Rafiqul Islam
Rafiqul Islam
A/Professor in Computing, Charles Sturt University
Verified email at csu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of anomaly detection techniques in financial domain
M Ahmed, AN Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
2882016
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
2762013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010
2012010
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
1542009
A Multi-tier Phishing Detection and Filtering Approach
R Islam, J Abawajy
Journal of Network and Computer Applications, 2012
1392012
Synthesis of full-adder circuit using reversible logic
HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury
17th International Conference on VLSI Design. Proceedings., 757-760, 2004
1152004
Reversible logic synthesis for minimization of full-adder circuit
HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury
Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003
1002003
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
952010
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
882016
Minimization of reversible adder circuits
S Islam, MR Islam
Asian Journal of Information Technology 4 (12), 1146-1151, 2005
702005
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
592017
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
Journal of network and computer applications 59, 416-426, 2016
572016
Detecting SQL injection attacks using SNORT IDS
H Alnabulsi, MR Islam, Q Mamun
Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014
552014
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
522014
An innovative analyser for multi-classifier e-mail classification based on grey list analysis
MR Islam, W Zhou, M Guo, Y Xiang
Journal of network and computer applications 32 (2), 357-366, 2009
412009
Malware analysis and detection using data mining and machine learning classification
M Chowdhury, A Rahman, R Islam
International Conference on Applications and Techniques in Cyber Security …, 2017
382017
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AK Bairagi, R Khondoker, R Islam
Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016
382016
An innovative spam filtering model based on support vector machine
MR Islam, MU Chowdhury, W Zhou
International Conference on Computational Intelligence for Modelling …, 2005
362005
Intelligent financial fraud detection practices: an investigation
J West, M Bhattacharya, R Islam
International Conference on Security and Privacy in Communication Networks …, 2014
352014
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, MM Hassan, G Fortino
Future Generation Computer Systems 83, 193-207, 2018
312018
The system can't perform the operation now. Try again later.
Articles 1–20