• Charles Sturt University Panorama Avenue BATHURST NSW

    Australia

  • 56 Citations
  • 3 h-Index
20012014

Personal profile

Personal profile

Currently Involved in research at Charles Sturt University.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Surface Fitting Mathematics
Thin-plate Spline Mathematics
Application programming interfaces (API) Engineering & Materials Science
Biharmonic Equation Mathematics
Polynomials Engineering & Materials Science
Splines Engineering & Materials Science
information technology Social Sciences
Data mining Engineering & Materials Science

Research Output 2001 2014

  • 56 Citations
  • 3 h-Index
  • 18 Conference paper
  • 8 Article
  • 3 Chapter
1 Citations

A Survey on Mining Program-Graph Features for Malware Analysis

Islam, M. D. S., Islam, M. D. R., Kayes, A. S. M., Liu, C. & Altas, I. 2014 ATCS 2014. Belgium: Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 153, p. 220-236 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference paper

Computer operating procedures
Static analysis
Dynamic analysis
Malware
Computer systems
1 Citations

Exploring Timeline-Based Malware Classification

Islam, M. D. R., Altas, I. & Islam, S. 2013 Security and Privacy Protection in Information Processing Systems. Janczewski, H. B. W. L. J. & Shenoi, S. S. S. (eds.). 1 ed. Germany: Springer, p. 1-13 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Malware
3 Citations

A comparative study of malware family classification

Islam, M. D. R. & Altas, I. 2012 Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Germany: Springer, p. 488-496 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Application programming interfaces (API)
Learning algorithms
Learning systems
Malware
2 Citations

Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI).

Howarth, J., Altas, I. & Dalgarno, B. 2010 IEEE International Conference on Availability, Reliability and Security (AReS). USA: IEEE, p. 689-695 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference paper

Machine tools
Flow control
Access control
Interfaces (computer)
Containers

Implementing Microsoft PiL in Australian Schools

Altas, I., Messing, J. & Howarth, J. 2008 In : International Journal of Emerging Technologies in Learning. p. 63-68 6 p.

Research output: Contribution to journalArticle

Press / Media

Masters prepares IT workers for cloud nine

Irfan Altas

03/02/17

7 items of media coverage

Press/Media: Press / Media

A Doctorate, when distance learning is the only option

Irfan Altas

19/08/1520/08/15

2 items of media coverage

Press/Media: Press / Media