Your selections:
- Das, Rajkumar, Kamruzzaman, Joarder, Karmakar, Gour
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Sliding window-based regularly frequent patterns mining over sensor data streams
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Wasimi, Saleh
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
The co-evolution of cloud and IoT applications : recent and future trends
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Trusted autonomous vehicle : measuring trust using on-board unit data
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
A machine learning approach for prediction of pregnancy outcome following IVF treatment
- Hassan, Md Rafiul, Al-Insaif, Sadiq, Hossain, Muhammad, Kamruzzaman, Joarder
A robust forgery detection method for copy-move and splicing attacks in images
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
A Survey on Behavioral Pattern Mining from Sensor Data in Internet of Things
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Shahriar Shafin, Sakib, Bhuiyan, Md Zakirul
A survey on context awareness in big data analytics for business applications
- Dinh, Loan, Karmakar, Gour, Kamruzzaman, Joarder
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Attacks on self-driving cars and their countermeasures : a survey
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Jolfaei, Alireza, Das, Rajkumar
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Imam, Tassadduq, Gordon, Steven
Friendly jammer against an adaptive eavesdropper in a relay-aided network
- Giti, J. E., Sakzad, A., Srinivasan, B., Kamruzzaman, Joarder, Gaire, R.
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Karmakar, Gour, Das, Rajkumar, Kamruzzaman, Joarder
Low-power wide-area networks : design goals, architecture, suitability to use cases and research challenges
- Buurman, Ben, Kamruzzaman, Joarder, Karmakar, Gour, Islam, Syed
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Ahmed, Mohiuddin, Islam, Nahina, Wibowo, Santoso, Gordon, Steven
Are you sure you would like to clear your session, including search history and login status?