Follow
Rafiqul Islam
Rafiqul Islam
A/Professor in Computing, Charles Sturt University
Verified email at csu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of anomaly detection techniques in financial domain
M Ahmed, AN Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
3462016
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3112013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010
2172010
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
1642009
A Multi-tier Phishing Detection and Filtering Approach
R Islam, J Abawajy
Journal of Network and Computer Applications, 2012
1472012
Synthesis of full-adder circuit using reversible logic
HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury
17th International Conference on VLSI Design. Proceedings., 757-760, 2004
1162004
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1052016
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1042010
Reversible logic synthesis for minimization of full-adder circuit
HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury
Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003
1022003
Optical properties of CeO2 thin films
S Debnath, MR Islam, MSR Khan
Bulletin of Materials Science 30 (4), 315-319, 2007
792007
Design and implementation of an optimal fuzzy logic controller using genetic algorithm
S Khan, SF Abdulazeez, LW Adetunji, A Alam, MJE Salami, SA Hameed, ...
Journal of computer science 4 (10), 799, 2008
752008
Minimization of reversible adder circuits
S Islam, MR Islam
Asian Journal of Information Technology 4 (12), 1146-1151, 2005
722005
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
682017
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
Journal of network and computer applications 59, 416-426, 2016
652016
Detecting SQL injection attacks using SNORT IDS
H Alnabulsi, MR Islam, Q Mamun
Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014
592014
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ...
Academy Publisher, 2014
582014
Malware analysis and detection using data mining and machine learning classification
M Chowdhury, A Rahman, R Islam
International conference on applications and techniques in cyber security …, 2017
572017
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AK Bairagi, R Khondoker, R Islam
Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016
472016
Intelligent financial fraud detection practices: an investigation
J West, M Bhattacharya, R Islam
International Conference on Security and Privacy in Communication Networks …, 2014
452014
An innovative analyser for multi-classifier e-mail classification based on grey list analysis
MR Islam, W Zhou, M Guo, Y Xiang
Journal of network and computer applications 32 (2), 357-366, 2009
402009
The system can't perform the operation now. Try again later.
Articles 1–20