Folgen
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Senior Lecturer, School of IT, Deakin University, Melbourne, Australia
Bestätigte E-Mail-Adresse bei deakin.edu.au - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Human emotion recognition using deep belief network architecture
MM Hassan, MGR Alam, MZ Uddin, S Huda, A Almogren, G Fortino
Information Fusion 51, 10-18, 2019
2822019
A hybrid feature selection with ensemble classification for imbalanced healthcare data: A case study for brain tumor diagnosis
S Huda, J Yearwood, HF Jelinek, MM Hassan, G Fortino, M Buckland
IEEE access 4, 9145-9154, 2016
1852016
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1462016
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
1322018
Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model
MM Hassan, A Gumaei, S Huda, A Almogren
IEEE Transactions on Industrial Informatics 16 (9), 6154-6162, 2020
1172020
Human activity recognition from body sensor data using deep learning
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42, 1-8, 2018
1012018
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
1002017
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, JH Abawajy, WN Ismail, MM Hassan
IEEE access 6, 15941-15957, 2018
972018
A framework for software defect prediction and metric selection
S Huda, S Alyahya, MM Ali, S Ahmad, J Abawajy, H Al-Dossari, ...
IEEE access 6, 2844-2858, 2017
972017
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
S Huda, J Yearwood, MM Hassan, A Almogren
Applied soft computing 71, 66-77, 2018
962018
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek
Artificial intelligence in medicine 58 (3), 185-193, 2013
902013
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection
YA Ahmed, B Koçer, S Huda, BAS Al-rimy, MM Hassan
Journal of Network and Computer Applications 167, 102753, 2020
832020
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence
MR Hassan, MF Islam, MZ Uddin, G Ghoshal, MM Hassan, S Huda, ...
Future Generation Computer Systems 127, 462-472, 2022
722022
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
722014
Evolution of dark web threat analysis and detection: A systematic approach
S Nazah, S Huda, J Abawajy, MM Hassan
Ieee Access 8, 171796-171819, 2020
712020
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
642018
Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches
S Sharmeen, YA Ahmed, S Huda, BŞ Koçer, MM Hassan
IEEE Access 8, 24522-24534, 2020
632020
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids
A Gumaei, MM Hassan, S Huda, MR Hassan, D Camacho, J Del Ser, ...
Applied Soft Computing 96, 106658, 2020
602020
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, MM Hassan, A Almogren
Future Generation Computer Systems 89, 525-538, 2018
572018
An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model
MM Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino
IEEE Transactions on Industrial Informatics 17 (4), 2860-2870, 2020
552020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20