Muddassar Farooq
Muddassar Farooq
Professor & Dean, Air University, Islamabad
Verified email at ist.edu.pk
TitleCited byYear
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions
M Saleem, GA Di Caro, M Farooq
Information Sciences 181 (20), 4597-4624, 2011
3382011
Beehive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior
HF Wedde, M Farooq, Y Zhang
International Workshop on Ant Colony Optimization and Swarm Intelligence, 83-94, 2004
2642004
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
HF Wedde, M Farooq, T Pannenbaecker, B Vogel, C Mueller, J Meth, ...
Proceedings of the 2005 conference on Genetic and evolutionary computation …, 2005
1992005
Malware detection using statistical analysis of byte-level file content
SM Tabish, MZ Shafiq, M Farooq
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009
1712009
Pe-miner: Mining structural information to detect malicious executables in realtime
MZ Shafiq, SM Tabish, F Mirza, M Farooq
International Workshop on Recent Advances in Intrusion Detection, 121-141, 2009
1482009
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection and Analysis
F Ahmed, H Hameed, MZ Shafiq, M Farooq
2009-08-24]. http://nexginrc, org/nexginrcAdmin/PublicationsFiles/aisec09 …, 2009
127*2009
Keystroke-based user identification on smart phones
S Zahid, M Shahzad, SA Khayam, M Farooq
International Workshop on Recent Advances in Intrusion Detection, 224-243, 2009
1262009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
F Ahmed, H Hameed, MZ Shafiq, M Farooq
Proceedings of the 2nd ACM workshop on Security and artificial intelligence …, 2009
1232009
Embedded malware detection using markov n-grams
MZ Shafiq, SA Khayam, M Farooq
International Conference on Detection of Intrusions and Malware, and …, 2008
982008
Bee-inspired protocol engineering: from nature to networks
M Farooq
Springer Science & Business Media, 2008
902008
Routing protocols for net generation networks inspired by collective behaviours of insect societies: An overview
M Farooq, G Di Caro
Swarm Intelligence: Introduction and Applications, 2008
842008
Beesensor: a bee-inspired power aware routing protocol for wireless sensor networks
M Saleem, M Farooq
Workshops on Applications of Evolutionary Computation, 81-90, 2007
832007
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks
M Saleem, I Ullah, M Farooq
Information Sciences 200, 38-56, 2012
802012
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
782006
A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks
HF Wedde, M Farooq
Journal of Systems Architecture 52 (8-9), 461-484, 2006
772006
Guidelines to select machine learning scheme for classification of biomedical datasets
AK Tanwani, J Afridi, MZ Shafiq, M Farooq
European Conference on Evolutionary Computation, Machine Learning and Data …, 2009
682009
Secure biometric template generation for multi-factor authentication
SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan
Pattern Recognition 48 (2), 458-472, 2015
672015
The wisdom of the hive applied to mobile ad-hoc networks
HF Wedde, M Farooq
Swarm Intelligence Symposium, 2005. SIS 2005. Proceedings 2005 IEEE, 341-348, 2005
612005
PE-probe: leveraging packer detection and structural information to detect malicious portable executables
MZ Shafiq, S Tabish, M Farooq
Proceedings of the Virus Bulletin Conference (VB), 29-33, 2009
602009
BeeAIS: Artificial immune system security for nature inspired, MANET routing protocol, BeeAdHoc
N Mazhar, M Farooq
International Conference on Artificial Immune Systems, 370-381, 2007
592007
The system can't perform the operation now. Try again later.
Articles 1–20