Publications
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks
Keshav Sood, Mohammad Nosouhi, Dinh Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss
(2023), Vol. 18, pp. 965-979, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters
Z Zhou, K Li, J Abawajy, M Shojafar, M Chowdhury, F Li, K Li
(2022), Vol. 7, pp. 371-385, IEEE Transactions on Sustainable Computing, C1
Z Zhou, J Abawajy, M Shojafar, M Chowdhury
(2022), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, NJ, C1
Evaluating Public Service Delivery Smartness and Impact on Citizens’ Well-being
F Hartanti, J Abawajy, M Chowdhury
(2022), Vol. 10, pp. 69106-69124, IEEE Access, C1
A Ghosh, J Abawajy, M Chowdhury
(2022), Construction Innovation, C1
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis
V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai
(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1
An empirical analysis of graph-based linear dimensionality reduction techniques
L Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi
(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1
An extended reselling protocol for existing anti-counterfeiting schemes
G Khalil, R Doss, M Chowdhury
(2021), Vol. 10, Journal of Sensor and Actuator Networks, C1
A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things
Morshed Chowdhury, Biplob Ray, Sujan Chowdhury, Sutharshan Rajasegarar
(2021), Vol. 2, pp. 1-23, ACM Transactions on Internet of Things, New York, N.Y., C1
Drivers Fatigue Level Prediction using Facial, and Head Behavior Information
H Kassem, M Chowdhury, J Abawajy
(2021), Vol. 9, pp. 121686-121697, IEEE Access, Piscataway, N.J., C1
Citizens' Trust Measurement in Smart Government Services
F Hartanti, J Abawajy, M Chowdhury, W Shalannanda
(2021), Vol. 9, pp. 150663-150676, IEEE Access, Piscataway, N.J., C1
M Chowdhury, M Hosseini, I Martek, D Edwards, J Wang
(2021), Vol. 26, pp. 953-973, Journal of Information Technology in Construction, Stockholm, Sweden, C1
Cost-Aware Big Data Stream Processing in Cloud Environment
A Al-Mansoori, J Abawajy, M Chowdhury
(2021), Vol. 363, pp. 120-136, CloudComp 2020 : Proceedings of the 10th EAI International Conference on Cloud Computing, Qufu, China, E1
A Brief Introduction on Proposed Early Bushfires Detection Model
G Khalil, T Al, A Ayoob, M Chowdhury, D Khalil, Z Ayoob
(2021), pp. 1-5, ICECCME 2021 : Proceedings of the Electrical, Computer, Communication & Mechatronics Engineering 2021 Conference, Mauritius, Mauritius, E1
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services
M Chowdhury, J Abawajy, A Kelarev, H Jelinek
(2020), Vol. 8, pp. 473-483, IEEE Transactions on Cloud Computing, C1
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection
J Abawajy, M Chowdhury, A Kelarev
(2020), Vol. 8, pp. 398-407, IEEE Transactions on Cloud Computing, C1
Z Zhou, F Li, H Zhu, H Xie, J Abawajy, M Chowdhury
(2020), Vol. 32, pp. 1531-1541, Neural Computing and Applications, C1
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments
G Khalil, R Doss, M Chowdhury
(2020), Vol. 8, pp. 47952-47962, IEEE Access, C1
A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise
G Khalil, R Doss, M Chowdhury
(2020), Vol. 9, Journal of Sensor and Actuator Networks, C1
Uav swarm mission planning in dynamic environment using consensus-based bundle algorithm
Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, S Ling
(2020), Vol. 20, Sensors (Switzerland), Switzerland, C1
Efficiency broadcast base safety message BSM through VANET based on Transmit Packet Coding (TPC)
A Ayoob, G Khalil, L Yingzhuang, M Chowdhury, T Al
(2020), pp. 383-387, LifeTech 2020 : Proceedings of the 2020 IEEE 2nd Global Conference on Life Sciences and Technologies, Kyoto, Japan, E1
M Chowdhury, R Doss, B Ray, S Rajasegarar, S Chowdhury
(2020), Vol. 324, pp. 28-41, SGIoT 2019 : Proceedings of the Third European Alliance for Innovation International Conference on Smart Grid and Internet of Things 2019, TaiChung, Taiwan, E1
BDSP in the cloud: scheduling and load balancing utlizing SDN and CEP
A Al-Mansoori, J Abawajy, M Chowdhury
(2020), pp. 827-835, CCGRID 2020 : Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Vic., E1
Yawn based driver fatigue level prediction
H Kassem, M Chowdhury, J Abawajy, A Al-Sudani
(2020), pp. 372-382, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1
Utility-aware graph dimensionality reduction approach
L Al Omairi, J Abawajy, M Chowdhury
(2020), pp. 327-333, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1
Avoiding Geographic Regions in Tor
Matthew Ryan, Morshed Chowdhury, Frank Jiang, Robin Ram Mohan Doss
(2020), pp. 802-809, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Performance evaluation of Aloha and CSMA for LoRaWAN network
M Baddula, B Ray, M Chowdhury
(2020), pp. 1-6, CSDE 2020: IEEE Asia-Pacific Conference on Computer Science and Data Engineering,, Gold Coast, Qld., E1
A comparison survey study on RFID based anti-counterfeiting systems
G Khalil, R Doss, M Chowdhury
(2019), Vol. 8, Journal of Sensor and Actuator Networks, C1
Intrusion detection system classifier for VANET based on pre-processing feature extraction
Ayoob Ayoob, Ghaith Khalil, Morshed Chowdhury, Robin Ram Mohan Doss
(2019), Vol. 1113, pp. 3-22, FNSS 2019 : Future Network Systems and Security 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Victoria, E1
High-dimensionality graph data reduction based on proposing a new algorithm
Lamyaa Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi
(2019), Vol. 63, Proceedings of 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, California, E1
Performance evaluation of LoRaWAN for mission-critical IoT networks
A Ahmad, B Ray, M Chowdhury
(2019), Vol. 1113, pp. 37-51, FNSS 2019 : Proceedings of the Future Network Systems and Security International Conference, Melbourne, Vic., E1
Ad-hoc framework for efficient network security for unmanned aerial vehicles (UAV)
M Haque, M Chowdhury
(2019), Vol. 1113, pp. 23-36, FNSS 2019 : Proceedings of the 5th International Conference on Future Network Systems and Security 2019, Melbourne, Vic., E1
Insider attacks on Zigbee based IoT networks by exploiting AT commands
W Piracha, M Chowdhury, B Ray, S Rajasegarar, R Doss
(2019), Vol. 1116, pp. 77-91, ATIS 2019 : Proceedings of the 10th Applications and Techniques in Information Security Conference 2019, Tamil Nadul, India, E1
A survey in RFID ownership transfer protocols
Gaith Al, Torana Al, M Chowdhury, R Doss
(2018), pp. 83-91, RFID technology: design principles, applications and controversies, Hauppauge, N.Y., B1
Universal and secure object ownership transfer protocol for the Internet of Things
B Ray, J Abawajy, M Chowdhury, A Alelaiwi
(2018), Vol. 78, pp. 838-849, Future Generation Computer Systems, C1
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center
Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li
(2018), Vol. 6, pp. 27080-27090, IEEE Access, C1
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, A Alelaiwi, F Li
(2018), Vol. 86, pp. 836-850, Future Generation Computer Systems, C1
Border surveillance with WSN systems in a distributed manner
H Mostafaei, M Chowdhurry, M Obaidat
(2018), Vol. 12, pp. 3703-3712, IEEE systems journal, Piscataway, N.J., C1
SDN enabled BDSP in public cloud for resource optimization
A Al-Mansoori, J Abawajy, M Chowdhury
(2018), Wireless networks, New York, N.Y., C1
Cloud-based load balancing using double Q-learning for improved quality of service
D Tennakoon, M Chowdhury, T Luan
(2018), Wireless networks, New York, N.Y., C1
P Sarkar, M Chowdhury, J Abawajy
(2018), Vol. 580, pp. 315-328, ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1
Publicly verifiable secret sharing scheme in hierarchical settings using CLSC over IBC
P Sarkar, S Nandi, M Chowdhury
(2018), Vol. 580, pp. 194-205, ATCI 2017 : Proceedings of the International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1
Breast cancer recurrence prediction using random forest model
T Al-Quraishi, J Abawajy, M Chowdhury, S Rajasegarar, A Abdalrada
(2018), Vol. 700, pp. 318-329, SCDM 2018 : Concise and informative : Proceedings of the 3rd International Conference on Soft Computing and Data Mining, Johor, Malaysia, E1
A Abdalrada, J Abawajy, M Chowdhury, S Rajasegarar, T Al-Quraishi, H Jelinek
(2018), Vol. 700, pp. 135-146, SCDM 2018 : Proceedings of the 3rd International Conference on Soft Computing and Data Mining 2018, Johor, Malaysia, E1
A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV)
M Haque, M Chowdhury
(2018), Vol. 239, pp. 113-122, SecureComm 2017 : Proceedings of the 13th International Security and Privacy in Communication Networks Conference, Niagara Falls, Ontario, E1
A novel middleware framework for implementing bigdata analytics in multi cloud environment
S Hussain, M Chowdhury
(2018), pp. 1-8, ICSENG 2018 : Proceedings of the 2018 26th International Conference on Systems Engineering, Sydney, N.S.W., E1
Multilayer hybrid strategy for phishing email zero-day filtering
M Chowdhury, J Abawajy, A Kelarev, T Hochin
(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1
P Sarkar, M Chowdhury, K Sakurai
(2017), Vol. 29, pp. 1-13, Concurrency computation, Chichester, Eng., C1
Energy-efficient virtual machine consolidation algorithm in cloud data centers
Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury
(2017), Vol. 24, pp. 2331-2341, Journal of Central South University, Hunan Sheng, China, C1-1
Secure IoT using weighted signed graphs
P Sarkar, M Chowdhury
(2017), Vol. 198, pp. 241-256, SecureComm 2016 : Proceedings of the 12th International Security and Privacy in Communication Networks Conference, Guangzhou, China, E1
A multi-protocol security framework to support internet of things
B Ray, M Chowdhury, J Abawajy
(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1
Adjusting matryoshka protocol to address the scalability issue in IoT environment
G Al, R Doss, M Chowdhury
(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1
Is high performance computing (HPC) ready to handle big data?
B Ray, M Chowdhury, U Atif
(2017), Vol. 759, pp. 97-112, FNSS 2017 : Proceedings of the 3rd International Conference on Future Network Systems and Security 2017, Gainesville, Florida, E1
A smart framework towards providing benefits for one and all
T Hochin, H Nomiya, H Lima, M Chowdhury
(2017), pp. 129-132, ACIT-CSII-BCD 2016 : Proceedings of the 4th International Conference on Applied Computing and Information Technology, 3rd International Conference on Computational Science/Intelligence and Applied Informatics, 1st International Conference on Big Data, Cloud Computing, Data Science and Engineering, Las Vegas, Nevada, E1
J Abawajy, A Kelarev, M Chowdhury, H Jelinek
(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1
Matrix constructions of centroid sets for classification systems
M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan
(2016), Vol. 30, pp. 2397-2403, Filomat, C1
Secure Object Tracking Protocol for the Internet of Things
B Ray, M Chowdhury, J Abawajy
(2016), Vol. 3, pp. 544-553, IEEE Internet of Things Journal, C1
Inductive hierarchical identity based key agreement with pre-deployment interactions (I-H-IB-KA-pdi)
P Sarkar, M Chowdhury
(2016), Vol. 651, pp. 106-114, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept
G Al, R Doss, M Chowdhury, B Ray
(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1
Securing sensor networks by moderating frequencies
P Sarkar, P Mahish, M Chowdhury, K Sakurai
(2015), Vol. 153, pp. 173-185, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1
Defence against code injection attacks
H Alnabulsi, Q Mamun, R Islam, M Chowdhury
(2015), Vol. 153, pp. 237-251, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1
H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev
(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1
Secure object tracking protocol for networked RFID systems
B Ray, M Chowdhury, J Abawajy, M Jesmin
(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1
A novel approach to maximize the sum-rate for MIMO broadcast channels
M Khan, R Islam, M Chowdhury
(2015), pp. 1-5, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1
H Mostafaei, M Chowdhury, R Islam, H Gholiadeh
(2015), pp. 157-160, MSWiM 2015: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancun, Mexico, E1
Image spam classification using neural network
M Chowdhury, J Gao, M Chowdhury
(2015), Vol. 164, pp. 622-632, SecureComm 2015 : Proceedings of the 11th International Conference on Security and Privacy in Communication Networks, Dallas, Texas, E1
A competitive three-level pruning technique for information security
M Chowdhury, J Abawajy, A Kelarev, K Sakurai
(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1
Intelligent Billboard Based on Ambient System (IBBAS)
B Alrubaiey, M Chowdhury, A Sajjanhar
(2014), pp. 1-17, Applied computing and information technology, Berlin, Germany, B1
Iterative construction of hierarchical classifiers for phishing website detection
J Abawajy, G Beliakov, A Kelarev, M Chowdhury
(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1
Scalable RFID security framework and protocol supporting Internet of Things
B Ray, J Abawajy, M Chowdhury
(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1
vPELS : An e-learning social environment for VLSI design with content security using DRM
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1
Large iterative multitier ensemble classifiers for security of big data
J Abawajy, A Kelarev, M Chowdhury
(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1
Securing a smart anti-counterfeit web application
B Chowdhury, M Chowdhury, J Abawajy
(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1
Automatic generation of meta classifiers with large levels for distributed computing and networking
Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury
(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1
Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics
H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri
(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1
PELS: A noble architecture and framework for a personal E-learning system (PELS)
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1
Fingertips detection for human interaction system
M Alam, G Nasierding, A Sajjanhar, M Chowdhury
(2014), pp. 1-5, ICGIP 2013 : Proceedings of the 5th International Conference on Graphic and Image Processing, Hong Kong, E1
A framework for mobile elearning (mLearning) with analytical decision model
J Dewan, M Chowdhury
(2014), pp. 1-5, SNPD 2014 IEEE/ACIS 15th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing : Proceedings, Las Vegas, Nevada, E1
RFID tag ownership transfer protocol for a closed loop system
G Aliyev, B Ray, M Chowdhury
(2014), pp. 575-579, Proceedings of the 3rd International Conference on Advanced Applied Informatics; IIAI-AAI 2014, Kitakyushu, Japan, E1
PUF-based secure checker protocol for Networked RFID Systems
B Ray, M Chowdhury, J Abawajy
(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1
Impact of Assurance of Learning (AOL) in programming course for novices
S Iqbal Malik, R Mathew, M Chowdhury, J Coldwell-Neilson
(2014), pp. 1-5, BCS 2014 : Proceedings of 2nd BCS The Chartered Institute for IT International Conference, Abu Dhabi, United Arab Emirates, E1
Steno cipher to provide data confidentiality and tampered data recovery for RFID tag
B Ray, M Chowdhury, J Abawajy
(2013), Vol. 443, pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1
Multimedia stream rate control over MANET based on router feedback
N Zaman, M Chowdhury
(2013), pp. 53-68, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1
Security risks/vulnerability in a RFID system and possible defenses
M Chowdhury, B Ray
(2013), pp. 1-15, Advanced RFID systems, security, and applications, Hershey, Pa., B1
Securing a web-based anti-counterfeit RFID system
B Chowdhury, M Chowdhury, J Abawajy
(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1
A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek
(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1
An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents
J Dewan, M Chowdhury, L Batten
(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1
Multistage approach for clustering and classification of ECG data
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1
Predicting cardiac autonomic neuropathy category for diabetic data with missing values
J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek
(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1
Critical analysis and comparative study of security for networked RFID systems
B Ray, M Chowdhury, J Abawajy
(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1
eLearning content authentication using bipartite matching
J Dewan, M Chowdhury, L Batten
(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1
Mobile devices supported learning for novice programmers
S Iqbal, M Chowdhury, O Harsh
(2013), pp. 277-282, ICEEE 2013 : Proceedings of the 2nd International Conference on e-Learning and e-Technologies, Lodz, Poland, E1
Smart Interactive Advertising Board (SIAB)
B Al-Rubaie, M Chowdhury, A Sajjanhar
(2013), pp. 312-317, IIAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1
A framework for mobile elearning (mlearning) with content security and authentication
J Dewan, M Chowdhury
(2013), pp. 95-99, IIAI AAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1
Detection of fingertips based on the combination of color information and circle detection
M Alam, M Chowdhury
(2013), pp. 572-576, ICIIS 2013 : Proceedings of the 8th IEEE International Conference on Industrial and Information Systems, Peradeniya, Sri Lanka, E1
The challenges of cloud technology adoption in E-government
M Aziz, J Abawajy, M Chowdhury
(2013), pp. 470-474, 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, E1
Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
B Ray, M Chowdhury, J Abawajy
(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1
Key predistribution scheme using finite fields and reed muller codes
P Sarkar, M Chowdhury
(2011), pp. 67-79, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1
Web health portal to enhance patient safety in Australian healthcare systems
B Chowdhury, M Chowdhury, C D'Souza, N Sultana
(2011), pp. 91-101, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1
Detecting unknown anomalous program behavior using API system calls
M Islam, M Islam, M Chowdhury
(2011), pp. 383-394, Informatics engineering and information science, Berlin, Germany, B1
Detecting unwanted email using VAT
M Islam, M Chowdhury
(2011), pp. 113-126, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1
Optimization and matrix constructions for classification of data
A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury
(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1
Security of RFID systems - a hybrid approach
S Mukherjee, M Hasan, B Chowdhury, M Chowdhury
(2011), pp. 58-63, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1
Smart RFID reader protocol for malware detection
B Ray, S Huda, M Chowdhury
(2011), pp. 64-69, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1
A framework for elearning with social media using DRM
J Dewan, M Chowdhury, S Hossain, J Dewan
(2011), pp. 229-234, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1
vPELS : an eLearning social environment for VLSI design with content security using DRM
J Dewan, M Chowdhury
(2011), pp. 37-42, SSNE 2011 : Proceedings of the 1st ACIS International Symposium on Software and Network Engineering, Seoul, Korea, E1
Dynamic addressing in wireless sensor networks without location awareness
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1
Faster CRT-RSA Decryption towards RFID applications
S Maitra, S Sarkar, M Chowdhury
(2010), pp. 61-72, RFIDsec'10 : Proceedings of the 2010 Radio Frequency Identification System Security Workshop, Singapore, E1
Enhanced RFID mutual authentication scheme based on shared secret information
B Ray, M Chowdhury
(2010), pp. 208-213, CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nev., E1
Mutual authentication with malware protection for a RFID system
R Biplob, M Chowdhury, T Pham
(2010), pp. 24-29, ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, Phuket, Thailand, E1
Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes
P Sarkar, A Saha, M Chowdhury
(2010), pp. 507-512, IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, San Francisco, Calif., E1
Improving the qos for information discovery in autonomic wireless sensor networks
R Doss, G Li, V Mak, S Yu, M Chowdhury
(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1
Minimizing the drawbacks of grey-list analyser in synthesis based spam filtering
M Islam, M Chowdhury
(2009), Vol. 11, pp. 89-96, Journal of electronics and computer science, [U.S.A.], C1
Real-time early infectious outbreak detection systems using emerging technologies
B Chowdhury, M Chowdhury, N Sultana
(2009), pp. 506-508, ARTCom 2009 : Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, E1
B Chowdhury, M Chowdhury, C D`Souza
(2008), pp. 49-59, Software engineering, artificial intelligence, networking and parallel/distributed computing, Berlin, Germany, B1
Real-time secured RFID-based smart healthcare management system
B Chowdhury, R Khosla, M Chowdhury
(2008), Vol. 9, pp. 21-28, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1
Dynamic feature selection for spam filtering using support vector machine
M Islam, W Zhou, M Chowdhury
(2008), Vol. 9, pp. 41-50, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1
The crossroads approach to information discovery in wireless sensor networks
R Doss, G Li, S Yu, V Mak, M Chowdhury
(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1
Real-time RFID-based secured loan document management system
B Chowdhury, M Chowdhury, C D`Souza
(2008), pp. 484-489, ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, Cairns, Queensland, E1
Email categorization using (2+1)-tier classification algorithms
M Islam, W Zhou, M Chowdhury
(2008), pp. 276-281, ICIS 2008 : Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science 2008, Portland, Oregon, E1-1
Dynamic feature selection for spam filtering using support vector machine
M Islam, W Zhou, M Chowdhury
(2007), pp. 757-762, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1
Acoustic features extraction for emotion recognition
J Rong, Y Chen, M Chowdhury, G Li
(2007), pp. 419-424, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1
Fast scene change detection based histogram
M Chowdhury, R Rahman, J Saha, S Kabir
(2007), pp. 229-233, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1
Fingerprint recognition system using hybrid matching techniques
A Youssif, M Chowdhury, S Ray, H Nafaa
(2007), pp. 234-240, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1
A comparison of bipartite N-Qubit states to classify entangled states under symmetric consideration
A Ahmed, A Rahman, M Anwer, N Haque, M Chowdhury
(2007), pp. 291-295, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1
RFID-based real-time smart waste management system
B Chowdhury, M Chowdhury
(2007), pp. 175-180, ATNAC 2007 : Australasian Telecommunication Networks and Applications Conference 2007, Christchurch, New Zealand. Sunday 2 December-Wednesday 5 December 2007., Christchurch, New Zealand, E1
Lease based addressing for event-driven wireless sensor networks
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1
Address reuse in wireless sensor networks
R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Topology based packet marking for IP traceback
H Alwis, R Doss, P Hewage, M Chowdhury
(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1
Energy efficient on-demand addressing for wireless sensor networks
P Hewage, R Doss, H Alwis, M Chowdhury
(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1
A new approach for security in internet mobile communication
M Islam, M Chowdhury, M Morogan
(2006), pp. 171-175, ICNEWS 2006 : proceedings of First International Conference on Next-Generation Wireless Systems 2006, Dhaka, Bangladesh, E1
A novel method for person identification by comparing retinal patterns
R Rahman, M Chowdhury, S Kabir, M Khan
(2006), pp. 14-17, CAINE-2006. proceedings : 19th International Conference on Computer Applications in Industry and Engineering : (CAINE-2006) : Nov. 13-15, 2006, Las Vegas, Nevada, USA, Las Vegas, Nevada, E1
A Sadat, S Sorwar, M Chowdhury
(2006), pp. 214-218, 5th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2006) in conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (COMSAR 2006) : proceedings : 10-12, Honolulu, Hawaii, E1
Priority frequency maptable for query optimization using materialized views
M Islam, M Chowdhury
(2005), pp. 15-18, ICIT 2005 : Human computer interaction : Proceedings of the 2nd International Conference on Information Technology, Amman, Jordan, E1
Spam filtering using ML algorithms
M Islam, M Chowdhury
(2005), pp. 419-426, Proceedings of the IADIS international conference WWW/Internet 2005, Lisbon, Portugal, E1
An innovative spam filtering model based on support vector machine
M Islam, M Chowdhury, W Zhou
(2005), pp. 348-353, CIMCA 2005 jointly with IAWTIC 2005 : proceedings, Vienna, Austria, E1
Improved learning algorithm performance using linear kernal transformation
S Ali, M Chowdhury
(2005), pp. 164-167, ISCA 2005 : Computers and their applications : proceedings of the International Society for Computers and their Applications 20th International Conference, New Orleans, Louisiana, USA, March 16-18, 2005, New Orleans, Louisiana, E1
Impact of image organizations on multimedia document retrieval
N Haque, M Chowdhury, S Rahman
(2005), pp. 340-343, Fourth Annual ACIS International Conference on Computer and Information Science, Jeju Island, South Korea, E1
Computer aided analysis of dental radiographic images
A Youssif, M Chowdhury, S Ray
(2005), pp. 43-43, Proceedings of the Digital Image Computing : Techniques and Applications : (DICTA 2005), Cairns, Queensland, E1
An algorithm for efficient and effective retrieval of heterogeneous multimedia document collections
N Haque, M Chowdhury, T Pham
(2005), pp. 438-444, Proceedings of the International Conference on Cognition and Recognition, 22-23 December 2005, Mandya, India, E1
GHIRS: integration of hotel management systems by web services
Y Xiang, W Zhou, M Chowdhury
(2004), Vol. 3033, pp. 1002-1009, Lecture notes in computer science, Berlin, Germany, C1
Filtering mobile spam by support vector machine
Y Xiang, M Chowdhury, S Ali
(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1
M Chowdhury, S Ray, T Pham
(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1
Performance analysis of algorithms for frequent pattern generation
M Islam, M Chowdhury, S Khan
(2004), pp. 43-55, Complex 2004: Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Australia, E1
Medical image classification using an efficient data mining technique
M Islam, M Chowdhury, S Khan
(2004), pp. 34-42, Complex 2004 : Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Qld., E1
M Chowdhury, S Ray, T Pham
(2004), pp. 143-147, Computer applications in industry and engineering : proceedings of the ISCA 17th international conference : Orlando, Florida, USA, November 17-19, 2004, Orlando, USA, E1
M Chowdhury, D Perera, T Pham
(2004), pp. 516-521, Proceedings of INMIC 2004 : 8th International Multitopic Conference : December 24-26, 2004, National University of Computer and Emerging Sciences, Lahore, Pakistan, Lahore, Pakistan, E1
A comparative study of image cropping algorithms on multimedia retrieval
N Haque, M Chowdhury
(2004), International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1
Image semantic classification by using SVM
H Wan, M Chowdhury
(2003), Vol. 14, pp. 1891-1899, Journal of software, Beijing, China, C1
W Hualin, M Chowdhury, H Hong, S Zhongzhi
(2003), Vol. 15, pp. 195-199, Journal of computer aided design and computer graphics, Beijing, China, C1
A simulation model for video traffic performance via ATM over TCP/IP
M Chowdhury, Y Tu, T Pham
(2003), pp. 197-202, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1
M Chowdhury, S Ray, T Pham
(2003), pp. 454-457, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1
MPEG Traffic Performance via TCP over ATM
M Chowdhury, Y Tu, T Pham
(2003), pp. 128-132, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1
Web service based wagering system for the best odds
A Sajjanhar, Z Ying, M Chowdhury
(2003), pp. 242-245, Intelligent and adaptive systems and software engineering : Proceedings of the ISCA, 12th International Conference, San Francisco, CA, USA, July 9-11, 2003, San Francisco, California, E1
A vision for a multimedia knowledge management framework
W Dai, M Chowdhury, D Prager, M Alam
(2003), pp. 430-433, Computers and their applications : proceedings of the ISCA 18th international conference, Honolulu, Hawaii, USA March 26-28, 2003, Honolulu, Hawaii, USA, E1
Reducing blocking artefacts in MPEG video coded images using entropic methods
M Chowdhury, S Ray, T Pham
(2003), pp. 213-216, Advances in Pattern Recognition (ICAPR-2003), Kolkata, India, E1
The major drawbacks to the use of wireless communication products in education
L Batten, M Chowdhury, J Drew
(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1
Quality-of-service routing for web-based multimedia servers
S Yu, W Zhou, M Chowdhury
(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1
A parameter adjustment method for relevance feedback
H Wan, M Chowdhury, A Sajjanhar
(2003), pp. 619-625, CISST 2003 : Proceedings of the international conference on imaging science, systems, and technology, Las Vegas, Nevada, E1
A scheme for content based retrieval of music data in MIDI format
S Subramanya, M Chowdhury, T Pham, S Shankar
(2003), pp. 159-162, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1
Image retrieval based on the combination of color and keyword
Y Jiang, Z Zhou, M Chowdhury
(2003), pp. 450-453, CSITeA'03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1
Nonlinear discrimination using support vector machine
A Ali, M Chowdhury, S Subramanya
(2003), pp. 287-290, Computers and their applications: proceedings of the ISCA 18th international conference, Honolulu, Hawaii, E1
M Chowdhury, S Ray, T Pham
(2002), pp. 1-4, ACIS 2002 : International Conference on Computer Science, Information Technology, e-Business, and Applications (CSITeA '02), Foz do Iguazu, Brazil, E1
A new texture spectrum descriptor and its application in image semantic classification
H Wan, M Chowdhury, H Hu, Z Shi
(2002), pp. 176-179, Computers and their applications : proceedings of the ISCA 17th International Conference, San Francisco, California, USA, April 4-6, 2002, San Francisco, California, E1
Adaptive DCT coding of images using block categorization
S Subramanya, M Chowdhury, T Pham
(2002), pp. 386-390, CISST'02 : proceedings of the International Conference on Imaging Science, Systems, and Technology : Las Vegas, Nevada, USA, June 24-27, 2002, Las Vegas, Nevada, E1
M Islam, M Chowdhury
(2002), pp. 239-242, International Society for Computers and their Applications : 15th International conference on computer applications in industry and engineering, San Diego, California, USA, E1
M Chowdhury, T Pham
(2001), pp. 189-192, Computer applications in industry and engineering : proceedings of the ISCA 14th International Conference, Las Vegas, Nevada, U.S.A., November 27-29, 2001, Las Vegas, Nevada, USA, E1
Retrieval of multimedia documents using low cost image ranking algorithms
N Haque, M Chowdhury
(2001), pp. 41-44, Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering., Las Vegas, Nevada, E1
Designing wave digital filters with finite word length coefficient in the time and frequency domain
S Sorwar, M Chowdhury
(2001), pp. 250-253, The Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, USA, E1
Image featuring for retrieval of multimedia documents
N Haque, M Chowdhury
(2001), pp. 427-432, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1
An intelligent forex monitoring system
A Abraham, M Chowdhury
(2001), pp. 523-528, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1
M Chowdhury
(2000), pp. 198-202, 15th International Conference on Computers and Their Applications 2000, CATA 2000, E1-1
Block Classification for Reducing Artefacts in Video Images Using Statistical Correlation
M Chowdhury, S Rahman, B Nath
(1998), pp. 102-105, 13th International Conference on Computers and Their Applications 1998, CATA 1998, E1-1
Funded Projects at Deakin
No Funded Projects at Deakin found
Supervisions
Ahmed Jaber Hussein Al-Mansoori
Thesis entitled: Big Data Stream Processing in the Cloud
Doctor of Philosophy (Information Technology), School of Information Technology
Md Samsul Haque
Thesis entitled: On-Demand Framework for Unmanned Aerial Vehicle Network Security
Master of Science (Information Technology), School of Information Technology
Ahmad Shaker Abdalrada
Thesis entitled: The Role of Various Risk Factors in the Prevalence of Cardiac Autonomic Neuropathy and Associated Diseases.
Doctor of Philosophy (Information Technology), School of Information Technology
Jahangir Dewan
Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning
Doctor of Philosophy (Information Technology), School of Information Technology
Biplob Ray
Thesis entitled: Security framework and protocols for the internet of things
Doctor of Philosophy (Information Technology), School of Information Technology
Tahsien Ali Hussein Al-Quraishi
Thesis entitled: Predicting breast cancer risk, recurrence and survivability
Doctor of Philosophy (Information Technology), School of Information Technology
Haider Adeeb Kassem Kassem
Thesis entitled: Vision-Based Driver Fatigue Prediction
Doctor of Philosophy (Information Technology), School of Information Technology
Maslina Abdul Aziz
Thesis entitled: QoS-Aware Predictive Workflow Scheduling
Doctor of Philosophy (Information Technology), School of Information Technology
Ghaith Dh Khalil
Thesis entitled: A Novel RFID Based Anti-Counterfeiting Scheme for Retailer Environments
Doctor of Philosophy (Information Technology), School of Information Technology
Lamyaa Jebur Yousif Al-Omairi
Thesis entitled: Linear Dimensionality Reduction Method for Graph Data
Doctor of Philosophy (Information Technology), School of Information Technology
Sara Ghanavati
Thesis entitled: Learning-based Internet of Things Resource Management
Doctor of Philosophy (Information Technology), School of Information Technology
Abdulaziz Aljunaibi
Thesis entitled: Isomorphism as a Paradigm for Strategic Change Management in AbuDhabi government
Doctor of Philosophy (Information Technology), School of Information Technology
Benjamin Jonathan Townsend
Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform
Doctor of Philosophy (Information Technology), School of Information Technology
Baker Alrubaiey
Thesis entitled: Assuring Virtual Network Reliability and Resilience
Doctor of Philosophy (Information Technology), School of Information Technology
Sara Ghanavati
Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure
Master of Science (Information Technology), School of Information Technology
Isredza Rahmi A Hamid
Thesis entitled: Phishing Detection and Traceback Mechanism
Doctor of Philosophy (Information Technology), School of Information Technology
Davood Izadi
Thesis entitled: Enhancing Wireless Sensor Networks Functionalities
Doctor of Philosophy (Information Technology), School of Information Technology
Mahbub Ahmed
Thesis entitled: Security in cloud computing
Doctor of Philosophy (Information Technology), School of Information Technology
Yiqing Tu
Thesis entitled: Efficient Dimensionality Reduction and One-class Classification for Content-based Image Retrieval
Doctor of Philosophy (Information Technology), School of Information Technology
Ke Li
Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems
Doctor of Philosophy (Information Technology), School of Information Technology
Yang Xiang
Thesis entitled: A Distributed Active Defense System against DDoS Attacks
Doctor of Philosophy (Information Technology), School of Information Technology