Your selections:
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Zhang, Leo
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza, IEEE
A patient agent to manage blockchains for remote patient monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Continuous patient monitoring with a patient centric agent : A block architecture
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
- Truong, Mandy, Gibbs, Lisa, Pradel, Veronika, Morris, Michal, Gwatirisa, Pauline, Tadic, Maryanne, De Silva, Andrea, Hall, Martin, Young, Dana, Riggs, Elisha, Calache, Hanny, Gussy, Mark, Watt, Richard, Gondal, Iqbal, Waters, Elizabeth
Decentralized content sharing among tourists in visiting hotspots
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Dynamic content distribution for decentralized sharing in tourist spots using demand and supply
- Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Kaisar, Shahriar
Improving authorship attribution in twitter through topic-based sampling
- Pan, Luoxi, Gondal, Iqbal, Layton, Robert
Optimization based clustering algorithms for authorship analysis of phishing emails
- Seifollahi, Sattar, Bagirov, Adil, Layton, Robert, Gondal, Iqbal
Periodic associated sensor patterns mining from wireless sensor networks
- Rashid, Mamunur, Kamruzzaman, Joarder, Gondal, Iqbal, Hassan, Rafiul
“I am your perfect online partner" analysis of dating profiles used in cybercrime
- Kopp, Christian, Sillitoe, James, Gondal, Iqbal
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Rashid, Md. Mamunur, Amar, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
- Ulhaq, Anwaar, Yin, Xiaoxia, Zhang, Yunchan, Gondal, Iqbal
Are you sure you would like to clear your session, including search history and login status?