S. Shahrin

According to our database1, S. Shahrin authored at least 30 papers between 1994 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection.
Int. J. Netw. Secur., 2017

2016
Discovering Cyber Terrorism Using Trace Pattern.
Int. J. Netw. Secur., 2016

2015
Dimension of mobile security model: mobile user security threats and awareness.
Int. J. Mob. Learn. Organisation, 2015

2014
Effective Measurement Requirements for Network Security Management.
CoRR, 2014

2013
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs.
J. Comput. Sci., 2013

Image Watermarking Using Psychovisual Threshold over the Edge.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Profiling mobile malware behaviour through hybrid malware analysis approach.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

2012
Perception on Cyber Terrorism: A Focus Group Discussion Approach.
J. Information Security, 2012

Enhancement of Asset value classification for Mobile devices.
Proceedings of the 2012 International Conference on Cyber Security, 2012

A propose technical security metrics model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Understanding cyber terrorism: The grounded theory method applied.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Towards Incorporation of Software Security Testing Framework in Software Development.
Proceedings of the Software Engineering and Computer Systems, 2011

Multilevel Thresholding Method Based on Aggressive Particle Swarm Optimization.
Proceedings of the Software Engineering and Computer Systems, 2011

Random ambience using high fidelity images.
Proceedings of the Third International Conference on Digital Image Processing, 2011

Training neural networks using Clonal Selection Algorithm and Particle Swarm Optimization: A comparisons for 3D object recognition.
Proceedings of the 11th International Conference on Hybrid Intelligent Systems, 2011

2010
Advanced Trace Pattern For Computer Intrusion Discovery
CoRR, 2010

Scenario Based Worm Trace Pattern Identification Technique
CoRR, 2010

New Multi-step Worm Attack Model
CoRR, 2010

2009
A New Generic Taxonomy on Hybrid Malware Detection Technique
CoRR, 2009

Tracing Technique for Blaster Attack
CoRR, 2009

Threshold Verification Technique for Network Intrusion Detection System
CoRR, 2009

The Inquiry and Page Procedure in Bluetooth Connection.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Ontology Merging and Data Schema Integration: An Approach to Identify Semantic Similarity and Resolve Schematic Heterogeneity in Interoperable GIS Application.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009

2005
Evaluation of Response Quality for Heterogeneous Question Answering Systems.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Intelligent Responses Through Network-based Answer Discovery with Advanced Reasoning.
Proceedings of the IASTED International Conference on Computational Intelligence, 2005

2004
An intelligent virtual financial advisor system (IVFAS).
Proceedings of the IASTED International Conference on Neural Networks and Computational Intelligence, 2004

2000
On the choice of the wavelets for ECG data compression.
Proceedings of the IEEE International Conference on Acoustics, 2000

1995
Realisation of the Parallel Communicating Sequential Code methodology and its automatic code generators.
PhD thesis, 1995

1994
Design and code derivation in the PCSC methodology.
Inf. Softw. Technol., 1994


  Loading...