Your selections:
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Gibbs, Lisa, De Silva, Andrea, Christian, Bradley, Gold, Lisa, Gussy, Mark, Moore, Laurence, Calache, Hanny, Young, Dana, Riggs, Elisha, Tadic, Maryanne, Watt, Richard, Gondal, Iqbal, Waters, Elizabeth
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Condition monitoring through mining fault frequency from machine vibration data
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
Dynamic sensors selection for overlapped multiple-target tracking using eagerness
- Armaghani, Farzaneh, Gondal, Iqbal, Kamruzzaman, Joarder
Autonomous behavior modeling approach for diverse anomaly detection application
- Amar, Muhammad, Wilson, Campbell, Gondal, Iqbal
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Dynamic resource allocation for improved QoS in WiMAX/WiFi integration
- Rabbani, Md, Kamruzzaman, Joarder, Gondal, Iqbal, Ahmad, Iftekhar, Hassan, Md Rafiul
Teeth Tales : A community-based child oral health promotion trial with migrant families in Australia
- Gibbs, Lisa, Waters, Elizabeth, Christian, Bradley, Gold, Lisa, Young, Dana, De Silva, Andrea, Calache, Hanny, Gussy, Mark, Watt, Richard, Riggs, Elisha, Tadic, Maryanne, Hall, Martin, Gondal, Iqbal, Pradel, Veronika, Moore, Laurence
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Function similarity using family context
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Fuzzy logic inspired bearing fault-model membership estimation
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Impact characterization of multiple-points-defect on machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Rashid, Md. Mamunur, Amar, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Instruction cognitive one-shot malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Are you sure you would like to clear your session, including search history and login status?