dblp.uni-trier.dewww.uni-trier.de

Mohammad M. Masud

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
7EEMohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham: A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. PAKDD 2009: 363-375
2008
6EEMohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham: A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. ICDM 2008: 929-934
5EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
4EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: A scalable multi-level feature extraction technique to detect malicious executables. Information Systems Frontiers 10(1): 33-45 (2008)
2007
3EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: A Hybrid Model to Detect Malicious Executables. ICC 2007: 1443-1448
2EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham: Feature Based Techniques for Auto-Detection of Novel Email Worms. PAKDD 2007: 205-216
2006
1EEMohammad M. Masud, Latifur Khan, Ehab Al-Shaer: Email Worm Detection Using Naïve Bayes and Support Vector Machine. ISI 2006: 733-734

Coauthor Index

1Ehab Al-Shaer (Ehab S. Al-Shaer) [1]
2Jing Gao [6] [7]
3Jiawei Han [6] [7]
4Latifur Khan [1] [2] [3] [4] [5] [6] [7]
5Peng Liu [5]
6Bhavani M. Thuraisingham [2] [3] [4] [5] [6] [7]
7Xinran Wang [5]
8Sencun Zhu [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)