default search action
Muddassar Farooq
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Syed Hamail Hussain Zaidi, Amna Basharat, Muddassar Farooq:
Mining Disease Progression Patterns for Advanced Disease Surveillance. AIME (1) 2024: 81-89 - 2023
- [c60]Muhammad Usamah Shahid, Muddassar Farooq:
Boosted Random Forests for Predicting Treatment Failure of Chemotherapy Regimens. AIME 2023: 13-24 - 2020
- [j16]Omar Ansari, Muhammad Amin, Moazam Maqsood, Abdul Rahman Muhammad Maud, Muddassar Farooq:
Inter-Subset Hamming Distance Maximization for Enhancing the Physical Layer Security of Antenna Subset Modulation. IEEE Access 8: 221513-221524 (2020)
2010 – 2019
- 2018
- [i2]Muhammad Kamran, Muddassar Farooq:
A Comprehensive Survey of Watermarking Relational Databases Research. CoRR abs/1801.08271 (2018) - [i1]Muhammad Kamran, Muddassar Farooq:
An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data. CoRR abs/1801.09741 (2018) - 2017
- [c59]Abrar Ahmad, Muhammad Amin, Muddassar Farooq:
Analyzing Directional Modulation Techniques as Block Encryption Ciphers for Physical Layer Security. WCNC 2017: 1-6 - 2016
- [c58]Abrar Ahmad, Muddassar Farooq, Muhammad Amin:
SBoxScope: A Meta S-box Strength Evaluation Framework for Heterogeneous Confusion Boxes. HICSS 2016: 5545-5553 - 2015
- [j15]Salman H. Khan, Muhammad Ali Akbar, Farrukh Shahzad, Muddassar Farooq, Zeashan H. Khan:
Secure biometric template generation for multi-factor authentication. Pattern Recognit. 48(2): 458-472 (2015) - [c57]Muhammad Shoaib, Muddassar Farooq:
USpam - A User Centric Ontology Driven Spam Detection System. HICSS 2015: 3661-3669 - 2014
- [j14]Muhammad Ali Akbar, Muddassar Farooq:
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony. Knowl. Inf. Syst. 38(2): 491-510 (2014) - 2013
- [j13]Farrukh Shahzad, Muhammad Shahzad, Muddassar Farooq:
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS. Inf. Sci. 231: 45-63 (2013) - [j12]Muhammad Kamran, Muddassar Farooq:
A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. IEEE Trans. Inf. Forensics Secur. 8(6): 1061-1072 (2013) - [j11]Muhammad Kamran, Sabah Suhail, Muddassar Farooq:
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints. IEEE Trans. Knowl. Data Eng. 25(12): 2694-2707 (2013) - 2012
- [j10]Muhammad Saleem, Israr Ullah, Muddassar Farooq:
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks. Inf. Sci. 200: 38-56 (2012) - [j9]Farrukh Shahzad, Muddassar Farooq:
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables. Knowl. Inf. Syst. 30(3): 589-612 (2012) - [j8]Muhammad Kamran, Muddassar Farooq:
An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems. IEEE Trans. Knowl. Data Eng. 24(11): 1950-1962 (2012) - [e6]Cecilia Di Chio, Alexandros Agapitos, Stefano Cagnoni, Carlos Cotta, Francisco Fernández de Vega, Gianni A. Di Caro, Rolf Drechsler, Anikó Ekárt, Anna Isabel Esparcia-Alcázar, Muddassar Farooq, William B. Langdon, Juan Julián Merelo Guervós, Mike Preuss, Hendrik Richter, Sara Silva, Anabela Simões, Giovanni Squillero, Ernesto Tarantino, Andrea Tettamanzi, Julian Togelius, Neil Urquhart, Sima Uyar, Georgios N. Yannakakis:
Applications of Evolutionary Computation - EvoApplications 2012: EvoCOMNET, EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK, EvoSTIM, and EvoSTOC, Málaga, Spain, April 11-13, 2012, Proceedings. Lecture Notes in Computer Science 7248, Springer 2012, ISBN 978-3-642-29177-7 [contents] - 2011
- [j7]Muhammad Saleem, Israr Ullah, Syed Ali Khayam, Muddassar Farooq:
On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications. Ad Hoc Networks 9(3): 285-299 (2011) - [j6]N. Mazhar, Muddassar Farooq:
A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols. Appl. Soft Comput. 11(8): 5695-5714 (2011) - [j5]Muhammad Saleem, Gianni A. Di Caro, Muddassar Farooq:
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions. Inf. Sci. 181(20): 4597-4624 (2011) - [c56]Muhammad Bilal Junaid, Muddassar Farooq:
Using evolutionary learning classifiers to do MobileSpam (SMS) filtering. GECCO 2011: 1795-1802 - [c55]M. Jamal Afridi, Muddassar Farooq:
OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments. HICSS 2011: 1-10 - [c54]Farrukh Shahzad, Sohail Bhatti, Muhammad Shahzad, Muddassar Farooq:
In-Execution Malware Detection Using Task Structures of Linux Processes. ICC 2011: 1-6 - [c53]Komal Waseem, Awais Javed, Rashad Ramzan, Muddassar Farooq:
Using evolutionary algorithms for ECG Arrhythmia detection and classification. ICNC 2011: 2386-2390 - [c52]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
Embedding High Capacity Covert Channels in Short Message Service (SMS). STA 2011: 1-10 - [c51]M. Zubair Rafique, Muhammad Khurram Khan, Khaled Alghathbar, Muddassar Farooq:
A Framework for Detecting Malformed SMS Attack. STA 2011: 11-20 - [e5]Cecilia Di Chio, Anthony Brabazon, Gianni A. Di Caro, Rolf Drechsler, Muddassar Farooq, Jörn Grahl, Gary Greenfield, Christian Prins, Juan Romero, Giovanni Squillero, Ernesto Tarantino, Andrea Tettamanzi, Neil Urquhart, A. Sima Etaner-Uyar:
Applications of Evolutionary Computation - EvoApplications 2011: EvoCOMNET, EvoFIN, EvoHOT, EvoMUSART, EvoSTIM, and EvoTRANSLOG, Torino, Italy, April 27-29, 2011, Proceedings, Part II. Lecture Notes in Computer Science 6625, Springer 2011, ISBN 978-3-642-20519-4 [contents] - 2010
- [j4]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
On Performance Modeling of Ad Hoc Routing Protocols. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c50]Israr Ullah, Muhammad Saleem, Muddassar Farooq:
Bee-Sensor: A Step Towards Meta-Routing Strategies in Hybrid Ad Hoc Networks. ANTS Conference 2010: 392-399 - [c49]Bilal Mehdi, Faraz Ahmed, Syed Ali Khayam, Muddassar Farooq:
Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection. ICC 2010: 1-5 - [c48]Muhammad Ali Akbar, Muddassar Farooq:
RTP-miner: a real-time security framework for RTP fuzzing attacks. NOSSDAV 2010: 87-92 - [c47]Faraz Ahmed, Farrukh Shahzad, Muddassar Farooq:
Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System. PPSN (1) 2010: 304-313 - [e4]Cecilia Di Chio, Anthony Brabazon, Gianni A. Di Caro, Marc Ebner, Muddassar Farooq, Andreas Fink, Jörn Grahl, Gary Greenfield, Penousal Machado, Michael O'Neill, Ernesto Tarantino, Neil Urquhart:
Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II. Lecture Notes in Computer Science 6025, Springer 2010, ISBN 978-3-642-12241-5 [contents]
2000 – 2009
- 2009
- [c46]Ajay Kumar Tanwani, Muddassar Farooq:
The Role of Biomedical Dataset in Classification. AIME 2009: 370-374 - [c45]Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq:
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. AISec 2009: 55-62 - [c44]Ajay Kumar Tanwani, M. Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq:
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets. EvoBIO 2009: 128-139 - [c43]Shahid Mehmood, Stefano Cagnoni, Monica Mordonini, Muddassar Farooq:
Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis. EvoWorkshops 2009: 369-374 - [c42]Muhammad Ali Akbar, Muddassar Farooq:
Application of evolutionary algorithms in detection of SIP based flooding attacks. GECCO 2009: 1419-1426 - [c41]Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq:
IMAD: in-execution malware analysis and detection. GECCO 2009: 1553-1560 - [c40]Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Evolvable malware. GECCO 2009: 1569-1576 - [c39]Muhammad Shahzad, Saira Zahid, Muddassar Farooq:
A hybrid GA-PSO fuzzy system for user identification on smart phones. GECCO 2009: 1617-1624 - [c38]M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
Are evolutionary rule learning algorithms appropriate for malware detection? GECCO 2009: 1915-1916 - [c37]M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
On the appropriateness of evolutionary rule learning algorithms for malware detection. GECCO (Companion) 2009: 2609-2616 - [c36]Ajay Kumar Tanwani, Muddassar Farooq:
Performance evaluation of evolutionary algorithms in classification of biomedical datasets. GECCO (Companion) 2009: 2617-2624 - [c35]Muddassar Farooq:
Bio-inspired telecommunications. GECCO (Companion) 2009: 3513-3550 - [c34]M. Zubair Rafique, Muhammad Ali Akbar, Muddassar Farooq:
Evaluating DoS Attacks against Sip-Based VoIP Systems. GLOBECOM 2009: 1-6 - [c33]Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
A Sense of 'Danger' for Windows Processes. ICARIS 2009: 220-233 - [c32]Ajay Kumar Tanwani, Muddassar Farooq:
Classification Potential vs. Classification Accuracy: A Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets. IWLCS 2009: 127-144 - [c31]S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq:
Malware detection using statistical analysis of byte-level file content. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 23-31 - [c30]M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq:
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. RAID 2009: 121-141 - [c29]Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq:
Keystroke-Based User Identification on Smart Phones. RAID 2009: 224-243 - [c28]Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Using Formal Grammar and Genetic Operators to Evolve Malware. RAID 2009: 374-375 - [e3]Mario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni A. Di Caro, Anikó Ekárt, Anna Esparcia-Alcázar, Muddassar Farooq, Andreas Fink, Penousal Machado, Jon McCormack, Michael O'Neill, Ferrante Neri, Mike Preuss, Franz Rothlauf, Ernesto Tarantino, Shengxiang Yang:
Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings. Lecture Notes in Computer Science 5484, Springer 2009, ISBN 978-3-642-01128-3 [contents] - 2008
- [c27]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol. ANTS Conference 2008: 315-322 - [c26]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Embedded Malware Detection Using Markov n-Grams. DIMVA 2008: 88-107 - [c25]M. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam:
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. EvoWorkshops 2008: 52-61 - [c24]Nauman Mazhar, Muddassar Farooq:
A sense of danger: dendritic cells inspired artificial immune system for manet security. GECCO 2008: 63-70 - [c23]Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq:
A formal performance modeling framework for bio-inspired ad hoc routing protocols. GECCO 2008: 103-110 - [c22]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Improving accuracy of immune-inspired malware detectors by using intelligent features. GECCO 2008: 119-126 - [c21]Aliya Awais, Muddassar Farooq, Muhammad Younus Javed:
Attack analysis & bio-inspired security framework for IP multimedia subsystem. GECCO 2008: 161-162 - [c20]Aliya Awais, Muddassar Farooq, Muhammad Younus Javed:
Attack analysis & bio-inspired security framework for IPMultimedia subsystem. GECCO (Companion) 2008: 2093-2098 - [c19]Muhammad Shahzad, Saira Zahid, Muddassar Farooq:
A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols. PPSN 2008: 1130-1139 - [p1]Muddassar Farooq, Gianni A. Di Caro:
Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview. Swarm Intelligence 2008: 101-160 - [e2]Mario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni Di Caro, Rolf Drechsler, Anikó Ekárt, Anna Esparcia-Alcázar, Muddassar Farooq, Andreas Fink, Jon McCormack, Michael O'Neill, Juan Romero, Franz Rothlauf, Giovanni Squillero, Sima Uyar, Shengxiang Yang:
Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings. Lecture Notes in Computer Science 4974, Springer 2008, ISBN 978-3-540-78760-0 [contents] - 2007
- [c18]Saira Zahid, Muhammad Shahzad, Syed Usman Ali, Muddassar Farooq:
A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols. IEEE Congress on Evolutionary Computation 2007: 180-187 - [c17]Muhammad Saleem, Muddassar Farooq:
A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks. IEEE Congress on Evolutionary Computation 2007: 751-758 - [c16]M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq:
Extended thymus action for improving response of AIS based NID system against malicious traffic. IEEE Congress on Evolutionary Computation 2007: 3369-3376 - [c15]Muhammad Saleem, Muddassar Farooq:
BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks. EvoWorkshops 2007: 81-90 - [c14]Nauman Mazhar, Muddassar Farooq:
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. GECCO 2007: 102-109 - [c13]M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq:
Extended thymus action for reducing false positives in ais based network intrusion detection systems. GECCO 2007: 182 - [c12]M. Zubair Shafiq, Muddassar Farooq:
Defence Against 802.11 DoS Attacks Using Artificial Immune System. ICARIS 2007: 95-106 - [c11]Nauman Mazhar, Muddassar Farooq:
BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. ICARIS 2007: 370-381 - [e1]Mario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni Di Caro, Rolf Drechsler, Muddassar Farooq, Andreas Fink, Evelyne Lutton, Penousal Machado, Stefan Minner, Michael O'Neill, Juan Romero, Franz Rothlauf, Giovanni Squillero, Hideyuki Takagi, Sima Uyar, Shengxiang Yang:
Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings. Lecture Notes in Computer Science 4448, Springer 2007, ISBN 978-3-540-71804-8 [contents] - 2006
- [b1]Muddassar Farooq:
From the wisdom of the hive to intelligent routing in telecommunication networks: a step towards intelligent network management through natural engineering. Technical University of Dortmund, Germany, 2006, pp. 1-215 - [j3]Muddassar Farooq, Ronaldo Menezes:
Special issue on nature-inspired applications and systems. J. Syst. Archit. 52(8-9): 441-442 (2006) - [j2]Horst F. Wedde, Muddassar Farooq:
A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks. J. Syst. Archit. 52(8-9): 461-484 (2006) - [c10]Horst F. Wedde, Constantin Timm, Muddassar Farooq:
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. EvoWorkshops 2006: 243-254 - [c9]Horst F. Wedde, Constantin Timm, Muddassar Farooq:
BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems. PPSN 2006: 623-632 - 2005
- [j1]Horst F. Wedde, Muddassar Farooq:
BeeHive: Routing Algorithms Inspired by Honey Bee Behavior. Künstliche Intell. 19(4): 18-24 (2005) - [c8]Horst F. Wedde, Muddassar Farooq:
A Performance Evaluation Framework for Nature Inspired Routing Algorithms. EvoWorkshops 2005: 136-146 - [c7]Horst F. Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Bjoern Vogel, Christian Mueller, Johannes Meth, René Jeruschkat:
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. GECCO 2005: 153-160 - [c6]Horst F. Wedde, Muddassar Farooq:
Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems. IC-AI 2005: 938-943 - [c5]Horst F. Wedde, Muddassar Farooq:
The wisdom of the hive applied to mobile ad-hoc networks. SIS 2005: 341-348 - [r1]Muddassar Farooq, Horst F. Wedde:
BeeHive. Handbook of Bioinspired Algorithms and Applications 2005 - 2004
- [c4]Horst F. Wedde, Muddassar Farooq, Yue Zhang:
BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior. ANTS Workshop 2004: 83-94 - [c3]Horst F. Wedde, Muddassar Farooq, Mario Lischka:
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System. GECCO (2) 2004: 1334-1335 - [c2]Horst F. Wedde, Muddassar Farooq, Mario Lischka:
A User Centered Evolutionary Scheduling Framework. IC-AI 2004: 1126-1132 - 2002
- [c1]Horst F. Wedde, Frank Thorsten Breuer, Muddassar Farooq:
A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints. SECIII 2002: 241-250
Coauthor Index
aka: M. Zubair Shafiq
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint