If you made any changes in Pure these will be visible here soon.

Research Output 2008 2019

  • 127 Citations
  • 5 h-Index
  • 27 Conference paper
  • 10 Article
2019

A key management scheme for establishing an encryption-based trusted IoT system

Mamun, Q. & Rana, M., Nov 2019, Proceedings - 4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 41-46 6 p. 8908650. (Proceedings - 4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019).

Research output: Book chapter/Published conference paperConference paper

Privacy
Confidentiality
Cryptography
space processing
cryptography
2018

A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy

Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 304-314 11 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

Health
Access control
Authentication
Data privacy
Cryptography
2 Citations (Scopus)

A novel algorithm to protect code injection attacks

Alnabulsi, H., Islam, R. & Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)

A novel swarm intelligence based sequence generator

Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 238-246 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

Computational complexity
Swarm intelligence
1 Citation (Scopus)

A novel swarm intelligence based strategy to generate optimum test data in T-way testing

Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 247-255 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

Computational complexity
Polynomials
Hardware
Testing
Swarm intelligence
2017
1 Citation (Scopus)

A partial key distribution protocol for WSNs in distributed IoT applications

Mamun, Q. & Rana, M., 23 Nov 2017, 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) Proceedings. Chakrabarti, S. & Saha, H. N. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 248-254 7 p. 8117209

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Sensor nodes
Authentication
Network protocols
sensors
2 Citations (Scopus)

A robust authentication model using multi-channel communication for eHealth systems to enhance privacy and security

Mamun, Q. & Rana, M., 23 Nov 2017, 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) Proceedings. Chakrabarti, S. & Saha, H. N. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 255-260 6 p. 8117210

Research output: Book chapter/Published conference paperConference paper

multichannel communication
privacy
Authentication
health
Health
2015

An Effective T-way Test Data Generation Strategy

Rabbi, K. & Mamun, Q., 2015, Security and Privacy in Communication Networks: 11th EAI International Conference, SecureComm 2015. Belgium: European Alliance for Innovation, p. 633-648 16 p.

Research output: Book chapter/Published conference paperConference paper

Software testing
Combinatorial optimization
Testing
Software engineering
Computational complexity
4 Citations (Scopus)
5 Downloads (Pure)

An efficient particle swarm intelligence based strategy to generate optimum test data in T-way testing

Rabbi, K., Mamun, Q. & Islam, MD. R., 2015, Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA). USA: IEEE, p. 123-128 6 p.

Research output: Book chapter/Published conference paperConference paper

2 Downloads (Pure)

Defence against code injection attacks

Alnabulsi, H., Mamun, Q., Islam, MD. R. & Chowdhury, M. U., 2015, Proceedings of the International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014. Tian, M., Jing, S. & Jing, J. (eds.). Switzerland: Springer, Vol. 153. p. 237-251 15 p.

Research output: Book chapter/Published conference paperConference paper

Multiplexing
Flow control
Internet
2 Citations (Scopus)
6 Downloads (Pure)

Dynamic Feature Selection (DFS) based Data Clustering Technique on Sensory Data Streaming in eHealth Record System

Rabbi, K., Mamun, Q. & Islam, MD. R., 2015, Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 661-665 5 p.

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)
7 Downloads (Pure)

Prediction With Uncertainty: A Novel Framework for Analyzing Sensor Data Streams

Rahman, A., McCulloch, J. & Mamun, Q., Jan 2015, In : IEEE Sensors Journal. 15, 1, p. 382-386 5 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Communication
Network protocols
Sensor networks
Cryptography
2014
5 Citations (Scopus)
11 Downloads (Pure)

A coverage-based scheduling algorithm for WSNs

Mamun, Q., 2014, In : International Journal of Wireless Information Networks. 21, 1, p. 48-57 10 p.

Research output: Contribution to journalArticle

Open Access
File
Scheduling algorithms
Wireless sensor networks
Sensor nodes
Sensor networks
Energy utilization
21 Downloads (Pure)

Anomaly detection in wireless sensor networks

Mamun, Q., Islam, MD. R. & Kaosar, M., Nov 2014, In : Journal of Networks. 9, 11, p. 2914-2924 11 p.

Research output: Contribution to journalArticle

Open Access
File
Wireless sensor networks
Network architecture
Sensor nodes
Electron energy levels

A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks

Mamun, Q. & Rahman, A., 2014, In : Journal of Networks. 9, 9, p. 2342-2352 11 p.

Research output: Contribution to journalArticle

Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis

Syed, S. & Mamun, Q., 2014, ATCS 2014. Germany: Springer, Vol. 153. p. 127-140

Research output: Book chapter/Published conference paperConference paper

Cloud computing
Security of data
Computer science
Telecommunication
Planning

Data Cleansing During Data Collection from Wireless Sensor Networks

Islam, M. Z., Mamun, Q. & Rahman, M. G., 2014, Proceedings of the Twelfth Australasian Data Mining Conference (AusDM 14). Sydney, NSW: Australian Computer Society Inc, p. 195-203 9 p.

Research output: Book chapter/Published conference paperConference paper

Data mining
Wireless sensor networks
Decision support systems
Network architecture
Sensor nodes
16 Citations (Scopus)

Detecting SQL injection attacks using SNORT IDS

Alnabulsi, H., Islam, MD. R. & Mamun, Q., 2014, APWC on CSE 2014. United States: IEEE Xplore, p. 1-7 7 p.

Research output: Book chapter/Published conference paperConference paper

Security of data
Application programs
Internet
Defects

MTTG: An Efficient Technique for Test Data Generation

Rabbi, K., Islam, MD. R., Mamun, Q. & Kaosar, M. G., 2014, SKIMA 2014. USA: IEEE, p. 1-8 8 p.

Research output: Book chapter/Published conference paperConference paper

Cryptography
Communication
1 Citation (Scopus)

What is the first step in designing an application protocol for wireless sensor networks (WSNs)?

Mamun, Q. & Kaosar, M., 2014, SAS 2014. United States: IEEE Computer Society, p. 333-338 6 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Network protocols
Topology
Communication
2013
47 Downloads (Pure)

(k-n) Oblivious Transfer using Fully Homomorphic Encryption System

Kaosar, M., Mamun, Q., Islam, MD. R. & Xun, Y., 2013, Applications and Techniques in Information Security (ATIS). Australia: Deakin University, p. 380-392 13 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Cryptography
Computer systems
Servers
Network protocols
Digital storage
9 Downloads (Pure)

A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System

Begum, M., Mamun, Q. & Kaosar, M., 2013, 2nd Australian eHealth Informatics and Security Conference. Australia: Security Research Institute, ECU, p. 1-10 10 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Health
Access control
Cryptography
Personnel
5 Citations (Scopus)
5 Downloads (Pure)

A tessellation-based localized chain construction scheme for chain-oriented sensor networks

Mamun, Q., Jul 2013, In : IEEE Sensors Journal. 13, 7, p. 2648-2658 11 p.

Research output: Contribution to journalArticle

Sensor networks
Network protocols
sensors
Topology
Voronoi diagrams
7 Downloads (Pure)
Open Access
File
Wireless sensor networks
Topology
Scalability
Energy utilization
Sensor nodes
3 Citations (Scopus)
36 Downloads (Pure)
Open Access
File
Wireless sensor networks
Topology
Energy utilization
Communication
Scalability
2 Citations (Scopus)
6 Downloads (Pure)

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs

Mamun, Q., Islam, MD. R. & Kaosar, M., 2013, Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, p. 367-379 13 p.

Research output: Book chapter/Published conference paperConference paper

Sensor nodes
Base stations
Wireless sensor networks
Identification (control systems)
Engines
1 Citation (Scopus)

Establishing secured communications in cluster based wireless sensor networks

Mamun, Q., Islam, R. & Kaosar, M., 2013, Proceedings of International Symposium on Wireless and pervasive Computing (ISWPC): 8th Proceedings. United States: IEEE Xplore, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Communication
Sensor networks
Cryptography
Topology
2012
52 Citations (Scopus)
11 Downloads (Pure)

A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks

Mamun, Q., Nov 2012, In : Sensors. 12, 11, p. 14887-14913 27 p.

Research output: Contribution to journalArticle

Open Access
File
Wireless sensor networks
topology
Topology
sensors
Sensor nodes
2011
6 Citations (Scopus)
5 Downloads (Pure)

An efficient localized chain construction scheme for chain oriented wireless sensor networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2011, ISADS 2011. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 3-9 7 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Topology
Network protocols
2010

Energy-Preserving Node Scheduling Scheme for Chain Oriented Wireless Sensor Networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, ICCET 2010: 2nd proceedings. United States: IEEE, Vol. 2. p. 373-377 5 p.

Research output: Book chapter/Published conference paperConference paper

Sensor nodes
Wireless sensor networks
Scheduling
Topology
Sensor networks
6 Citations (Scopus)

Multi-chain oriented logical topology for wireless sensor networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, ICCET 2010. New York: IEEE, p. 367-372 6 p.

Research output: Book chapter/Published conference paperConference paper

10 Citations (Scopus)

Selecting Member Nodes in a Chain Oriented WSN

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, WCNC 2010. New York: Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

Sensor nodes
Wireless sensor networks
Topology
Sensors
Energy utilization
2008

An Efficient Partial Key Pre-distribution Scheme for Chain Oriented Sensor Networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2008, TENCON 2008. New York: Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

Sensor networks
Network protocols
Wireless sensor networks
Cryptography
Communication
5 Citations (Scopus)

SecCOSEn: A key management scheme for securing chain oriented sensor networks

Mamun, Q. & Ramakrishnan, S., 2008, CNSR 2008. New York: Institute of Electrical and Electronics Engineers, p. 584-592 9 p.

Research output: Book chapter/Published conference paperConference paper

Sensor networks
Network protocols
Wireless sensor networks
Cryptography
Communication