Follow
Rafiqul Islam
Rafiqul Islam
A/Professor in Computing, Charles Sturt University
Verified email at csu.edu.au - Homepage
Title
Cited by
Cited by
Year
A survey of anomaly detection techniques in financial domain
M Ahmed, AN Mahmood, MR Islam
Future Generation Computer Systems 55, 278-288, 2016
5802016
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3802013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference …, 2010
2592010
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference …, 2009
1822009
A Multi-tier Phishing Detection and Filtering Approach
R Islam, J Abawajy
Journal of Network and Computer Applications, 2012
1712012
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1462016
Synthesis of full-adder circuit using reversible logic
HMH Babu, MR Islam, SMA Chowdhury, AR Chowdhury
17th International Conference on VLSI Design. Proceedings., 757-760, 2004
1282004
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1152010
Reversible logic synthesis for minimization of full-adder circuit
HMH Babu, MR Islam, AR Chowdhury, SMA Chowdhury
Euromicro Symposium on Digital System Design, 2003. Proceedings., 50-54, 2003
1072003
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
1042017
Design and implementation of an optimal fuzzy logic controller using genetic algorithm
S Khan, SF Abdulazeez, LW Adetunji, AHMZ Alam, MJE Salami, ...
Journal of computer science, 2008
842008
Minimization of reversible adder circuits
S Islam, MD Islam
Deakin University, 2005
822005
Malware analysis and detection using data mining and machine learning classification
M Chowdhury, A Rahman, R Islam
International conference on applications and techniques in cyber security …, 2018
782018
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
Journal of network and computer applications 59, 416-426, 2016
752016
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
712014
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
AK Bairagi, R Khondoker, R Islam
Information Security Journal: A Global Perspective 25 (4-6), 197-212, 2016
702016
Detecting SQL injection attacks using SNORT IDS
H Alnabulsi, MR Islam, Q Mamun
Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014
692014
Intelligent financial fraud detection practices: an investigation
J West, M Bhattacharya, R Islam
International Conference on Security and Privacy in Communication Networks …, 2015
612015
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, MM Hassan, G Fortino
Future Generation Computer Systems 83, 193-207, 2018
502018
Systematic review on ai-blockchain based e-healthcare records management systems
A Haddad, MH Habaebi, MR Islam, NF Hasbullah, SA Zabidi
IEEE Access 10, 94583-94615, 2022
432022
The system can't perform the operation now. Try again later.
Articles 1–20