Follow
Rafiqul Islam
Rafiqul Islam
A/Professor in Computing, Charles Sturt University
Verified email at csu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of anomaly detection techniques in financial domain
M Ahmed, AN Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
3992016
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3262013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010
2212010
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
1632009
A Multi-tier Phishing Detection and Filtering Approach
R Islam, J Abawajy
Journal of Network and Computer Applications, 2012
1542012
Synthesis of full-adder circuit using reversible logic
HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury
17th International Conference on VLSI Design. Proceedings., 757-760, 2004
1192004
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1162016
Reversible logic synthesis for minimization of full-adder circuit
HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury
Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003
1062003
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1052010
Minimization of reversible adder circuits
MS Islam, MR Islam
Asian J. Inform. Tech 4 (12), 1146-1151, 2005
792005
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
772017
Design and implementation of an optimal fuzzy logic controller using genetic algorithm
S Khan, SF Abdulazeez, LW Adetunji, AHMZ Alam, MJE Salami, ...
Journal of computer science, 2008
772008
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
Journal of network and computer applications 59, 416-426, 2016
662016
Evaluation of maternal and humoral immunity against Newcastle disease virus in chicken
MM Rahman, ASM Bari, M Giasuddin, MR Islam, J Alam, GC Sil, ...
Int. J. Poult. Sci 1 (5), 161-163, 2002
662002
Malware analysis and detection using data mining and machine learning classification
M Chowdhury, A Rahman, R Islam
International conference on applications and techniques in cyber security …, 2018
642018
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ...
Academy Publisher, 2014
612014
Detecting SQL injection attacks using SNORT IDS
H Alnabulsi, MR Islam, Q Mamun
Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014
592014
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AK Bairagi, R Khondoker, R Islam
Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016
552016
Genetic evaluation and selection criteria of hybrid rice in irrigated ecosystem of Bangladesh
KM Iftekharuddaula, MS Hassan, MJ Islam, MA Badshah, MR Islam, ...
Pakistan Journal of Biological Sciences 4 (7), 790-792, 2001
542001
Ionic liquid-in-oil microemulsions prepared with biocompatible choline carboxylic acids for improving the transdermal delivery of a sparingly soluble drug
MR Islam, MR Chowdhury, R Wakabayashi, N Kamiya, M Moniruzzaman, ...
Pharmaceutics 12 (4), 392, 2020
502020
The system can't perform the operation now. Try again later.
Articles 1–20