Calculated based on number of publications stored in Pure and citations from Scopus
1984 …2024

Research activity per year

Filter
Conference paper

Search results

  • 2024

    Malicious Package Detection using Metadata Information

    Halder, S., Bewong, M., Mahboubi, A., Jiang, Y., Islam, R., Islam, Z., Ip, H. L., Ahmed, M. E., Ramachandran, G. S. & Babar, M. A., 2024, (Accepted/In press) The Web Conference 2024.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • 2023

    A modified feature selection algorithm for intrusion detection system based on student psychology-based optimization with explainable AI

    Islam, M. R., Rahman, M., Tanzir Mehedi, S., Nazib, A., Islam, R. & Rahman, Z., Dec 2023, (Accepted/In press) A Modified Feature Selection Algorithm for Intrusion Detection System based on Student Psychology-based Optimization with Explainable AI.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Enhancing Dark Web Surveillance through Browser Fingerprinting for Monitoring Illegal Activities

    Turen, S., Islam, R., Eustace, K. & Fellows, G., 06 Dec 2023, (Accepted/In press) Enhancing Dark Web Surveillance through Browser Fingerprinting for Monitoring Illegal Activities.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • 2021

    An S-box design using irreducible polynomial with affine transformation for lightweight cipher

    Rana, M., Mamun, Q. & Islam, R., 17 Nov 2021, Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, Proceedings. Yuan, X., Bao, W., Yi, X. & Tran, N. H. (eds.). Cham, Switzerland: Springer Science and Business Media Deutschland GmbH, Vol. 402 LNICST. p. 214-227 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 402 LNICST).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Detecting malicious COVID-19 URLs using machine learning techniques

    Ispahany, J. & Islam, R., 22 Mar 2021, 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 718-723 6 p. 9431064. (2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    6 Citations (Scopus)
  • 2020

    Foreword

    Abawajy, J. H., Choo, K. K. R., Islam, R., Xu, Z. & Atiquzzaman, M., 01 Jan 2020, International Conference on Applications and Techniques in Cyber Intelligence: ATCI 2019. Abawajy, J. H., Choo, K-K. R., Islam, R., Xu, Z. & Atiquzzaman, M. (eds.). Cham, Switzerland, Vol. 1017. p. v-vi 2 p. (Advances in Intelligent Systems and Computing).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Protecting code injection attacks in intelligent transportation system

    Alnabulsi, H. & Islam, R., 02 Jan 2020, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. IEEE, Institute of Electrical and Electronics Engineers, p. 799-806 8 p. 8887396. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019; vol. 2019-January).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    6 Citations (Scopus)
  • 2019

    Biometrics technology for healthcare security

    Jahan, S., Chowdhury, M. M. H. & Islam, MD. R., Jan 2019, Proceedings of the International Conference on Applications and Techniques in Information Science (iCATIS2019) . Global Circle for Scientific, Technology and Management Research, 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Feature selection approach for Twitter sentiment analysis and text classification based on Chi-Square and Naïve Bayes

    Paudel, S., Prasad, P. W. C., Alsadoon, A., Islam, M. R. & Elchouemi, A., 2019, International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and techniques in cyber security and intelligence. Atiquzzaman, M., Xu, Z., Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., p. 281-298 18 p. (Advances in Intelligent Systems and Computing; vol. 842).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    4 Citations (Scopus)
  • Identification of illegal forum activities inside the Dark Net

    Alnabulsi, H. & Islam, MD. R., 17 Jan 2019, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE). Kyu Rhee, P. & Bashar, M. R. (eds.). Piscataway, NJ, USA: IEEE, p. 22-29 8 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    15 Citations (Scopus)
  • Web sanitization from malicious code injection attacks

    Alnabulsi, H. & Islam, R., 2019, International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence. Atiquzzaman, M., Xu, Z., Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., p. 251-261 11 p. (Advances in Intelligent Systems and Computing; vol. 842).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • 2018

    Alignment-free Cancellable Template Generation for Fingerprint based Authentication

    Nazmul, R., Islam, MD. R. & Chowdhury, A. R., 2018, Proceedings of the 4th international conference on information systems security and privacy (ICISSP 2018). Camp, O., Mori, P. & Furnell, S. (eds.). Setúbal, Portugal: Scitepress, p. 361-366 6 p. 46

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    1 Citation (Scopus)
    19 Downloads (Pure)
  • Alignment-free fingerprint template protection technique based on minutiae neighbourhood information

    Nazmul, R., Islam, M. R. & Chowdhury, A. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence: Applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 256-265 10 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • A novel algorithm to protect code injection attacks

    Alnabulsi, H., Islam, R. & Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    3 Citations (Scopus)
    68 Downloads (Pure)
  • A novel swarm intelligence based sequence generator

    Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence: applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 238-246 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • A novel swarm intelligence based strategy to generate optimum test data in T-way testing

    Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence : applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 247-255 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • A survey of big data security solutions in healthcare

    Siddique, M., Ayzed Mirza, M., Ahmad, M., Chaudhry, J. & Islam, MD. R., 2018, Security and privacy in communication networks: 14th EAI international conference, SecureCom 2018, proceedings, part II. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham, Switzerland: Springer, Vol. 255. p. 391-406 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 255).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    16 Citations (Scopus)
  • Child abuse and domestic abuse: Content and feature analysis from social media disclosures

    Subramani, S., Wang, H., Islam, M. R., Ul-Haq, A. & O'Connor, M., 2018, Databases theory and applications: 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, proceedings. Wang, J., Gao, C., Chen, J. & Qi, J. (eds.). Champagne, Switzerland: Springer, Vol. 10837. p. 174-185 12 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    11 Citations (Scopus)
  • Discovering trends for the development of novel authentication applications for dementia patients

    Chaudhry, J., Farmand, S., Islam, S. M. S., Islam, M. R., Hannay, P. & Valli, C., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 220-237 18 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Fast and robust biometric authentication scheme using human ear

    Chowdhury, M. M. H., Islam, MD. R. & Gao, J., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Cham: Springer, p. 133-144 12 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Human factors, self-awareness and intervention approaches in cyber security when using mobile devices and social networks

    Eustace, K., Islam, MD. R., Tsang, P. & Fellows, G. H., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceeding. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 166-181 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Malware analysis and detection using data mining and machine learning classification

    Chowdhury, M., Rahman, A. & Islam, R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 266-274 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    52 Citations (Scopus)
    1014 Downloads (Pure)
  • Malware detection for healthcare data security

    Chowdhury, M., Jahan, S., Islam, MD. R. & Gao, J., 29 Dec 2018, Security and privacy in communication networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Springer, Vol. 255. p. 407-416 10 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 255).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    6 Citations (Scopus)
  • Preface

    Abawajy, J., Choo, K. K. R., Atiquzzaman, M., Islam, R. & Xu, Z., 2018, Advances in intelligent systems and computing. Vol. 842. p. v-vi (Advances in Intelligent Systems and Computing).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Privacy in social media

    Ozkaya, E. & Islam, MD. R., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 international workshops, proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Cham, Switzerland: Springer, Vol. 239. p. 3-10 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Protecting data from malware threats using machine learning technique

    Chowdhury, M. M. H., Rahman, A. & Islam, MD. R., 08 Feb 2018, Proceedings of the 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1691-1694 4 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    22 Citations (Scopus)
  • Robust Ear Biometric Recognition using Neural Network

    Chowdhury, M. M. H., Islam, MD. R. & Gao, J., 08 Feb 2018, Proceedings of the 2017 12th IEEE Conference on  Industrial Electronics and Applications (ICIEA). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1855-1859 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    15 Citations (Scopus)
  • Securing healthcare data using biometric authentication

    Jahan, S., Chowdhury, M. M. H., Islam, MD. R. & Chaudhry, J., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 123-132 10 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 339).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)
  • Security and privacy protection for eHealth data

    Jahan, S., Chowdhury, M., Islam, R. & Gao, J., 16 Jun 2018, Future network systems and security: 4th International conference, FNSS 2018 Paris, France, July 9–11, 2018 proceedings. Doss, R., Piramuthu, S. & Zhou, W. (eds.). Switzerland: Springer-Verlag London Ltd., p. 197-205 9 p. (Communications in Computer and Information Science; vol. 878).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • 2017

    A cumulative timeline feature selection approach for data classification

    Islam, MD. R., 2017, Proceedings of the 1st International Conference on machine learning and data engineering (iCMLDE2017). Global Circle for Scientific, Technological and Management Research, p. 2-6 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • AZSPM: Autonomic Zero-Knowledge Security Provisioning model for medical control systems in fog computing environments

    Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmad, M. & Valli, C., 16 Nov 2017, Proceedings - 2017 IEEE 42nd Conference on Local Computer Networks Workshops: LCN Workshops 2017. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 121-127 7 p. 8110213

    Research output: Book chapter/Published conference paperConference paperpeer-review

    11 Citations (Scopus)
  • Biometric authentication using facial recognition

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2017, Security and privacy in communication networks: 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Deng, R., Weng, J., Ren, K. & Yegneswaran, V. (eds.). Cham, Switzerland: Springer, p. 287-295 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 198 LNICST).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    4 Citations (Scopus)
  • Biometrics and data security: An investigation on biometric templates in computing environment

    Dhakal, R., Islam, MD. R. & Mendis, C., 2017, Proceedings of the 1st International Conference on Machine Learning and Data Engineering, Sydney, Australia (2017). Global Circle for Scientific, Technological and Management Research, p. 153-164 12 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Fuzzy rule based approach for face and facial feature extraction in biometric authentication

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 05 Jan 2017, Proceedings of the 2016 International Conference on Image and Vision Computing New Zealand (IVCNZ). Bailey, D., Gupta, G. S. & Marsland, S. (eds.). IEEE, Institute of Electrical and Electronics Engineers, p. 169-173 5 p. 7804444

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)
  • Identification of susceptible websites from code injection attack

    Alnabulsi, H. & Islam, MD. R., 2017, Proceedings of 1st International Conference on Machine Learning and Data Engineering, Sydney, Australia (2017). Global Circle for Scientific, Technological and Management Research, p. 1-9 9 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Information security training and awareness program: An investigation

    Dhakal, R., Islam, MD. R. & Mendis, C., 2017, Proceedings of the 1st International Conference on machine learning and data engineering, Sydney, Australia (2017). Global Circle for Scientific, Technological and Management Research, p. 165-178 14 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    24 Downloads (Pure)
  • Platform as a Service (PaaS) in public cloud: Challenges and mitigating strategy

    Ikundi, F., Islam, MD. R. & White, P., 14 Jun 2017, Security and privacy in communication networks: 12th International conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Deng, R., Weng, J., Ren, K. & Yegneswaran, V. (eds.). United States: Springer, Vol. 198 LNICST. p. 296-304 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 198 LNICST).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Robust fingerprint verification for enhancing security in healthcare system

    Jahan, S., Chowdhury, M. M. H. & Islam, MD. R., 2017, Proceedings of the 2017 International Conference on image and vision computing New Zealand (IVCNZ). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p. 8402502

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)
  • Time series anomaly detection in online social network: Challenges & solutions

    Islam, M. R., Islam, R. & Kamal, A. R. M., 2017, Proceedings of the 1st International conference on machine learning and data engineering (iCMLDE2017). Global Circle for Scientific, Technological and Management Research, p. 21-28 8 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • 2016

    A novel compact antenna design for secure eHealth wireless applications

    Haq, M. A. U., Khan, M. & Islam, MD. R., 2016, Proceedings of the 2016 IEEE/ACIS 17th International conference on software engineering, artificial intelligence, networking and parallell distributed computing (SNPD) . United States of America: IEEE / CPS / ACIS, p. 281-286 6 p. 7515914

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Detection of human faces using neural networks

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2016, Neural Information Processing: 23rd International Conference, ICONIP 2016 Kyoto, Japan, October 16–21, 2016 Proceedings, Part II. Switzerland : Springer, Vol. 9948. p. 690-698 9 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
    6 Downloads (Pure)
  • Distance measurement of objects using stereo vision

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2016, SETN2016: Proceedings of the 9th Hellenic Conference on Artificial Intelligence. New York, NY: ACM International Conference Proceedings Series, p. 1-4 4 p. 33

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • Fast Stereo Matching with Fuzzy Correlation

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2016, (E-pub ahead of print) Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 678-682 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    7 Citations (Scopus)
  • Fuzzy Logic Based Filtering for Image De-noising

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2016, (E-pub ahead of print) 2016 IEEE International Conference on Fuzzy systems (FUZZ-IEEE). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 2372-2376 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    21 Citations (Scopus)
    4 Downloads (Pure)
  • Human detection and localization in secure access control by analysing facial features

    Chowdhury, M. M. H., Gao, J. & Islam, MD. R., 2016, (E-pub ahead of print) Proceedings of the 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA). IEEE, Institute of Electrical and Electronics Engineers, p. 1311-1316 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    6 Citations (Scopus)
  • 2015

    An efficient particle swarm intelligence based strategy to generate optimum test data in T-way testing

    Rabbi, K., Mamun, Q. & Islam, MD. R., 2015, Proceedings of the 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA). USA: IEEE, p. 123-128 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    9 Citations (Scopus)
    5 Downloads (Pure)
  • A novel approach to maximize the sum-rate for MIMO broadcast channels

    Khan, M., Islam, MD. R. & Chowdhury, M., 2015, Proceedings of the 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). Saisho, K. (ed.). USA: IEEE, Institute of Electrical and Electronics Engineers, 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering

    Aburumman, A., Seo, W. J., Islam, MD. R., Khan, M. & Choo, K-K. R., 2015, ATCS2015: 10th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2015). Germany: Springer, Vol. 164. p. 649-664 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    20 Citations (Scopus)
    7 Downloads (Pure)
  • Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach

    Mostafaei, H., Chowdhury, M., Islam, MD. R. & Gholizadeh, H., 2015, MSWiM 2015: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: Association for Computing Machinery, p. 157-160 4 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    13 Citations (Scopus)
  • Defence against code injection attacks

    Alnabulsi, H., Mamun, Q., Islam, MD. R. & Chowdhury, M. U., 2015, Proceedings of the International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014. Tian, M., Jing, S. & Jing, J. (eds.). Switzerland: Springer, Vol. 153. p. 237-251 15 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
    2 Downloads (Pure)