A survey of anomaly detection techniques in financial domain M Ahmed, AN Mahmood, MR Islam Future Generation Computer Systems 55, 278-288, 2016 | 399 | 2016 |
Classification of malware based on integrated static and dynamic features R Islam, R Tian, LM Batten, S Versteeg Journal of Network and Computer Applications 36 (2), 646-656, 2013 | 326 | 2013 |
Differentiating malware from cleanware using behavioural analysis R Tian, R Islam, L Batten, S Versteeg Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010 | 221 | 2010 |
An automated classification system based on the strings of trojan and virus families R Tian, L Batten, R Islam, S Versteeg Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009 | 163 | 2009 |
A Multi-tier Phishing Detection and Filtering Approach R Islam, J Abawajy Journal of Network and Computer Applications, 2012 | 154 | 2012 |
Synthesis of full-adder circuit using reversible logic HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury 17th International Conference on VLSI Design. Proceedings., 757-760, 2004 | 119 | 2004 |
Hybrids of support vector machine wrapper and filter based framework for malware detection S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood Future Generation Computer Systems 55, 376-390, 2016 | 116 | 2016 |
Reversible logic synthesis for minimization of full-adder circuit HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003 | 106 | 2003 |
Classification of malware based on string and function feature selection R Islam, R Tian, L Batten, S Versteeg 2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010 | 105 | 2010 |
Minimization of reversible adder circuits MS Islam, MR Islam Asian J. Inform. Tech 4 (12), 1146-1151, 2005 | 79 | 2005 |
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ... Information Sciences 379, 211-228, 2017 | 77 | 2017 |
Design and implementation of an optimal fuzzy logic controller using genetic algorithm S Khan, SF Abdulazeez, LW Adetunji, AHMZ Alam, MJE Salami, ... Journal of computer science, 2008 | 77 | 2008 |
Evolutionary optimization: a big data perspective M Bhattacharya, R Islam, J Abawajy Journal of network and computer applications 59, 416-426, 2016 | 66 | 2016 |
Evaluation of maternal and humoral immunity against Newcastle disease virus in chicken MM Rahman, ASM Bari, M Giasuddin, MR Islam, J Alam, GC Sil, ... Int. J. Poult. Sci 1 (5), 161-163, 2002 | 66 | 2002 |
Malware analysis and detection using data mining and machine learning classification M Chowdhury, A Rahman, R Islam International conference on applications and techniques in cyber security …, 2018 | 64 | 2018 |
A hybrid wrapper-filter approach for malware detection M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ... Academy Publisher, 2014 | 61 | 2014 |
Detecting SQL injection attacks using SNORT IDS H Alnabulsi, MR Islam, Q Mamun Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014 | 59 | 2014 |
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures AK Bairagi, R Khondoker, R Islam Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016 | 55 | 2016 |
Genetic evaluation and selection criteria of hybrid rice in irrigated ecosystem of Bangladesh KM Iftekharuddaula, MS Hassan, MJ Islam, MA Badshah, MR Islam, ... Pakistan Journal of Biological Sciences 4 (7), 790-792, 2001 | 54 | 2001 |
Ionic liquid-in-oil microemulsions prepared with biocompatible choline carboxylic acids for improving the transdermal delivery of a sparingly soluble drug MR Islam, MR Chowdhury, R Wakabayashi, N Kamiya, M Moniruzzaman, ... Pharmaceutics 12 (4), 392, 2020 | 50 | 2020 |