Your selections:
Sensitivity analysis for vulnerability mitigation in hybrid networks
- Ur‐rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
AFES: An advanced forensic evidence system
- Black, Paul, Gondal, Iqbal, Brooks, Richard, Yu, Lu
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
Cross-compiler bipartite vulnerability search
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Malware variant identification using incremental clustering
- Black, Paul, Gondal, Iqbal, Bagirov, Adil, Moniruzzaman, Md
Reanimating historic malware samples
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
State estimation within ied based smart grid using kalman estimates
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Blockchain leveraged decentralized IoT eHealth framework
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Cyberattack triage using incremental clustering for intrusion detection systems
- Taheri, Sona, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
Dynamically recommending repositories for health data : a machine learning model
- Uddin, Md Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Function similarity using family context
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Partial undersampling of imbalanced data for cyber threats detection
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal
Rapid health data repository allocation using predictive machine learning
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
State estimation in the presence of cyber attacks using distributed partition technique
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzuman, Joarder, Islam, Syed
Are you sure you would like to clear your session, including search history and login status?