Rafiqul Islam
Rafiqul Islam
A/Professor in Computing, Charles Sturt University
Verified email at csu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of anomaly detection techniques in financial domain
M Ahmed, AN Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
3062016
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
2862013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010
2042010
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
1562009
Thermal conductivity of fiber reinforced composites by the FEM
MR Islam, A Pramila
Journal of Composite Materials 33 (18), 1699-1715, 1999
1431999
A Multi-tier Phishing Detection and Filtering Approach
R Islam, J Abawajy
Journal of Network and Computer Applications, 2012
1392012
Synthesis of full-adder circuit using reversible logic
HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury
17th International Conference on VLSI Design. Proceedings., 757-760, 2004
1152004
Reversible logic synthesis for minimization of full-adder circuit
HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury
Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003
1012003
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1002010
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
942016
Minimization of reversible adder circuits
S Islam, MR Islam
Asian Journal of Information Technology 4 (12), 1146-1151, 2005
722005
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
642017
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
Journal of network and computer applications 59, 416-426, 2016
622016
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
572014
Detecting SQL injection attacks using SNORT IDS
H Alnabulsi, MR Islam, Q Mamun
Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014
552014
Prevalence and economic significance of caprine fascioliasis at Sylhet district of Bangladesh
MM Hossain, S Paul, MM Rahman, FMA Hossain, MT Hossain, MR Islam
Pakistan Veterinary Journal 31 (2), 113-116, 2011
542011
Malware analysis and detection using data mining and machine learning classification
M Chowdhury, A Rahman, R Islam
International Conference on Applications and Techniques in Cyber Security …, 2017
472017
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AK Bairagi, R Khondoker, R Islam
Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016
432016
An innovative analyser for multi-classifier e-mail classification based on grey list analysis
MR Islam, W Zhou, M Guo, Y Xiang
Journal of network and computer applications 32 (2), 357-366, 2009
422009
Intelligent financial fraud detection practices: an investigation
J West, M Bhattacharya, R Islam
International Conference on Security and Privacy in Communication Networks …, 2014
372014
The system can't perform the operation now. Try again later.
Articles 1–20