Calculated based on number of publications stored in Pure and citations from Scopus
1984 …2024

Research activity per year

Filter
Chapter (peer-reviewed)

Search results

  • 2022

    Analyzing the threat landscape inside the dark web

    Turen, S. H., Islam, R. & Eustace, K., 19 Nov 2022, Emerging trends in cybersecurity applications. Daimi, K., Alsadoon, A., Peoples, C. & Madhoun, N. E. (eds.). 1st ed. Switzerland: Springer, p. 95-122 28 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2020

    Data privacy and security in the cloud

    Padiet, P., Islam, R. & Rahman, A., 2020, Statistics for data science and policy analysis. Rahman, A. (ed.). Singapore: Springer, p. 173-183 11 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Shaping the future of multidimensional project management in retail industry using statistical and big-data theories

    Hayes, J., Rahman, A. & Islam, R., 2020, Statistics for data science and policy analysis . Rahman, A. (ed.). Singapore: Springer, p. 347-360 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2018

    Cybersecurity: Timeline malware analysis and classification

    Islam, MD. R., Apr 2018, Information security: Foundations, technologies and applications. Awad, A. I. & Fairhurst, M. (eds.). 1st ed. United Kingdom: Institution of Engineering and Technology (IET), p. 215-239 25 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • 2015

    MIMO antenna design for future 5G wireless communication systems

    Khan, M., Islam, MD. R. & Aziz-ul-Haq, M., 2015, Software engineering, artificial intelligence, networking and parallel / distributed computing 2015. Lee, R. (ed.). Switzerland: Springer, p. 175-183 9 p. (Studies in Computational Intelligence; vol. 653).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    4 Citations (Scopus)
  • 2013

    Correlation mining in graph databases with a new measure

    Samiullah, M., Ahmed, C. F., Nishi, M. A., Fariha, A., Abdullah, S. M. & Islam, MD. R., 2013, Web technologies and applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013 proceedings . Ishikawa, Y., Li, J., Wang, W., Zhang, R. & Zhang, W. (eds.). Berlin : Springer-Verlag London Ltd., Vol. 7808. p. 88-95 8 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)
    7 Downloads (Pure)
  • Exploring timeline-based Malware classification

    Islam, MD. R., Altas, I. & Islam, S., 2013, Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings . Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Germany: Springer, p. 1-13 13 p. (IFIP advances in information and communication technology; vol. 405).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    2 Citations (Scopus)
    6 Downloads (Pure)
  • Security concerns and remedy in a cloud based e-learning system

    Masud, M., Islam, MD. R. & Abawajy, J., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, revised selected papers . Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). United States: Springer, Vol. 127. p. 356-366 11 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    5 Citations (Scopus)
  • 2012

    A comparative study of malware family classification

    Islam, MD. R. & Altas, I., 2012, Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Chim, T. W. & Yuen, T. H. (eds.). Berlin, Germany: Springer, p. 488-496 9 p. (Lecture Notes in Computer Science; vol. 7618).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    6 Citations (Scopus)
  • 2011

    Detecting unwanted email using VAT

    Islam, MD. R. & Chowdhury, M. U., 2011, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Lee, R. (ed.). Berlin Heidelberg: Springer, p. 113-126 14 p. (Studies in computational intelligence; vol. 368).

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

  • Meta-learning of instance selection for data summarization

    Smith-Miles, K. A. & Islam, MD. R., 2011, Meta-learning in computational intelligence. Norbert, J., Duch, W. & Krzysztof, G. (eds.). Berlin: Springer-Verlag London Ltd., p. 77-95 19 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)peer-review

    3 Citations (Scopus)