Ai-driven cybersecurity: an overview, security intelligence modeling and research directions IH Sarker, MH Furhad, R Nowrozy SN Computer Science 2 (3), 173, 2021 | 295 | 2021 |
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection RC Ripan, IH Sarker, SMM Hossain, MM Anwar, R Nowrozy, MM Hoque, ... SN Computer Science 2 (2), 112, 2021 | 46 | 2021 |
Restoring atmospheric-turbulence-degraded images MH Furhad, M Tahtali, A Lambert Applied optics 55 (19), 5082-5090, 2016 | 42 | 2016 |
A shortly connected mesh topology for high performance and energy efficient network-on-chip architectures MH Furhad, JM Kim The Journal of Supercomputing 69, 766-792, 2014 | 17 | 2014 |
An isolation forest learning based outlier detection approach for effectively classifying cyber anomalies RC Ripan, IH Sarker, MM Anwar, MH Furhad, F Rahat, MM Hoque, ... Hybrid Intelligent Systems: 20th International Conference on Hybrid …, 2021 | 15 | 2021 |
An analysis of reducing communication delay in network-on-chip interconnect architecture H Furhad, MA Haque, CH Kim, JM Kim Wireless Personal Communications 73, 1403-1419, 2013 | 13 | 2013 |
An extended diagonal mesh topology for network-on-chip architectures MH Furhad, JM Kim International Journal of Multimedia and Ubiquitous Engineering 10 (10), 197-210, 2015 | 12 | 2015 |
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot SMZU Rashid, A Haq, ST Hasan, MH Furhad, M Ahmed, AB Ullah Wireless Networks, 1-15, 2022 | 9 | 2022 |
AI-driven cyber security: an overview, security intelligence modelling and research directions. SN Comput Sci 2 (3) IH Sarker, MH Furhad, R Nowrozy | 8 | 2021 |
Ai-driven cybersecurity: An overview, security intelligence modeling and research directions, SN Comput. Sci., 2 (2021), 1–18 IH Sarker, MH Furhad, R Nowrozy | 8 | |
A new audio watermarking method based on discrete cosine transform with a gray image MI Khan, MIH Sarker, K Deb, MH Furhad AIRCC's International Journal of Computer Science and Information Technology …, 2012 | 7 | 2012 |
Nowrozy Ra (2021) AI-driven cybersecurity: an overview, security intelligence modeling, and research directions IH Sarker, M Hasan Furhad SN Comput Sci 2 (3), 1-18, 0 | 6 | |
An effective heart disease prediction model based on machine learning techniques RC Ripan, IH Sarker, M Hasan Furhad, M Musfique Anwar, MM Hoque International Conference on Hybrid Intelligent Systems, 280-288, 2020 | 4 | 2020 |
E-miim: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management IH Sarker, ASM Kayes, MH Furhad, MM Islam, MS Islam AI & SOCIETY 35 (2), 459-467, 2020 | 4 | 2020 |
Predicting diabetes mellitus and analysing risk-factors correlation MF Faruque, A Asaduzzaman, SMM Hossain, MH Furhad, IH Sarker EAI Endorsed Transactions on Pervasive Health and Technology 5 (20), e7-e7, 2019 | 4 | 2019 |
A hybrid framework for detecting structured query language injection attacks in web-based applications MH Furhad, RK Chakrabortty, MJ Ryan, J Uddin, IH Sarker International Journal of Electrical and Computer Engineering 12 (5), 5405, 2022 | 3 | 2022 |
Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape SMZU Rashid, A Haq, ST Hasan, MH Furhad, M Ahmed, ... International Conference on Cognitive Radio Oriented Wireless Networks, 307-324, 2021 | 3 | 2021 |
Industrial Fault Diagnosis using Hilbert Transform and Texture Features M Zabin, HJ Choi, J Uddin, MH Furhad, AB Ullah 2021 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2021 | 3 | 2021 |
Surrogate approximation on bilevel multi follower optimization problems MM Islam, AB Ullah, MH Furhad, S Nazah 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1663-1671, 2020 | 2 | 2020 |
Object detection from images obtained through underwater turbulence medium MH Furhad, M Tahtali, A Lambert Unconventional and Indirect Imaging, Image Reconstruction, and Wavefront …, 2017 | 2 | 2017 |