default search action
Mohiuddin Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c40]Taylah Griffiths, Mohiuddin Ahmed, Shihao Yan:
WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A Review. WoWMoM 2025: 1-4 - 2024
- [j39]Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke:
Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Comput. Surv. 56(6): 148:1-148:33 (2024) - [j38]Mohiuddin Ahmed, A. N. M. Bazlur Rashid:
EDSUCh: A robust ensemble data summarization method for effective medical diagnosis. Digit. Commun. Networks 10(1): 182-189 (2024) - [j37]Ali Hur, Naeem Janjua, Mohiuddin Ahmed:
Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP. Expert Syst. Appl. 239: 122269 (2024) - [j36]S. M. Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Md. Hasan Furhad, Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot. Wirel. Networks 30(5): 4527-4541 (2024) - [c39]Mohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer:
Prompting LLM to Enforce and Validate CIS Critical Security Control. SACMAT 2024 - [i8]Matthew Gaber, Mohiuddin Ahmed, Helge Janicke:
Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language. CoRR abs/2408.07862 (2024) - 2023
- [j35]Saddam Al Amin, Md. Saddam Hossain Mukta, Md. Sezan Mahmud Saikat, Md. Ismail Hossain, Md. Adnanul Islam, Mohiuddin Ahmed, Sami Azam:
Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation. IEEE Access 11: 396-409 (2023) - [j34]Mohiuddin Ahmed, Md. Rabiul Islam:
A combined feature-vector based multiple instance learning convolutional neural network in breast cancer classification from histopathological images. Biomed. Signal Process. Control. 84: 104775 (2023) - [j33]Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Al-Sakib Khan Pathan:
A dependable and secure consensus algorithm for blockchain assisted microservice architecture. Comput. Electr. Eng. 109(Part B): 108762 (2023) - [j32]Md. Tarek Hasan, Md Al Emran Hossain, Md. Saddam Hossain Mukta, Arifa Akter, Mohiuddin Ahmed, Salekul Islam:
A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet 15(5): 179 (2023) - [c38]Tejas Venkateswaran, Sheikh Rabiul Islam, Md Golam Moula Mehedi Hasan, Mohiuddin Ahmed:
Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence. IEEE Big Data 2023: 4205-4212 - [c37]Martin Dart, Mohiuddin Ahmed:
Australia's Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare. HIS 2023: 65-78 - [c36]Avisen Moonsamy, Mohiuddin Ahmed:
Developing a Comprehensive Risk Management Framework for E-Health Care Delivery. HIS 2023: 101-111 - [c35]Mohiuddin Ahmed, Clark Pagutaisidro, Apichart Alexander Pike, Yuting Yang, Al-Sakib Khan Pathan:
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature. INFOCOM Workshops 2023: 1-6 - [c34]Xingbo Lu, Shihao Yan, Yuzhen Huang, Yuli Zhang, Mohiuddin Ahmed:
Channel Truncation Inspired Short-Packet Covert Communication with Poisson Packet Generation. WCSP 2023: 737-742 - [i7]Tejas Venkateswaran, Sheikh Rabiul Islam, Md Golam Moula Mehedi Hasan, Mohiuddin Ahmed:
Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence. CoRR abs/2311.16180 (2023) - 2022
- [j31]Liam Riddell, Mohiuddin Ahmed, Paul S. Haskell-Dowland:
Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connect. Sci. 34(1): 2755-2783 (2022) - [j30]A. F. M. Suaib Akhter, Mohiuddin Ahmed, Adnan Anwar, A. F. M. Shahen Shah, Al-Sakib Khan Pathan, Ahmet Zengin:
Blockchain in vehicular ad hoc networks: applications, challenges and solutions. Int. J. Sens. Networks 40(2): 94-130 (2022) - [j29]Md Mursalin, Mohiuddin Ahmed, Paul S. Haskell-Dowland:
Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors 22(22): 8988 (2022) - [j28]Mohiuddin Ahmed, Nour Moustafa, A. F. M. Suaib Akhter, Imran Razzak, Ehsanuzzaman Surid, Adnan Anwar, A. F. M. Shahen Shah, Ahmet Zengin:
A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Trans. Intell. Transp. Syst. 23(10): 19624-19633 (2022) - [j27]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection. ACM Trans. Manag. Inf. Syst. 13(3): 29:1-29:39 (2022) - [c33]Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone:
RAIDER: Reinforcement-Aided Spear Phishing Detector. NSS 2022: 23-50 - [c32]Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Mahdi Fahmideh, Al-Sakib Khan Pathan, Adnan Anwar:
Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm. WINSYS 2022: 53-60 - 2021
- [j26]Mohiuddin Ahmed, Surender Byreddy, Anush Nutakki, Leslie F. Sikos, Paul S. Haskell-Dowland:
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks 122: 102621 (2021) - [j25]A. F. M. Suaib Akhter, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, A. S. M. Kayes, Ahmet Zengin:
A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors 21(4): 1273 (2021) - [j24]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation. Sensors 21(9): 3005 (2021) - [j23]Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli:
Biometrics for Internet-of-Things Security: A Review. Sensors 21(18): 6163 (2021) - [c31]Ali Hur, Naeem Janjua, Mohiuddin Ahmed:
A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead. AIKE 2021: 99-103 - [c30]Saifur Rahman, Tance Suleski, Mohiuddin Ahmed, A. S. M. Kayes:
An Investigation of Vulnerabilities in Internet of Health Things. CrownCom/WiCON 2021: 296-306 - [c29]S. M. Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Md. Hasan Furhad, Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape. CrownCom/WiCON 2021: 307-324 - [c28]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Sheikh Rabiul Islam:
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. UbiSec 2021: 279-291 - [i6]Sheikh Rabiul Islam, William Eberle, Sheikh Khaled Ghafoor, Mohiuddin Ahmed:
Explainable Artificial Intelligence Approaches: A Survey. CoRR abs/2101.09429 (2021) - [i5]Keelan Evans, Alsharif Abuadbba, Mohiuddin Ahmed, Tingmin Wu, Mike Johnstone, Surya Nepal:
RAIDER: Reinforcement-aided Spear Phishing Detector. CoRR abs/2105.07582 (2021) - [i4]Md. Saddam Hossain Mukta, Ahmed Shahriar Sakib, Md. Adnanul Islam, Mohiuddin Ahmed, Mumshad Ahamed Rifat:
Predicting Users' Value Changes by the Friends' Influence from Social Media Usage. CoRR abs/2109.08021 (2021) - [i3]Ali Hur, Naeem Janjua, Mohiuddin Ahmed:
A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead. CoRR abs/2110.08012 (2021) - 2020
- [j22]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution. IEEE Access 8: 150113-150129 (2020) - [j21]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 8: 4 (2020) - [j20]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Blockchain: Can It Be Trusted? Computer 53(4): 31-35 (2020) - [j19]Shahrin Sadik, Mohiuddin Ahmed, Leslie F. Sikos, A. K. M. Najmul Islam:
Toward a Sustainable Cybersecurity Ecosystem. Comput. 9(3): 74 (2020) - [j18]Mohiuddin Ahmed:
A Case Study on the Development of Adult Language, Literacy and Numeracy Skills. EAI Endorsed Trans. e Learn. 6(19): e1 (2020) - [j17]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Deep learning for collective anomaly detection. Int. J. Comput. Sci. Eng. 21(1): 137-145 (2020) - [j16]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Cooperative co-evolution for feature selection in Big Data with random feature grouping. J. Big Data 7(1): 107 (2020) - [j15]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping. J. Big Data 7(1): 111 (2020) - [c27]Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. TrustCom 2020: 727-735 - [i2]Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. CoRR abs/2010.08521 (2020)
2010 – 2019
- 2019
- [j14]Mohiuddin Ahmed:
Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access 7: 68669-68677 (2019) - [j13]Mohiuddin Ahmed:
Data summarization: a survey. Knowl. Inf. Syst. 58(2): 249-273 (2019) - [c26]Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. CCC 2019: 62-66 - [c25]Mohiuddin Ahmed, Ehab Al-Shaer:
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. HotSoS 2019: 21:1-21:3 - 2018
- [j12]Mohiuddin Ahmed:
Reservoir-based network traffic stream summarization for anomaly detection. Pattern Anal. Appl. 21(2): 579-599 (2018) - [j11]Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Infrequent pattern mining in smart healthcare environment using data summarization. J. Supercomput. 74(10): 5041-5059 (2018) - [c24]Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed:
gExtractor: Towards Automated Extraction of Malware Deception Parameters. SSPREW@ACSAC 2018: 2:1-2:12 - [c23]Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154 - [c22]Md. Hasan Furhad, Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective. IJCCI 2018: 163-174 - [c21]Sakib Mahtab Khandaker, Afzal Hussain, Mohiuddin Ahmed:
Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. SGIoT 2018: 113-120 - [c20]Munir Ahmad Saeed, Mohiuddin Ahmed:
Evaluation Metrics for Big Data Project Management. SGIoT 2018: 139-142 - [c19]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. SSCC 2018: 211-219 - 2017
- [j10]Mohiuddin Ahmed:
Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering. Computer 50(9): 76-82 (2017) - [j9]Mohiuddin Ahmed:
An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network. EAI Endorsed Trans. Scalable Inf. Syst. 4(14): e3 (2017) - [c18]Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ACSAC 2017: 103-115 - [c17]Mohiuddin Ahmed, Nazim Choudhury, Shahadat Uddin:
Anomaly Detection on Big Data in Financial Markets. ASONAM 2017: 998-1001 - [c16]Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
False Data Injection Attacks in Healthcare. AusDM 2017: 192-202 - 2016
- [b1]Mohiuddin Ahmed:
Detecting Rare and Collective Anomalies in Network Traffic Data using Summarization. University of New South Wales, Sydney, Australia, 2016 - [j8]Mohiuddin Ahmed, Abdun Naser Mahmood, Md. Rafiqul Islam:
A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55: 278-288 (2016) - [j7]Mohiuddin Ahmed, Abdun Naser Mahmood, Jiankun Hu:
A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60: 19-31 (2016) - 2015
- [j6]Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher:
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(3): e5 (2015) - [j5]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Trans. Scalable Inf. Syst. 2(5): e4 (2015) - 2014
- [c15]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Infoscale 2014: 38-47 - [c14]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
A Novel Approach for Network Traffic Summarization. Infoscale 2014: 51-60 - [c13]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
Heart Disease Diagnosis Using Co-clustering. Infoscale 2014: 61-70 - [c12]Mohiuddin Ahmed, Abdun Naser Mahmood:
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. SecureComm (2) 2014: 204-219 - [c11]Adnan Anwar, Abdun Naser Mahmood, Mohiuddin Ahmed:
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. SecureComm (2) 2014: 252-266 - 2011
- [c10]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed:
On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster. ICA3PP (2) 2011: 225-234 - [c9]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Ariff Abdullah, Mohiuddin Ahmed, Omar Al-Mushayt, Shariq Haseeb:
Performance analysis of a highly available home agent in mobile networks. SpringSim (CNS) 2011: 62-70 - [i1]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed:
On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster. CoRR abs/1108.3268 (2011) - 2010
- [c8]Mohiuddin Ahmed, Mohammad Moshee Uddin, Md. Saiful Azad, Shariq Haseeb:
MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux. SpringSim 2010: 99 - [c7]Mohiuddin Ahmed, Zubaidah Muataz Hazza:
A novel algorithm to prevent man in the middle attack in LAN environment. SpringSim 2010: 106 - [c6]Zuhal Hud, Rachmat Handinugraha, Kazi Shahzabeen Rahnuma, Mohiuddin Ahmed:
IPv6 mobility: performance evaluation of VoIP on MIPv6. SpringSim 2010: 108
2000 – 2009
- 2009
- [c5]Quazi Shoyweeb Md. Faisal, Mohiuddin Ahmed:
An Intelligent Data Dissemination System Under Publish/Subscribe Mechanism (abstract). HSC 2009: 23 - [c4]Mohiuddin Ahmed, Abdelgadir Tageldin Abdelgadir, Mohamad Marwan Salim:
Implementation and Performance Analysis of a Live Linux Cluster in a Dynamic Environment. PDPTA 2009: 414-421 - 2007
- [j4]Rafikul Islam, Mohiuddin Ahmed, Masliza Hj. Alias:
Application of Quality Function Deployment in redesigning website: a case study on TV3. Int. J. Bus. Inf. Syst. 2(2): 195-216 (2007) - [c3]Mohiuddin Ahmed, Mohd. Adam Suhaimi, Quazi Shoyweeb Md. Faisal, Shariq Haseeb:
Evaluating QoS performance of streaming video on both IPv4 and IPv6 protocols. SpringSim (1) 2007: 109-116 - 2006
- [j3]Mohiuddin Ahmed, Charles M. Boisvert:
Using computers as visual aids to enhance communication in therapy. Comput. Hum. Behav. 22(5): 847-855 (2006) - [j2]Mohiuddin Ahmed, Rafikul Islam, Salim Khloof Al-Wahaibi:
Developing quality healthcare software using quality function deployment: a case study based on Sultan Qaboos University Hospital. Int. J. Bus. Inf. Syst. 1(4): 408-425 (2006) - 2003
- [c2]Mohiuddin Ahmed, Son K. Dao:
Protocols for Enhancing Gateway Dependability in Hybrid Mobile Ad Hoc Networks. CATA 2003: 114-117 - 2002
- [j1]Mohiuddin Ahmed, Srikanth V. Krishnamurthy, Randy H. Katz, Son K. Dao:
Trajectory control of mobile gateways for range extension in ad hoc networks. Comput. Networks 39(6): 809-825 (2002) - [c1]Mohiuddin Ahmed, Srikanth V. Krishnamurthy, Randy H. Katz, Son K. Dao:
An architecture for providing range extension by deploying mobile gateways in ad hoc networks. PIMRC 2002: 1660-1664
Coauthor Index
aka: Abu S. S. M. Barkat Ullah
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint