Shamsul Huda, PhD, CISSP, Member of (ISC)2
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Senior Lecturer, School of IT, Deakin University, Melbourne, Australia
Dirección de correo verificada de - Página principal
Citado por
Citado por
Human emotion recognition using deep belief network architecture
MM Hassan, MGR Alam, MZ Uddin, S Huda, A Almogren, G Fortino
Information Fusion 51, 10-18, 2019
A hybrid feature selection with ensemble classification for imbalanced healthcare data: A case study for brain tumor diagnosis
S Huda, J Yearwood, HF Jelinek, MM Hassan, G Fortino, M Buckland
IEEE access 4, 9145-9154, 2016
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model
MM Hassan, A Gumaei, S Huda, A Almogren
IEEE Transactions on Industrial Informatics 16 (9), 6154-6162, 2020
Human activity recognition from body sensor data using deep learning
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42, 1-8, 2018
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
S Huda, J Yearwood, MM Hassan, A Almogren
Applied soft computing 71, 66-77, 2018
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, JH Abawajy, WN Ismail, MM Hassan
IEEE access 6, 15941-15957, 2018
A framework for software defect prediction and metric selection
S Huda, S Alyahya, MM Ali, S Ahmad, J Abawajy, H Al-Dossari, ...
IEEE access 6, 2844-2858, 2017
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek
Artificial intelligence in medicine 58 (3), 185-193, 2013
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection
YA Ahmed, B Koçer, S Huda, BAS Al-rimy, MM Hassan
Journal of Network and Computer Applications 167, 102753, 2020
Evolution of dark web threat analysis and detection: A systematic approach
S Nazah, S Huda, J Abawajy, MM Hassan
Ieee Access 8, 171796-171819, 2020
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, MM Hassan, A Almogren
Future Generation Computer Systems 89, 525-538, 2018
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence
MR Hassan, MF Islam, MZ Uddin, G Ghoshal, MM Hassan, S Huda, ...
Future Generation Computer Systems 127, 462-472, 2022
An adaptive trust boundary protection for IIoT networks using deep-learning feature-extraction-based semisupervised model
MM Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino
IEEE Transactions on Industrial Informatics 17 (4), 2860-2870, 2020
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids
A Gumaei, MM Hassan, S Huda, MR Hassan, D Camacho, J Del Ser, ...
Applied Soft Computing 96, 106658, 2020
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, MM Hassan, G Fortino
Future Generation Computer Systems 83, 193-207, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20