关注
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Senior Lecturer, School of IT, Deakin University, Melbourne, Australia
在 deakin.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Human emotion recognition using deep belief network architecture
MM Hassan, MGR Alam, MZ Uddin, S Huda, A Almogren, G Fortino
Information Fusion 51, 10-18, 2019
2852019
A hybrid feature selection with ensemble classification for imbalanced healthcare data: A case study for brain tumor diagnosis
S Huda, J Yearwood, HF Jelinek, MM Hassan, G Fortino, M Buckland
IEEE access 4, 9145-9154, 2016
1832016
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1462016
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
1312018
Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model
MM Hassan, A Gumaei, S Huda, A Almogren
IEEE Transactions on Industrial Informatics 16 (9), 6154-6162, 2020
1212020
Human activity recognition from body sensor data using deep learning
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42, 1-8, 2018
1042018
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
1042017
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, JH Abawajy, WN Ismail, MM Hassan
IEEE access 6, 15941-15957, 2018
1012018
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
S Huda, J Yearwood, MM Hassan, A Almogren
Applied soft computing 71, 66-77, 2018
962018
A framework for software defect prediction and metric selection
S Huda, S Alyahya, MM Ali, S Ahmad, J Abawajy, H Al-Dossari, ...
IEEE access 6, 2844-2858, 2017
922017
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek
Artificial intelligence in medicine 58 (3), 185-193, 2013
922013
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection
YA Ahmed, B Koçer, S Huda, BAS Al-rimy, MM Hassan
Journal of Network and Computer Applications 167, 102753, 2020
862020
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence
MR Hassan, MF Islam, MZ Uddin, G Ghoshal, MM Hassan, S Huda, ...
Future Generation Computer Systems 127, 462-472, 2022
832022
Evolution of dark web threat analysis and detection: A systematic approach
S Nazah, S Huda, J Abawajy, MM Hassan
Ieee Access 8, 171796-171819, 2020
772020
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
712014
Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches
S Sharmeen, YA Ahmed, S Huda, BŞ Koçer, MM Hassan
IEEE Access 8, 24522-24534, 2020
672020
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids
A Gumaei, MM Hassan, S Huda, MR Hassan, D Camacho, J Del Ser, ...
Applied Soft Computing 96, 106658, 2020
632020
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
632018
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, MM Hassan, A Almogren
Future Generation Computer Systems 89, 525-538, 2018
592018
An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model
MM Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino
IEEE Transactions on Industrial Informatics 17 (4), 2860-2870, 2020
582020
系统目前无法执行此操作,请稍后再试。
文章 1–20