Muddassar Farooq
According to our database1,
Muddassar Farooq
authored at least 82 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Artificial Intelligence in Medicine - 22nd International Conference, 2024
2023
Proceedings of the Artificial Intelligence in Medicine, 2023
2020
Inter-Subset Hamming Distance Maximization for Enhancing the Physical Layer Security of Antenna Subset Modulation.
IEEE Access, 2020
2018
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data.
CoRR, 2018
2017
Analyzing Directional Modulation Techniques as Block Encryption Ciphers for Physical Layer Security.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
2016
SBoxScope: A Meta S-box Strength Evaluation Framework for Heterogeneous Confusion Boxes.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Pattern Recognit., 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony.
Knowl. Inf. Syst., 2014
2013
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints.
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Inf. Forensics Secur., 2013
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS.
Inf. Sci., 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables.
Knowl. Inf. Syst., 2012
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks.
Inf. Sci., 2012
2011
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions.
Inf. Sci., 2011
A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols.
Appl. Soft Comput., 2011
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications.
Ad Hoc Networks, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Seventh International Conference on Natural Computation, 2011
Proceedings of IEEE International Conference on Communications, 2011
OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
2010
EURASIP J. Wirel. Commun. Netw., 2010
Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System.
Proceedings of the Parallel Problem Solving from Nature, 2010
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010
Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection.
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Swarm Intelligence - 7th International Conference, 2010
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets.
Proceedings of the Learning Classifier Systems, 2009
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Performance evaluation of evolutionary algorithms in classification of biomedical datasets.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
On the appropriateness of evolutionary rule learning algorithms for malware detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets.
Proceedings of the Evolutionary Computation, 2009
Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis.
Proceedings of the Applications of Evolutionary Computing, 2009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the Artificial Intelligence in Medicine, 2009
2008
Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview.
Proceedings of the Swarm Intelligence: Introduction and Applications, 2008
A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008
Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
A sense of danger: dendritic cells inspired artificial immune system for manet security.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008
2007
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007
BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007
Extended thymus action for reducing false positives in ais based network intrusion detection systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Proceedings of the Applications of Evolutinary Computing, 2007
A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
Extended thymus action for improving response of AIS based NID system against malicious traffic.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
From the wisdom of the hive to intelligent routing in telecommunication networks: a step towards intelligent network management through natural engineering.
PhD thesis, 2006
A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks.
J. Syst. Archit., 2006
BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems.
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Applications of Evolutionary Computing, 2006
2005
Proceedings of the Handbook of Bioinspired Algorithms and Applications., 2005
Proceedings of the 2005 IEEE Swarm Intelligence Symposium, 2005
Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Applications of Evolutionary Computing, 2005
2004
A User Centered Evolutionary Scheduling Framework.
Proceedings of the International Conference on Artificial Intelligence, 2004
Proceedings of the Genetic and Evolutionary Computation, 2004
BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2004
2002
A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints.
Proceedings of the Informatics and The Digital Society: Social, 2002