• 144 Citations
  • 6 h-Index
20082020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 144 Citations
  • 6 h-Index
  • 28 Conference paper
  • 10 Article
Filter
Conference paper
2020

A group mutual exclusion protocol for the use case of IoT-Blockchain Integration in work-safe scenario

Mamun, Q. & Khan, M. A., 12 Mar 2020, 2020 10th Annual Computing and Communication Workshop and Conference, CCWC 2020. Chakrabarti, S. & Paul, R. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 25-30 6 p. 9031277. (2020 10th Annual Computing and Communication Workshop and Conference, CCWC 2020).

Research output: Book chapter/Published conference paperConference paper

2019

A key management scheme for establishing an encryption-based trusted IoT system

Mamun, Q. & Rana, M., Nov 2019, Proceedings - 4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 41-46 6 p. 8908650. (Proceedings - 4th IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2019).

Research output: Book chapter/Published conference paperConference paper

2018

A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy

Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 304-314 11 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

A novel algorithm to protect code injection attacks

Alnabulsi, H., Islam, R. & Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)

A novel swarm intelligence based sequence generator

Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 238-246 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)

A novel swarm intelligence based strategy to generate optimum test data in T-way testing

Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 247-255 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
2017

A partial key distribution protocol for WSNs in distributed IoT applications

Mamun, Q. & Rana, M., 23 Nov 2017, 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) Proceedings. Chakrabarti, S. & Saha, H. N. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 248-254 7 p. 8117209

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)

A robust authentication model using multi-channel communication for eHealth systems to enhance privacy and security

Mamun, Q. & Rana, M., 23 Nov 2017, 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) Proceedings. Chakrabarti, S. & Saha, H. N. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 255-260 6 p. 8117210

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)
2015

An Effective T-way Test Data Generation Strategy

Rabbi, K. & Mamun, Q., 2015, Security and Privacy in Communication Networks: 11th EAI International Conference, SecureComm 2015. Belgium: European Alliance for Innovation, p. 633-648 16 p.

Research output: Book chapter/Published conference paperConference paper

An efficient particle swarm intelligence based strategy to generate optimum test data in T-way testing

Rabbi, K., Mamun, Q. & Islam, MD. R., 2015, Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA). USA: IEEE, p. 123-128 6 p.

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)
5 Downloads (Pure)

Defence against code injection attacks

Alnabulsi, H., Mamun, Q., Islam, MD. R. & Chowdhury, M. U., 2015, Proceedings of the International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014. Tian, M., Jing, S. & Jing, J. (eds.). Switzerland: Springer, Vol. 153. p. 237-251 15 p.

Research output: Book chapter/Published conference paperConference paper

2 Downloads (Pure)

Dynamic Feature Selection (DFS) based Data Clustering Technique on Sensory Data Streaming in eHealth Record System

Rabbi, K., Mamun, Q. & Islam, MD. R., 2015, Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA). USA: IEEE, Institute of Electrical and Electronics Engineers, p. 661-665 5 p.

Research output: Book chapter/Published conference paperConference paper

3 Citations (Scopus)
6 Downloads (Pure)
2014

Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis

Syed, S. & Mamun, Q., 2014, ATCS 2014. Germany: Springer, Vol. 153. p. 127-140

Research output: Book chapter/Published conference paperConference paper

Data Cleansing During Data Collection from Wireless Sensor Networks

Islam, M. Z., Mamun, Q. & Rahman, M. G., 2014, Proceedings of the Twelfth Australasian Data Mining Conference (AusDM 14). Sydney, NSW: Australian Computer Society Inc, p. 195-203 9 p.

Research output: Book chapter/Published conference paperConference paper

Detecting SQL injection attacks using SNORT IDS

Alnabulsi, H., Islam, MD. R. & Mamun, Q., 2014, APWC on CSE 2014. United States: IEEE Xplore, p. 1-7 7 p.

Research output: Book chapter/Published conference paperConference paper

21 Citations (Scopus)

MTTG: An Efficient Technique for Test Data Generation

Rabbi, K., Islam, MD. R., Mamun, Q. & Kaosar, M. G., 2014, SKIMA 2014. USA: IEEE, p. 1-8 8 p.

Research output: Book chapter/Published conference paperConference paper

What is the first step in designing an application protocol for wireless sensor networks (WSNs)?

Mamun, Q. & Kaosar, M., 2014, SAS 2014. United States: IEEE Computer Society, p. 333-338 6 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
2013

(k-n) Oblivious Transfer using Fully Homomorphic Encryption System

Kaosar, M., Mamun, Q., Islam, MD. R. & Xun, Y., 2013, Applications and Techniques in Information Security (ATIS). Australia: Deakin University, p. 380-392 13 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
57 Downloads (Pure)

A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System

Begum, M., Mamun, Q. & Kaosar, M., 2013, 2nd Australian eHealth Informatics and Security Conference. Australia: Security Research Institute, ECU, p. 1-10 10 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
12 Downloads (Pure)

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs

Mamun, Q., Islam, MD. R. & Kaosar, M., 2013, Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, p. 367-379 13 p.

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)
6 Downloads (Pure)

Establishing secured communications in cluster based wireless sensor networks

Mamun, Q., Islam, R. & Kaosar, M., 2013, Proceedings of International Symposium on Wireless and pervasive Computing (ISWPC): 8th Proceedings. United States: IEEE Xplore, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
2011

An efficient localized chain construction scheme for chain oriented wireless sensor networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2011, ISADS 2011. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 3-9 7 p.

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)
5 Downloads (Pure)
2010

Energy-Preserving Node Scheduling Scheme for Chain Oriented Wireless Sensor Networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, ICCET 2010: 2nd proceedings. United States: IEEE, Vol. 2. p. 373-377 5 p.

Research output: Book chapter/Published conference paperConference paper

Multi-chain oriented logical topology for wireless sensor networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, ICCET 2010. New York: IEEE, p. 367-372 6 p.

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)

Selecting Member Nodes in a Chain Oriented WSN

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2010, WCNC 2010. New York: Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

10 Citations (Scopus)
2008

An Efficient Partial Key Pre-distribution Scheme for Chain Oriented Sensor Networks

Mamun, Q., Ramakrishnan, S. & Srinivasan, B., 2008, TENCON 2008. New York: Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

SecCOSEn: A key management scheme for securing chain oriented sensor networks

Mamun, Q. & Ramakrishnan, S., 2008, CNSR 2008. New York: Institute of Electrical and Electronics Engineers, p. 584-592 9 p.

Research output: Book chapter/Published conference paperConference paper

5 Citations (Scopus)