Search the dblp DataBase
Muddassar Farooq :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Horst Wedde , Muddassar Farooq , Yue Zhang BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP ] ANTS Workshop, 2004, pp:83-94 [Conf ] Horst Wedde , Muddassar Farooq A Performance Evaluation Framework for Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2005, pp:136-146 [Conf ] Horst Wedde , Constantin Timm , Muddassar Farooq BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2006, pp:243-254 [Conf ] Horst Wedde , Muddassar Farooq , Mario Lischka An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System. [Citation Graph (0, 0)][DBLP ] GECCO (2), 2004, pp:1334-1335 [Conf ] Horst Wedde , Muddassar Farooq , Thorsten Pannenbaecker , Bjoern Vogel , Christian Mueller , Johannes Meth , Rene Jeruschkat BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. [Citation Graph (0, 0)][DBLP ] GECCO, 2005, pp:153-160 [Conf ] Horst Wedde , Muddassar Farooq Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems. [Citation Graph (0, 0)][DBLP ] IC-AI, 2005, pp:938-943 [Conf ] Horst Wedde , Muddassar Farooq , Mario Lischka A User Centered Evolutionary Scheduling Framework. [Citation Graph (0, 0)][DBLP ] IC-AI, 2004, pp:1126-1132 [Conf ] Horst Wedde , Frank Thorsten Breuer , Muddassar Farooq A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints. [Citation Graph (0, 0)][DBLP ] SECIII, 2002, pp:241-250 [Conf ] Horst Wedde , Constantin Timm , Muddassar Farooq BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems. [Citation Graph (0, 0)][DBLP ] PPSN, 2006, pp:623-632 [Conf ] Muddassar Farooq , Ronaldo Menezes Special issue on nature-inspired applications and systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems Architecture, 2006, v:52, n:8-9, pp:441-442 [Journal ] Horst F. Wedde , Muddassar Farooq A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks. [Citation Graph (0, 0)][DBLP ] Journal of Systems Architecture, 2006, v:52, n:8-9, pp:461-484 [Journal ] Horst Wedde , Muddassar Farooq BeeHive: Routing Algorithms Inspired by Honey Bee Behavior. [Citation Graph (0, 0)][DBLP ] KI, 2005, v:19, n:4, pp:18-24 [Journal ] Muhammad Saleem , Muddassar Farooq BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] EvoWorkshops, 2007, pp:81-90 [Conf ] Nauman Mazhar , Muddassar Farooq Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:102-109 [Conf ] M. Zubair Shafiq , Mehrin Kiani , Bisma Hashmi , Muddassar Farooq Extended thymus action for reducing false positives in ais based network intrusion detection systems. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:182- [Conf ] Nauman Mazhar , Muddassar Farooq BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. [Citation Graph (0, 0)][DBLP ] ICARIS, 2007, pp:370-381 [Conf ] M. Zubair Shafiq , Muddassar Farooq Defence Against 802.11 DoS Attacks Using Artificial Immune System. [Citation Graph (0, 0)][DBLP ] ICARIS, 2007, pp:95-106 [Conf ] The Role of Biomedical Dataset in Classification. [Citation Graph (, )][DBLP ] Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol. [Citation Graph (, )][DBLP ] Using spatio-temporal information in API calls with machine learning algorithms for malware detection. [Citation Graph (, )][DBLP ] Embedded Malware Detection Using Markov n-Grams. [Citation Graph (, )][DBLP ] A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. [Citation Graph (, )][DBLP ] Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis. [Citation Graph (, )][DBLP ] Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets. [Citation Graph (, )][DBLP ] A sense of danger: dendritic cells inspired artificial immune system for manet security. [Citation Graph (, )][DBLP ] A formal performance modeling framework for bio-inspired ad hoc routing protocols. [Citation Graph (, )][DBLP ] Attack analysis & bio-inspired security framework for IP multimedia subsystem. [Citation Graph (, )][DBLP ] Improving accuracy of immune-inspired malware detectors by using intelligent features. [Citation Graph (, )][DBLP ] Attack analysis & bio-inspired security framework for IPMultimedia subsystem. [Citation Graph (, )][DBLP ] Application of evolutionary algorithms in detection of SIP based flooding attacks. [Citation Graph (, )][DBLP ] IMAD: in-execution malware analysis and detection. [Citation Graph (, )][DBLP ] Evolvable malware. [Citation Graph (, )][DBLP ] Are evolutionary rule learning algorithms appropriate for malware detection? [Citation Graph (, )][DBLP ] A hybrid GA-PSO fuzzy system for user identification on smart phones. [Citation Graph (, )][DBLP ] Performance evaluation of evolutionary algorithms in classification of biomedical datasets. [Citation Graph (, )][DBLP ] Bio-inspired telecommunications. [Citation Graph (, )][DBLP ] On the appropriateness of evolutionary rule learning algorithms for malware detection. [Citation Graph (, )][DBLP ] A Sense of 'Danger' for Windows Processes. [Citation Graph (, )][DBLP ] Malware detection using statistical analysis of byte-level file content. [Citation Graph (, )][DBLP ] RTP-miner: a real-time security framework for RTP fuzzing attacks. [Citation Graph (, )][DBLP ] A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols. [Citation Graph (, )][DBLP ] Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System. [Citation Graph (, )][DBLP ] Using Formal Grammar and Genetic Operators to Evolve Malware. [Citation Graph (, )][DBLP ] PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. [Citation Graph (, )][DBLP ] Keystroke-Based User Identification on Smart Phones. [Citation Graph (, )][DBLP ] A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks. [Citation Graph (, )][DBLP ] Extended thymus action for improving response of AIS based NID system against malicious traffic. [Citation Graph (, )][DBLP ] A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols. [Citation Graph (, )][DBLP ] Evaluating DoS Attacks against Sip-Based VoIP Systems. [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.021secs