dblp.uni-trier.dewww.uni-trier.de

Muddassar Farooq Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
49EEMario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni A. Di Caro, Anikó Ekárt, Anna Esparcia-Alcázar, Muddassar Farooq, Andreas Fink, Penousal Machado, Jon McCormack, Michael O'Neill, Ferrante Neri, Mike Preuss, Franz Rothlauf, Ernesto Tarantino, Shengxiang Yang: Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings Springer 2009
48EEAjay Kumar Tanwani, Muddassar Farooq: The Role of Biomedical Dataset in Classification. AIME 2009: 370-374
47EEAjay Kumar Tanwani, Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq: Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets. EvoBIO 2009: 128-139
46EEShahid Mehmood, Stefano Cagnoni, Monica Mordonini, Muddassar Farooq: Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis. EvoWorkshops 2009: 369-374
45EEM. Ali Akbar, Muddassar Farooq: Application of evolutionary algorithms in detection of SIP based flooding attacks. GECCO 2009: 1419-1426
44EESyed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq: IMAD: in-execution malware analysis and detection. GECCO 2009: 1553-1560
43EESadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq: Evolvable malware. GECCO 2009: 1569-1576
42EEMuhammad Shahzad, Saira Zahid, Muddassar Farooq: A hybrid GA-PSO fuzzy system for user identification on smart phones. GECCO 2009: 1617-1624
41EEM. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq: Are evolutionary rule learning algorithms appropriate for malware detection? GECCO 2009: 1915-1916
40EEM. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq: On the appropriateness of evolutionary rule learning algorithms for malware detection. GECCO (Companion) 2009: 2609-2616
39EEAjay Kumar Tanwani, Muddassar Farooq: Performance evaluation of evolutionary algorithms in classification of biomedical datasets. GECCO (Companion) 2009: 2617-2624
38EEMuddassar Farooq: Bio-inspired telecommunications. GECCO (Companion) 2009: 3513-3550
37EESalman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq: A Sense of 'Danger' for Windows Processes. ICARIS 2009: 220-233
36EES. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq: Malware detection using statistical analysis of byte-level file content. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 23-31
35EEM. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq: PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. RAID 2009: 121-141
34EESaira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq: Keystroke-Based User Identification on Smart Phones. RAID 2009: 224-243
33EESadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq: Using Formal Grammar and Genetic Operators to Evolve Malware. RAID 2009: 374-375
2008
32 Mario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni Di Caro, Rolf Drechsler, Anikó Ekárt, Anna Esparcia-Alcázar, Muddassar Farooq, Andreas Fink, Jon McCormack, Michael O'Neill, Juan Romero, Franz Rothlauf, Giovanni Squillero, Sima Uyar, Shengxiang Yang: Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings Springer 2008
31EEMuhammad Saleem, Syed Ali Khayam, Muddassar Farooq: Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol. ANTS Conference 2008: 315-322
30EEM. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq: Embedded Malware Detection Using Markov n-Grams. DIMVA 2008: 88-107
29EEM. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam: A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. EvoWorkshops 2008: 52-61
28EEMuhammad Saleem, Syed Ali Khayam, Muddassar Farooq: A formal performance modeling framework for bio-inspired ad hoc routing protocols. GECCO 2008: 103-110
27EEM. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq: Improving accuracy of immune-inspired malware detectors by using intelligent features. GECCO 2008: 119-126
26EEAliya Awais, Muddassar Farooq, Muhammad Younus Javed: Attack analysis & bio-inspired security framework for IP multimedia subsystem. GECCO 2008: 161-162
25EENauman Mazhar, Muddassar Farooq: A sense of danger: dendritic cells inspired artificial immune system for manet security. GECCO 2008: 63-70
24EEAliya Awais, Muddassar Farooq, Muhammad Younus Javed: Attack analysis & bio-inspired security framework for IPMultimedia subsystem. GECCO (Companion) 2008: 2093-2098
23EEMuhammad Shahzad, Saira Zahid, Muddassar Farooq: A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols. PPSN 2008: 1130-1139
22EEMuddassar Farooq, Gianni A. Di Caro: Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview. Swarm Intelligence 2008: 101-160
2007
21 Mario Giacobini, Anthony Brabazon, Stefano Cagnoni, Gianni Di Caro, Rolf Drechsler, Muddassar Farooq, Andreas Fink, Evelyne Lutton, Penousal Machado, Stefan Minner, Michael O'Neill, Juan Romero, Franz Rothlauf, Giovanni Squillero, Hideyuki Takagi, Sima Uyar, Shengxiang Yang: Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings. Springer 2007
20EEMuhammad Saleem, Muddassar Farooq: BeeSensor: A Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks. EvoWorkshops 2007: 81-90
19EENauman Mazhar, Muddassar Farooq: Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. GECCO 2007: 102-109
18EEM. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq: Extended thymus action for reducing false positives in ais based network intrusion detection systems. GECCO 2007: 182
17EENauman Mazhar, Muddassar Farooq: BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. ICARIS 2007: 370-381
16EEM. Zubair Shafiq, Muddassar Farooq: Defence Against 802.11 DoS Attacks Using Artificial Immune System. ICARIS 2007: 95-106
15EESaira Zahid, Muhammad Shahzad, Syed Usman Ali, Muddassar Farooq: A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols. IEEE Congress on Evolutionary Computation 2007: 180-187
14EEM. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq: Extended thymus action for improving response of AIS based NID system against malicious traffic. IEEE Congress on Evolutionary Computation 2007: 3369-3376
13EEMuhammad Saleem, Muddassar Farooq: A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks. IEEE Congress on Evolutionary Computation 2007: 751-758
2006
12EEHorst Wedde, Constantin Timm, Muddassar Farooq: BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. EvoWorkshops 2006: 243-254
11EEHorst Wedde, Constantin Timm, Muddassar Farooq: BeeHiveAIS: A Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems. PPSN 2006: 623-632
10EEMuddassar Farooq, Ronaldo Menezes: Special issue on nature-inspired applications and systems. Journal of Systems Architecture 52(8-9): 441-442 (2006)
9EEHorst F. Wedde, Muddassar Farooq: A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks. Journal of Systems Architecture 52(8-9): 461-484 (2006)
2005
8EEHorst Wedde, Muddassar Farooq: A Performance Evaluation Framework for Nature Inspired Routing Algorithms. EvoWorkshops 2005: 136-146
7EEHorst Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Bjoern Vogel, Christian Mueller, Johannes Meth, Rene Jeruschkat: BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. GECCO 2005: 153-160
6 Horst Wedde, Muddassar Farooq: Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems. IC-AI 2005: 938-943
5EEHorst Wedde, Muddassar Farooq: BeeHive: Routing Algorithms Inspired by Honey Bee Behavior. KI 19(4): 18-24 (2005)
2004
4EEHorst Wedde, Muddassar Farooq, Yue Zhang: BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior. ANTS Workshop 2004: 83-94
3EEHorst Wedde, Muddassar Farooq, Mario Lischka: An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System. GECCO (2) 2004: 1334-1335
2 Horst Wedde, Muddassar Farooq, Mario Lischka: A User Centered Evolutionary Scheduling Framework. IC-AI 2004: 1126-1132
2002
1 Horst Wedde, Frank Thorsten Breuer, Muddassar Farooq: A Role-Based Adaptive CSCL Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints. SECIII 2002: 241-250

Coauthor Index

1Jamal Afridi [47]
2M. Ali Akbar [45]
3Syed Usman Ali [15]
4Aliya Awais [24] [26]
5Anthony Brabazon [21] [32] [49]
6Frank Thorsten Breuer [1]
7Stefano Cagnoni [21] [32] [46] [49]
8Gianni A. Di Caro [22] [49]
9Gianni Di Caro [21] [32]
10Rolf Drechsler [21] [32]
11Anikó Ekárt [32] [49]
12Anna Esparcia-Alcázar [32] [49]
13A. Sima Etaner-Uyar (Sima Uyar) [21] [32]
14Andreas Fink [21] [32] [49]
15Mario Giacobini [21] [32] [49]
16Bisma Hashmi [14] [18]
17Muhammad Younus Javed [24] [26]
18Rene Jeruschkat [7]
19Syed Ali Khayam [27] [28] [29] [30] [31] [34]
20Mehrin Kiani [14] [18]
21Mario Lischka [2] [3]
22Evelyne Lutton [21]
23Penousal Machado [21] [49]
24Salman Manzoor [37]
25Nauman Mazhar [17] [19] [25]
26Jon McCormack [32] [49]
27Syed Bilal Mehdi [44]
28Shahid Mehmood [46]
29Ronaldo Menezes [10]
30Johannes Meth [7]
31Stefan Minner [21]
32Fauzan Mirza [35]
33Monica Mordonini [46]
34Christian Mueller [7]
35Shafaq Murtaza [33] [43]
36Ferrante Neri [49]
37Sadia Noreen [33] [43]
38Michael O'Neill [21] [32] [49]
39Thorsten Pannenbaecker [7]
40Mike Preuss (Mike Preuß) [49]
41Juan Romero [21] [32]
42Franz Rothlauf [21] [32] [49]
43Muhammad Saleem [13] [20] [28] [31]
44M. Zubair Shafiq [14] [16] [18] [27] [29] [30] [33] [35] [36] [37] [40] [41] [43] [47]
45Muhammad Shahzad [15] [23] [34] [42]
46Giovanni Squillero [21] [32]
47S. Momina Tabish [35] [36] [37] [40] [41]
48Hideyuki Takagi [21]
49Ajay Kumar Tanwani [39] [44] [47] [48]
50Ernesto Tarantino [49]
51Constantin Timm [11] [12]
52Bjoern Vogel [7]
53Horst F. Wedde (Horst Wedde) [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12]
54Shengxiang Yang [21] [32] [49]
55Saira Zahid [15] [23] [34] [42]
56Yue Zhang [4]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)