Name
Papers
Collaborators
MUDDASSAR FAROOQ
72
93
Citations 
PageRank 
Referers 
1221
83.47
2526
Referees 
References 
1301
863
Search Limit
1001000
Title
Citations
PageRank
Year
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data.00.342018
A Comprehensive Survey of Watermarking Relational Databases Research.00.342018
Sboxscope: A Meta S-Box Strength Evaluation Framework For Heterogeneous Confusion Boxes00.342016
Secure biometric template generation for multi-factor authentication.201.082015
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony.110.592014
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS110.792013
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints100.542013
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets20.392013
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks311.062012
An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems80.502012
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables110.622012
Embedding High Capacity Covert Channels in Short Message Service (SMS)20.412011
OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments30.392011
In-Execution Malware Detection Using Task Structures of Linux Processes60.552011
Using evolutionary algorithms for ECG Arrhythmia detection and classification40.512011
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions1203.502011
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications80.612011
A Framework for Detecting Malformed SMS Attack00.342011
Using evolutionary learning classifiers to do MobileSpam (SMS) filtering40.412011
On performance modeling of ad hoc routing protocols141.052010
Bee-sensor: a step towards meta-routing strategies in hybrid ad hoc networks20.382010
RTP-miner: a real-time security framework for RTP fuzzing attacks20.412010
Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II453.982010
Using computational intelligence to identify performance bottlenecks in a computer system00.342010
Malware detection using statistical analysis of byte-level file content481.862009
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets40.372009
IMAD: in-execution malware analysis and detection191.412009
Application of evolutionary algorithms in detection of SIP based flooding attacks240.952009
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime552.312009
A hybrid GA-PSO fuzzy system for user identification on smart phones70.692009
Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis20.392009
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets180.952009
Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings888.302009
On the appropriateness of evolutionary rule learning algorithms for malware detection40.582009
Using Formal Grammar and Genetic Operators to Evolve Malware30.462009
Performance evaluation of evolutionary algorithms in classification of biomedical datasets60.472009
Are evolutionary rule learning algorithms appropriate for malware detection?30.632009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection462.162009
A Sense of `Danger' for Windows Processes90.672009
The Role of Biomedical Dataset in Classification110.572009
Keystroke-Based User Identification on Smart Phones442.012009
A comparative study of fuzzy inference systems, neural networks and adaptive neuro fuzzy inference systems for portscan detection30.462008
Embedded Malware Detection Using Markov n-Grams341.832008
Attack analysis & bio-inspired security framework for IP multimedia subsystem50.492008
Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings706.292008
A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols00.342008
Attack analysis & bio-inspired security framework for IPMultimedia subsystem10.412008
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol60.532008
A sense of danger: dendritic cells inspired artificial immune system for manet security60.562008
A formal performance modeling framework for bio-inspired ad hoc routing protocols140.812008
  • 1
  • 2