IT workers for cloud nine

Irfan Altas

03/02/17

7 items of media coverage

Press/Media: Press / Media

A Doctorate, when distance learning is the only option

Irfan Altas

19/08/1520/08/15

2 items of media coverage

Press/Media: Press / Media