Muddassar Farooq

According to our database1, Muddassar Farooq authored at least 82 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mining Disease Progression Patterns for Advanced Disease Surveillance.
Proceedings of the Artificial Intelligence in Medicine - 22nd International Conference, 2024

2023
Boosted Random Forests for Predicting Treatment Failure of Chemotherapy Regimens.
Proceedings of the Artificial Intelligence in Medicine, 2023

2020
Inter-Subset Hamming Distance Maximization for Enhancing the Physical Layer Security of Antenna Subset Modulation.
IEEE Access, 2020

2018
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data.
CoRR, 2018

A Comprehensive Survey of Watermarking Relational Databases Research.
CoRR, 2018

2017
Analyzing Directional Modulation Techniques as Block Encryption Ciphers for Physical Layer Security.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

2016
SBoxScope: A Meta S-box Strength Evaluation Framework for Heterogeneous Confusion Boxes.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Secure biometric template generation for multi-factor authentication.
Pattern Recognit., 2015

USpam - A User Centric Ontology Driven Spam Detection System.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony.
Knowl. Inf. Syst., 2014

2013
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints.
IEEE Trans. Knowl. Data Eng., 2013

A Formal Usability Constraints Model for Watermarking of Outsourced Datasets.
IEEE Trans. Inf. Forensics Secur., 2013

In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS.
Inf. Sci., 2013

2012
An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems.
IEEE Trans. Knowl. Data Eng., 2012

ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables.
Knowl. Inf. Syst., 2012

BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks.
Inf. Sci., 2012

2011
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions.
Inf. Sci., 2011

A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols.
Appl. Soft Comput., 2011

On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications.
Ad Hoc Networks, 2011

A Framework for Detecting Malformed SMS Attack.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Embedding High Capacity Covert Channels in Short Message Service (SMS).
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Using evolutionary algorithms for ECG Arrhythmia detection and classification.
Proceedings of the Seventh International Conference on Natural Computation, 2011

In-Execution Malware Detection Using Task Structures of Linux Processes.
Proceedings of IEEE International Conference on Communications, 2011

OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Using evolutionary learning classifiers to do MobileSpam (SMS) filtering.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

2010
On Performance Modeling of Ad Hoc Routing Protocols.
EURASIP J. Wirel. Commun. Netw., 2010

Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System.
Proceedings of the Parallel Problem Solving from Nature, 2010

RTP-miner: a real-time security framework for RTP fuzzing attacks.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection.
Proceedings of IEEE International Conference on Communications, 2010

Bee-Sensor: A Step Towards Meta-Routing Strategies in Hybrid Ad Hoc Networks.
Proceedings of the Swarm Intelligence - 7th International Conference, 2010

2009
Keystroke-Based User Identification on Smart Phones.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Using Formal Grammar and Genetic Operators to Evolve Malware.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Malware detection using statistical analysis of byte-level file content.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets.
Proceedings of the Learning Classifier Systems, 2009

A Sense of 'Danger' for Windows Processes.
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009

Evaluating DoS Attacks against Sip-Based VoIP Systems.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Performance evaluation of evolutionary algorithms in classification of biomedical datasets.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

A hybrid GA-PSO fuzzy system for user identification on smart phones.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

On the appropriateness of evolutionary rule learning algorithms for malware detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Are evolutionary rule learning algorithms appropriate for malware detection?
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Evolvable malware.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

IMAD: in-execution malware analysis and detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Bio-inspired telecommunications.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Application of evolutionary algorithms in detection of SIP based flooding attacks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets.
Proceedings of the Evolutionary Computation, 2009

Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis.
Proceedings of the Applications of Evolutionary Computing, 2009

Using spatio-temporal information in API calls with machine learning algorithms for malware detection.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

The Role of Biomedical Dataset in Classification.
Proceedings of the Artificial Intelligence in Medicine, 2009

2008
Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview.
Proceedings of the Swarm Intelligence: Introduction and Applications, 2008

A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A formal performance modeling framework for bio-inspired ad hoc routing protocols.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A sense of danger: dendritic cells inspired artificial immune system for manet security.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Attack analysis & bio-inspired security framework for IPMultimedia subsystem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Attack analysis & bio-inspired security framework for IP multimedia subsystem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008

Embedded Malware Detection Using Markov n-Grams.
Proceedings of the Detection of Intrusions and Malware, 2008

Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008

2007
Defence Against 802.11 DoS Attacks Using Artificial Immune System.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

Extended thymus action for reducing false positives in ais based network intrusion detection systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks.
Proceedings of the Applications of Evolutinary Computing, 2007

A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Extended thymus action for improving response of AIS based NID system against malicious traffic.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
From the wisdom of the hive to intelligent routing in telecommunication networks: a step towards intelligent network management through natural engineering.
PhD thesis, 2006

A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks.
J. Syst. Archit., 2006

Special issue on nature-inspired applications and systems.
J. Syst. Archit., 2006

BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems.
Proceedings of the Parallel Problem Solving from Nature, 2006

BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms.
Proceedings of the Applications of Evolutionary Computing, 2006

2005
BeeHive.
Proceedings of the Handbook of Bioinspired Algorithms and Applications., 2005

BeeHive: Routing Algorithms Inspired by Honey Bee Behavior.
Künstliche Intell., 2005

The wisdom of the hive applied to mobile ad-hoc networks.
Proceedings of the 2005 IEEE Swarm Intelligence Symposium, 2005

Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005

BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

A Performance Evaluation Framework for Nature Inspired Routing Algorithms.
Proceedings of the Applications of Evolutionary Computing, 2005

2004
A User Centered Evolutionary Scheduling Framework.
Proceedings of the International Conference on Artificial Intelligence, 2004

An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System.
Proceedings of the Genetic and Evolutionary Computation, 2004

BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2004

2002
A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints.
Proceedings of the Informatics and The Digital Society: Social, 2002


  Loading...