Mohiuddin Ahmed
Orcid: 0000-0002-4559-4768
According to our database1,
Mohiuddin Ahmed
authored at least 86 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language.
Comput. Secur., 2025
WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A Review.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot.
Wirel. Networks, July, 2024
ACM Comput. Surv., June, 2024
Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP.
Expert Syst. Appl., 2024
Digit. Commun. Networks, 2024
Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language.
CoRR, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
2023
A dependable and secure consensus algorithm for blockchain assisted microservice architecture.
Comput. Electr. Eng., August, 2023
A combined feature-vector based multiple instance learning convolutional neural network in breast cancer classification from histopathological images.
Biomed. Signal Process. Control., July, 2023
Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation.
IEEE Access, 2023
Channel Truncation Inspired Short-Packet Covert Communication with Poisson Packet Generation.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Health Information Science - 12th International Conference, 2023
Australia's Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare.
Proceedings of the Health Information Science - 12th International Conference, 2023
Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection.
ACM Trans. Manag. Inf. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Sensors, 2022
Int. J. Sens. Networks, 2022
Connect. Sci., 2022
Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm.
Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
2021
Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation.
Sensors, 2021
Sensors, 2021
CoRR, 2021
Ad Hoc Networks, 2021
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape.
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021
Proceedings of the Cognitive Radio Oriented Wireless Networks and Wireless Internet, 2021
A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead.
Proceedings of the Fourth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2021
2020
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020
Cooperative co-evolution for feature selection in Big Data with random feature grouping.
J. Big Data, 2020
EAI Endorsed Trans. e Learn., 2020
CoRR, 2020
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure.
Complex Adapt. Syst. Model., 2020
A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
2018
J. Supercomput., 2018
Pattern Anal. Appl., 2018
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018
A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective.
Proceedings of International Joint Conference on Computational Intelligence, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the 8th Software Security, 2018
2017
EAI Endorsed Trans. Scalable Inf. Syst., 2017
Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering.
Computer, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
PhD thesis, 2016
Future Gener. Comput. Syst., 2016
2015
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling.
EAI Endorsed Trans. Scalable Inf. Syst., 2015
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
2014
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Scalable Information Systems - 5th International Conference, 2014
Proceedings of the Scalable Information Systems - 5th International Conference, 2014
Proceedings of the Scalable Information Systems - 5th International Conference, 2014
2011
Proceedings of the 2011 Spring Simulation Multi-conference, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the 2010 Spring Simulation Multiconference, 2010
2009
Implementation and Performance Analysis of a Live Linux Cluster in a Dynamic Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009
An Intelligent Data Dissemination System Under Publish/Subscribe Mechanism (abstract).
Proceedings of the Huntsville Simulation Conference, 2009
2007
Application of Quality Function Deployment in redesigning website: a case study on TV3.
Int. J. Bus. Inf. Syst., 2007
Proceedings of the 2007 Spring Simulation Multiconference, 2007
2006
Developing quality healthcare software using quality function deployment: a case study based on Sultan Qaboos University Hospital.
Int. J. Bus. Inf. Syst., 2006
Comput. Hum. Behav., 2006
2003
Protocols for Enhancing Gateway Dependability in Hybrid Mobile Ad Hoc Networks.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003
2002
Comput. Networks, 2002
An architecture for providing range extension by deploying mobile gateways in ad hoc networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002