Your selections:
- Ulhaq, Anwaar, Yin, Xiaoxia, Zhang, Yunchan, Gondal, Iqbal
Welcome message from the dependsys 2015 program chairs
- Khan, Latifur, Kamruzzaman, Joarder, Pathan, Al Sakib Khan
Dynamical analysis of neural networks with time-varying delays using the LMI approach
- Lakshmanan, Shanmugam, Lim, Cheepeng, Bhatti, Asim, Gao, David, Nahavandi, Saeid
Designing for planned emergence in multi-agent systems
- Keogh, Kathleen, Sonenberg, Liz
Neighbourhood contrast : A better means to detect clusters than density
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
A mapreduce based technique for mining behavioral patterns from sensor data
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Frequency decomposition based gene clustering
- Rahman, Md Abdur, Chetty, Madhu, Bulach, Dieter, Wangikar, Pramod
Permit-to-work systems as a health and safety risk control strategy in mining : A prospective study in resilience engineering
- Pillay, Manikam, Tuck, Michael
Reversible data hiding in encrypted images based on image partition and spatial correlation
- Song, Chang, Zhang, Yifeng, Lu, Guojun
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
Reinforcement learning of pareto-optimal multiobjective policies using steering
- Vamplew, Peter, Issabekov, Rustam, Dazeley, Richard, Foale, Cameron
Recent cyber security attacks and their mitigation approaches - An overview
CRICRATE : A cricket match conduction and player evaluation framework
- Uddin, Md Ashraf, Hasan, Mahmudul, Halder, Sajal, Ahamed, Sajeeb, Acharjee, Uzzal
Passive detection of splicing and copy-move attacks in image forgery
- Islam, Mohammad, Kamruzzaman, Joarder, Karmakar, Gour, Murshed, Manzur, Kahandawa, Gayan
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
A framework for processing cumulative frequency queries over medical data streams
- Al-Shammari, Ahmed, Zhou, Rui, Liu, Chengfei, Naseriparsa, Mehdi, Vo, Bao
Are you sure you would like to clear your session, including search history and login status?