Follow
Muddassar Farooq
Muddassar Farooq
Professor & Dean, Air University
Verified email at ieee.org
Title
Cited by
Cited by
Year
Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions
M Saleem, GA Di Caro, M Farooq
Information Sciences 181 (20), 4597-4624, 2011
5102011
Beehive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior
HF Wedde, M Farooq, Y Zhang
International Workshop on Ant Colony Optimization and Swarm Intelligence, 83-94, 2004
3702004
Pe-miner: Mining structural information to detect malicious executables in realtime
MZ Shafiq, SM Tabish, F Mirza, M Farooq
International Workshop on Recent Advances in Intrusion Detection, 121-141, 2009
2862009
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
246*2006
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
HF Wedde, M Farooq, T Pannenbaecker, B Vogel, C Mueller, J Meth, ...
Proceedings of the 2005 conference on Genetic and evolutionary computation …, 2005
2442005
Malware detection using statistical analysis of byte-level file content
SM Tabish, MZ Shafiq, M Farooq
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009
2412009
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection and Analysis
F Ahmed, H Hameed, MZ Shafiq, M Farooq
2009-08-24]. http://nexginrc, org/nexginrcAdmin/PublicationsFiles/aisec09 …, 2009
235*2009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
F Ahmed, H Hameed, MZ Shafiq, M Farooq
Proceedings of the 2nd ACM workshop on Security and artificial intelligence …, 2009
2312009
Keystroke-based user identification on smart phones
S Zahid, M Shahzad, SA Khayam, M Farooq
International Workshop on Recent Advances in Intrusion Detection, 224-243, 2009
1772009
Embedded malware detection using markov n-grams
MZ Shafiq, SA Khayam, M Farooq
International Conference on Detection of Intrusions and Malware, and …, 2008
1512008
BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks
M Saleem, I Ullah, M Farooq
Information Sciences 200, 38-56, 2012
1332012
Secure biometric template generation for multi-factor authentication
SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan
Pattern Recognition 48 (2), 458-472, 2015
1202015
Guidelines to select machine learning scheme for classification of biomedical datasets
AK Tanwani, J Afridi, MZ Shafiq, M Farooq
European Conference on Evolutionary Computation, Machine Learning and Data …, 2009
1172009
Routing protocols for net generation networks inspired by collective behaviours of insect societies: An overview
M Farooq, G Di Caro
Swarm Intelligence: Introduction and Applications, 2008
1172008
Bee-inspired protocol engineering: from nature to networks
M Farooq
Springer Science & Business Media, 2008
1002008
Beesensor: a bee-inspired power aware routing protocol for wireless sensor networks
M Saleem, M Farooq
Workshops on Applications of Evolutionary Computation, 81-90, 2007
962007
BeeAIS: Artificial immune system security for nature inspired, MANET routing protocol, BeeAdHoc
N Mazhar, M Farooq
International Conference on Artificial Immune Systems, 370-381, 2007
882007
A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks
HF Wedde, M Farooq
Journal of Systems Architecture 52 (8-9), 461-484, 2006
882006
A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints
M Kamran, S Suhail, M Farooq
IEEE Transactions on Knowledge and Data Engineering 25 (12), 2694-2707, 2013
812013
Evolvable malware
S Noreen, S Murtaza, MZ Shafiq, M Farooq
Proceedings of the 11th Annual conference on Genetic and evolutionary …, 2009
782009
The system can't perform the operation now. Try again later.
Articles 1–20