Your selections:
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Mobile malware detection : an analysis of deep learning model
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur, IEEE
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
Mining associated sensor patterns for data stream of wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Mining associated patterns from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Maximizing the concurrent transmissions in cognitive radio ad hoc networks
- Hassan, Md Rakib, Karmakar, Gour, Kamruzzaman, Joarder
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Machine health monitoring based on stationary wavelet transform and fourth-order cumulants
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Machine fault severity estimation based on adaptive wavelet nodes selection and SVM
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
LACAR : Location aided congestion aware routing in wireless sensor networks
- Bhuiyan, Mohammad, Gondal, Iqbal, Kamruzzaman, Joarder
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Karmakar, Gour, Das, Rajkumar, Kamruzzaman, Joarder
Interference protection in cognitive radio networks
- Shahid, Mohammad, Kamruzzaman, Joarder
Instruction cognitive one-shot malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Influence of clustering on the opinion formation dynamics in online social networks
- Das, Rajkumar, Kamruzzaman, Joarder, Karmakar, Gour
Increasing voice capacity over IEEE 802.11 WLAN using virtual access points
- Siddique, Md, Kamruzzaman, Joarder
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Giti, Jishan, Srinivasan, Bala, Kamruzzaman, Joarder
Impact characterization of multiple-points-defect on machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Identification of fake news : a semantic driven technique for transfer domain
- Ferdush, Jannatul, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Das, Raj
I-MAC: energy efficient intelligent MAC protocol for wireless sensor networks
- Bhuiyan, Mohammad, Gondal, Iqbal, Kamruzzaman, Joarder
Are you sure you would like to clear your session, including search history and login status?