Md. Rafiqul Islam
Orcid: 0000-0001-8317-5727Affiliations:
- Charles Sturt University, Albury, School of Computing and Mathematics
- University of Dhaka, Department of Computer Science and Engineering
- Deakin University, Melbourne, School of Information Technology
According to our database1,
Md. Rafiqul Islam
authored at least 129 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., February, 2024
Deep learning models for human age prediction to prevent, treat and extend life expectancy: DCPV taxonomy.
Multim. Tools Appl., January, 2024
CL3: A Collaborative Learning Framework for the Medical Data Ensuring Data Privacy in the Hyperconnected Environment.
CoRR, 2024
Analysis of child development facts and myths using text mining techniques and classification models.
CoRR, 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions.
IEEE Access, 2024
Proceedings of the ACM on Web Conference 2024, 2024
P-Box Design in Lightweight Block Ciphers: Leveraging Nonlinear Feedback Shift Registers.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
2023
DFCV: a framework for evaluation deep learning in early detection and classification of lung cancer.
Multim. Tools Appl., November, 2023
Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.
Sensors, September, 2023
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach.
IEEE Trans. Ind. Informatics, 2023
On the Development of a Protection Profile Module for Encryption Key Management Components.
IEEE Access, 2023
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification.
IEEE Access, 2023
IEEE Access, 2023
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
2022
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution.
IACR Cryptol. ePrint Arch., 2022
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions.
IACR Cryptol. ePrint Arch., 2022
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles.
IACR Cryptol. ePrint Arch., 2022
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function.
Future Internet, 2022
Future Gener. Comput. Syst., 2022
Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks.
CoRR, 2022
Do Religious Values Influence the Decision of Saudi Arabian Public Sector Employees to Adopt Government Resource Planning Systems?
IEEE Access, 2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond.
IEEE Access, 2022
Proceedings of the ICR'22 International Conference on Innovations in Computing Research, 2022
2021
HSDLM: A Hybrid Sampling With Deep Learning Method for Imbalanced Data Classification.
Int. J. Cloud Appl. Comput., 2021
An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
CoRR, 2020
2019
Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019
Int. J. Intell. Inf. Technol., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection.
Future Gener. Comput. Syst., 2018
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks.
IEEE Access, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018
2017
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data.
Inf. Sci., 2017
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017
Proceedings of the 2017 International Conference on Image and Vision Computing New Zealand, 2017
2016
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures.
Inf. Secur. J. A Glob. Perspect., 2016
Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016
Proceedings of the 9th Hellenic Conference on Artificial Intelligence, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Fuzzy rule based approach for face and facial feature extraction in biometric authentication.
Proceedings of the 2016 International Conference on Image and Vision Computing New Zealand, 2016
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
2015
Int. J. Wirel. Networks Broadband Technol., 2015
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015
Connected P-Percent Coverage in Wireless Sensor Networks based on Degree Constraint Dominating Set Approach.
Proceedings of the 18th ACM International Conference on Modeling, 2015
2014
J. Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
2013
J. Netw. Comput. Appl., 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
J. Networks, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
2010
Wrapper/TAM Co-Optimization and constrained Test Scheduling for SOCs Using Rectangle Bin Packing
CoRR, 2010
Wrapper/TAM Co-Optimization and Test Scheduling for SOCs Using Rectangle Bin Packing Considering Diagonal Length of Rectangles
CoRR, 2010
Building Toffoli Network for Reversible Logic Synthesis Based on Swapping Bit Strings
CoRR, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the Information Retrieval Technology, 2010
2009
An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Netw. Comput. Appl., 2009
Concurr. Comput. Pract. Exp., 2009
An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2005
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
2004
Proceedings of the 17th International Conference on VLSI Design (VLSI Design 2004), 2004
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004
A heuristic approach to synthesize Boolean functions using TANT network.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004
Proceedings of the 2004 Euromicro Symposium on Digital Systems Design (DSD 2004), Architectures, Methods and Tools, 31 August, 2004
2003
A Technique for Logic Design of Voltage-Mode Pass Transistor Based Multi-Valued Multiple-Output Logic Circuits.
Proceedings of the 33rd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2003), 2003
Proceedings of the 2003 Euromicro Symposium on Digital Systems Design (DSD 2003), 2003
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003
2002
Eliminating of the Drawback of Existing Testing Technique of Easily Testable PLAs Using an Improved Testing Algorithm with Product Line Rearrangement.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002