BibTeX records: Muddassar Farooq

download as .bib file

@article{DBLP:journals/corr/abs-2501-15969,
  author       = {Shaheer Ahmad Khan and
                  Muhammad Usamah Shahid and
                  Ahmad Abdullah and
                  Ibrahim Hashmat and
                  Muddassar Farooq},
  title        = {An Explainable Disease Surveillance System for Early Prediction of
                  Multiple Chronic Diseases},
  journal      = {CoRR},
  volume       = {abs/2501.15969},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2501.15969},
  doi          = {10.48550/ARXIV.2501.15969},
  eprinttype    = {arXiv},
  eprint       = {2501.15969},
  timestamp    = {Wed, 26 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2501-15969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aime/ZaidiBF24,
  author       = {Syed Hamail Hussain Zaidi and
                  Amna Basharat and
                  Muddassar Farooq},
  editor       = {Joseph Finkelstein and
                  Robert Moskovitch and
                  Enea Parimbelli},
  title        = {Mining Disease Progression Patterns for Advanced Disease Surveillance},
  booktitle    = {Artificial Intelligence in Medicine - 22nd International Conference,
                  {AIME} 2024, Salt Lake City, UT, USA, July 9-12, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14844},
  pages        = {81--89},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-66538-7\_10},
  doi          = {10.1007/978-3-031-66538-7\_10},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aime/ZaidiBF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aime/ShahidF23,
  author       = {Muhammad Usamah Shahid and
                  Muddassar Farooq},
  editor       = {Jose M. Juarez and
                  Mar Marcos and
                  Gregor Stiglic and
                  Allan Tucker},
  title        = {Boosted Random Forests for Predicting Treatment Failure of Chemotherapy
                  Regimens},
  booktitle    = {Artificial Intelligence in Medicine - 21st International Conference
                  on Artificial Intelligence in Medicine, {AIME} 2023, Portoro{\v{z}},
                  Slovenia, June 12-15, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13897},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34344-5\_2},
  doi          = {10.1007/978-3-031-34344-5\_2},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aime/ShahidF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AnsariAMMF20,
  author       = {Omar Ansari and
                  Muhammad Amin and
                  Moazam Maqsood and
                  Abdul Rahman Muhammad Maud and
                  Muddassar Farooq},
  title        = {Inter-Subset Hamming Distance Maximization for Enhancing the Physical
                  Layer Security of Antenna Subset Modulation},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {221513--221524},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3042969},
  doi          = {10.1109/ACCESS.2020.3042969},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AnsariAMMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-08271,
  author       = {Muhammad Kamran and
                  Muddassar Farooq},
  title        = {A Comprehensive Survey of Watermarking Relational Databases Research},
  journal      = {CoRR},
  volume       = {abs/1801.08271},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.08271},
  eprinttype    = {arXiv},
  eprint       = {1801.08271},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-08271.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-09741,
  author       = {Muhammad Kamran and
                  Muddassar Farooq},
  title        = {An Optimized Information-Preserving Relational Database Watermarking
                  Scheme for Ownership Protection of Medical Data},
  journal      = {CoRR},
  volume       = {abs/1801.09741},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.09741},
  eprinttype    = {arXiv},
  eprint       = {1801.09741},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-09741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AhmadAF17,
  author       = {Abrar Ahmad and
                  Muhammad Amin and
                  Muddassar Farooq},
  title        = {Analyzing Directional Modulation Techniques as Block Encryption Ciphers
                  for Physical Layer Security},
  booktitle    = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2017, San Francisco, CA, USA, March 19-22, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCNC.2017.7925525},
  doi          = {10.1109/WCNC.2017.7925525},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AhmadAF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AhmadFA16,
  author       = {Abrar Ahmad and
                  Muddassar Farooq and
                  Muhammad Amin},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {SBoxScope: {A} Meta S-box Strength Evaluation Framework for Heterogeneous
                  Confusion Boxes},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {5545--5553},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.685},
  doi          = {10.1109/HICSS.2016.685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/AhmadFA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/KhanASFK15,
  author       = {Salman H. Khan and
                  Muhammad Ali Akbar and
                  Farrukh Shahzad and
                  Muddassar Farooq and
                  Zeashan H. Khan},
  title        = {Secure biometric template generation for multi-factor authentication},
  journal      = {Pattern Recognit.},
  volume       = {48},
  number       = {2},
  pages        = {458--472},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.patcog.2014.08.024},
  doi          = {10.1016/J.PATCOG.2014.08.024},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/KhanASFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ShoaibF15,
  author       = {Muhammad Shoaib and
                  Muddassar Farooq},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {USpam - {A} User Centric Ontology Driven Spam Detection System},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {3661--3669},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.440},
  doi          = {10.1109/HICSS.2015.440},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ShoaibF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/AkbarF14,
  author       = {Muhammad Ali Akbar and
                  Muddassar Farooq},
  title        = {Securing SIP-based VoIP infrastructure against flooding attacks and
                  Spam Over {IP} Telephony},
  journal      = {Knowl. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {491--510},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10115-012-0595-5},
  doi          = {10.1007/S10115-012-0595-5},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/AkbarF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShahzadSF13,
  author       = {Farrukh Shahzad and
                  Muhammad Shahzad and
                  Muddassar Farooq},
  title        = {In-execution dynamic malware analysis and detection by mining information
                  in process control blocks of Linux {OS}},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {45--63},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.09.016},
  doi          = {10.1016/J.INS.2011.09.016},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShahzadSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KamranF13,
  author       = {Muhammad Kamran and
                  Muddassar Farooq},
  title        = {A Formal Usability Constraints Model for Watermarking of Outsourced
                  Datasets},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {6},
  pages        = {1061--1072},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2259234},
  doi          = {10.1109/TIFS.2013.2259234},
  timestamp    = {Sat, 28 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KamranF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/KamranSF13,
  author       = {Muhammad Kamran and
                  Sabah Suhail and
                  Muddassar Farooq},
  title        = {A Robust, Distortion Minimizing Technique for Watermarking Relational
                  Databases Using Once-for-All Usability Constraints},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {25},
  number       = {12},
  pages        = {2694--2707},
  year         = {2013},
  url          = {https://doi.org/10.1109/TKDE.2012.227},
  doi          = {10.1109/TKDE.2012.227},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/KamranSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SaleemUF12,
  author       = {Muhammad Saleem and
                  Israr Ullah and
                  Muddassar Farooq},
  title        = {BeeSensor: An energy-efficient and scalable routing protocol for wireless
                  sensor networks},
  journal      = {Inf. Sci.},
  volume       = {200},
  pages        = {38--56},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.02.024},
  doi          = {10.1016/J.INS.2012.02.024},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SaleemUF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/ShahzadF12,
  author       = {Farrukh Shahzad and
                  Muddassar Farooq},
  title        = {ELF-Miner: using structural knowledge and data mining methods to detect
                  new (Linux) malicious executables},
  journal      = {Knowl. Inf. Syst.},
  volume       = {30},
  number       = {3},
  pages        = {589--612},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10115-011-0393-5},
  doi          = {10.1007/S10115-011-0393-5},
  timestamp    = {Fri, 16 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/ShahzadF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/KamranF12,
  author       = {Muhammad Kamran and
                  Muddassar Farooq},
  title        = {An Information-Preserving Watermarking Scheme for Right Protection
                  of {EMR} Systems},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {24},
  number       = {11},
  pages        = {1950--1962},
  year         = {2012},
  url          = {https://doi.org/10.1109/TKDE.2011.223},
  doi          = {10.1109/TKDE.2011.223},
  timestamp    = {Sat, 28 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/KamranF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2012a,
  editor       = {Cecilia Di Chio and
                  Alexandros Agapitos and
                  Stefano Cagnoni and
                  Carlos Cotta and
                  Francisco Fern{\'{a}}ndez de Vega and
                  Gianni A. Di Caro and
                  Rolf Drechsler and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Anna Isabel Esparcia{-}Alc{\'{a}}zar and
                  Muddassar Farooq and
                  William B. Langdon and
                  Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and
                  Mike Preuss and
                  Hendrik Richter and
                  Sara Silva and
                  Anabela Sim{\~{o}}es and
                  Giovanni Squillero and
                  Ernesto Tarantino and
                  Andrea Tettamanzi and
                  Julian Togelius and
                  Neil Urquhart and
                  Sima Uyar and
                  Georgios N. Yannakakis},
  title        = {Applications of Evolutionary Computation - EvoApplications 2012: EvoCOMNET,
                  EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK,
                  EvoSTIM, and EvoSTOC, M{\'{a}}laga, Spain, April 11-13, 2012,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7248},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29178-4},
  doi          = {10.1007/978-3-642-29178-4},
  isbn         = {978-3-642-29177-7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2012a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SaleemUKF11,
  author       = {Muhammad Saleem and
                  Israr Ullah and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  title        = {On the reliability of ad hoc routing protocols for loss-and-delay
                  sensitive applications},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {3},
  pages        = {285--299},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2010.07.012},
  doi          = {10.1016/J.ADHOC.2010.07.012},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SaleemUKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/MazharF11,
  author       = {N. Mazhar and
                  Muddassar Farooq},
  title        = {A hybrid artificial immune system {(AIS)} model for power aware secure
                  Mobile Ad Hoc Networks (MANETs) routing protocols},
  journal      = {Appl. Soft Comput.},
  volume       = {11},
  number       = {8},
  pages        = {5695--5714},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.asoc.2011.03.021},
  doi          = {10.1016/J.ASOC.2011.03.021},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/MazharF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SaleemCF11,
  author       = {Muhammad Saleem and
                  Gianni A. Di Caro and
                  Muddassar Farooq},
  title        = {Swarm intelligence based routing protocol for wireless sensor networks:
                  Survey and future directions},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {20},
  pages        = {4597--4624},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.07.005},
  doi          = {10.1016/J.INS.2010.07.005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SaleemCF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/JunaidF11,
  author       = {Muhammad Bilal Junaid and
                  Muddassar Farooq},
  editor       = {Natalio Krasnogor and
                  Pier Luca Lanzi},
  title        = {Using evolutionary learning classifiers to do MobileSpam {(SMS)} filtering},
  booktitle    = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO}
                  2011, Proceedings, Dublin, Ireland, July 12-16, 2011},
  pages        = {1795--1802},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001576.2001817},
  doi          = {10.1145/2001576.2001817},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/JunaidF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AfridiF11,
  author       = {M. Jamal Afridi and
                  Muddassar Farooq},
  title        = {OG-Miner: An Intelligent Health Tool for Achieving Millennium Development
                  Goals (MDGs) in m-Health Environments},
  booktitle    = {44th Hawaii International International Conference on Systems Science
                  {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HICSS.2011.320},
  doi          = {10.1109/HICSS.2011.320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/AfridiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ShahzadBSF11,
  author       = {Farrukh Shahzad and
                  Sohail Bhatti and
                  Muhammad Shahzad and
                  Muddassar Farooq},
  title        = {In-Execution Malware Detection Using Task Structures of Linux Processes},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963012},
  doi          = {10.1109/ICC.2011.5963012},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ShahzadBSF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/WaseemJRF11,
  author       = {Komal Waseem and
                  Awais Javed and
                  Rashad Ramzan and
                  Muddassar Farooq},
  editor       = {Yongsheng Ding and
                  Haiying Wang and
                  Ning Xiong and
                  Kuangrong Hao and
                  Lipo Wang},
  title        = {Using evolutionary algorithms for {ECG} Arrhythmia detection and classification},
  booktitle    = {Seventh International Conference on Natural Computation, {ICNC} 2011,
                  Shanghai, China, 26-28 July, 2011},
  pages        = {2386--2390},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNC.2011.6022596},
  doi          = {10.1109/ICNC.2011.6022596},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/WaseemJRF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/RafiqueKAF11,
  author       = {M. Zubair Rafique and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Muddassar Farooq},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Embedding High Capacity Covert Channels in Short Message Service {(SMS)}},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_1},
  doi          = {10.1007/978-3-642-22339-6\_1},
  timestamp    = {Sat, 11 Jan 2025 00:34:04 +0100},
  biburl       = {https://dblp.org/rec/conf/sta/RafiqueKAF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/RafiqueKAF11a,
  author       = {M. Zubair Rafique and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Muddassar Farooq},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {A Framework for Detecting Malformed {SMS} Attack},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {11--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_2},
  doi          = {10.1007/978-3-642-22339-6\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/RafiqueKAF11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2011a2,
  editor       = {Cecilia Di Chio and
                  Anthony Brabazon and
                  Gianni A. Di Caro and
                  Rolf Drechsler and
                  Muddassar Farooq and
                  J{\"{o}}rn Grahl and
                  Gary Greenfield and
                  Christian Prins and
                  Juan Romero and
                  Giovanni Squillero and
                  Ernesto Tarantino and
                  Andrea Tettamanzi and
                  Neil Urquhart and
                  A. Sima Etaner{-}Uyar},
  title        = {Applications of Evolutionary Computation - EvoApplications 2011: EvoCOMNET,
                  EvoFIN, EvoHOT, EvoMUSART, EvoSTIM, and EvoTRANSLOG, Torino, Italy,
                  April 27-29, 2011, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6625},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20520-0},
  doi          = {10.1007/978-3-642-20520-0},
  isbn         = {978-3-642-20519-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2011a2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/SaleemKF10,
  author       = {Muhammad Saleem and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  title        = {On Performance Modeling of Ad Hoc Routing Protocols},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/373759},
  doi          = {10.1155/2010/373759},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/SaleemKF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/antsw/UllahSF10,
  author       = {Israr Ullah and
                  Muhammad Saleem and
                  Muddassar Farooq},
  editor       = {Marco Dorigo and
                  Mauro Birattari and
                  Gianni A. Di Caro and
                  Ren{\'{e}} Doursat and
                  Andries P. Engelbrecht and
                  Dario Floreano and
                  Luca Maria Gambardella and
                  Roderich Gro{\ss} and
                  Erol Sahin and
                  Hiroki Sayama and
                  Thomas St{\"{u}}tzle},
  title        = {Bee-Sensor: {A} Step Towards Meta-Routing Strategies in Hybrid Ad
                  Hoc Networks},
  booktitle    = {Swarm Intelligence - 7th International Conference, {ANTS} 2010, Brussels,
                  Belgium, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6234},
  pages        = {392--399},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15461-4\_36},
  doi          = {10.1007/978-3-642-15461-4\_36},
  timestamp    = {Mon, 16 Aug 2021 17:13:22 +0200},
  biburl       = {https://dblp.org/rec/conf/antsw/UllahSF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MehdiAKF10,
  author       = {Bilal Mehdi and
                  Faraz Ahmed and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  title        = {Towards a Theory of Generalizing System Call Representation for In-Execution
                  Malware Detection},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5501969},
  doi          = {10.1109/ICC.2010.5501969},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MehdiAKF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nossdav/AkbarF10,
  author       = {Muhammad Ali Akbar and
                  Muddassar Farooq},
  editor       = {Dick C. A. Bulterman and
                  Mohamed Hefeeda},
  title        = {RTP-miner: a real-time security framework for {RTP} fuzzing attacks},
  booktitle    = {Network and Operating System Support for Digital Audio and Video,
                  20th International Workshop, {NOSSDAV} 2010, Amsterdam, The Netherlands,
                  June 2-4, 2010, Proceedings},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806565.1806587},
  doi          = {10.1145/1806565.1806587},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nossdav/AkbarF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/AhmedSF10,
  author       = {Faraz Ahmed and
                  Farrukh Shahzad and
                  Muddassar Farooq},
  editor       = {Robert Schaefer and
                  Carlos Cotta and
                  Joanna Kolodziej and
                  G{\"{u}}nter Rudolph},
  title        = {Using Computational Intelligence to Identify Performance Bottlenecks
                  in a Computer System},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International
                  Conference, Krak{\'{o}}w, Poland, September 11-15, 2010, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6238},
  pages        = {304--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15844-5\_31},
  doi          = {10.1007/978-3-642-15844-5\_31},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/AhmedSF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2010a2,
  editor       = {Cecilia Di Chio and
                  Anthony Brabazon and
                  Gianni A. Di Caro and
                  Marc Ebner and
                  Muddassar Farooq and
                  Andreas Fink and
                  J{\"{o}}rn Grahl and
                  Gary Greenfield and
                  Penousal Machado and
                  Michael O'Neill and
                  Ernesto Tarantino and
                  Neil Urquhart},
  title        = {Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET,
                  EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey,
                  April 7-9, 2010, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6025},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12242-2},
  doi          = {10.1007/978-3-642-12242-2},
  isbn         = {978-3-642-12241-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2010a2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aime/TanwaniF09,
  author       = {Ajay Kumar Tanwani and
                  Muddassar Farooq},
  editor       = {Carlo Combi and
                  Yuval Shahar and
                  Ameen Abu{-}Hanna},
  title        = {The Role of Biomedical Dataset in Classification},
  booktitle    = {Artificial Intelligence in Medicine, 12th Conference on Artificial
                  Intelligence in Medicine, {AIME} 2009, Verona, Italy, July 18-22,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5651},
  pages        = {370--374},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02976-9\_51},
  doi          = {10.1007/978-3-642-02976-9\_51},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aime/TanwaniF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedHSF09,
  author       = {Faraz Ahmed and
                  Haider Hameed and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Using spatio-temporal information in {API} calls with machine learning
                  algorithms for malware detection},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1655003},
  doi          = {10.1145/1654988.1655003},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedHSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/TanwaniASF09,
  author       = {Ajay Kumar Tanwani and
                  M. Jamal Afridi and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Clara Pizzuti and
                  Marylyn D. Ritchie and
                  Mario Giacobini},
  title        = {Guidelines to Select Machine Learning Scheme for Classification of
                  Biomedical Datasets},
  booktitle    = {Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics,
                  7th European Conference, EvoBIO 2009, T{\"{u}}bingen, Germany,
                  April 15-17, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5483},
  pages        = {128--139},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01184-9\_12},
  doi          = {10.1007/978-3-642-01184-9\_12},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/evoW/TanwaniASF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/MehmoodCMF09,
  author       = {Shahid Mehmood and
                  Stefano Cagnoni and
                  Monica Mordonini and
                  Muddassar Farooq},
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni A. Di Caro and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Anna Esparcia{-}Alc{\'{a}}zar and
                  Muddassar Farooq and
                  Andreas Fink and
                  Penousal Machado and
                  Jon McCormack and
                  Michael O'Neill and
                  Ferrante Neri and
                  Mike Preuss and
                  Franz Rothlauf and
                  Ernesto Tarantino and
                  Shengxiang Yang},
  title        = {Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic
                  for Image Analysis},
  booktitle    = {Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET,
                  EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION,
                  EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T{\"{u}}bingen, Germany,
                  April 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5484},
  pages        = {369--374},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01129-0\_41},
  doi          = {10.1007/978-3-642-01129-0\_41},
  timestamp    = {Wed, 25 Sep 2019 18:21:09 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/MehmoodCMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/AkbarF09,
  author       = {Muhammad Ali Akbar and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {Application of evolutionary algorithms in detection of {SIP} based
                  flooding attacks},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1419--1426},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570092},
  doi          = {10.1145/1569901.1570092},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/AkbarF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MehdiTF09,
  author       = {Syed Bilal Mehdi and
                  Ajay Kumar Tanwani and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {{IMAD:} in-execution malware analysis and detection},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1553--1560},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570109},
  doi          = {10.1145/1569901.1570109},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/MehdiTF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/NoreenMSF09,
  author       = {Sadia Noreen and
                  Shafaq Murtaza and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {Evolvable malware},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1569--1576},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570111},
  doi          = {10.1145/1569901.1570111},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/NoreenMSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ShahzadZF09,
  author       = {Muhammad Shahzad and
                  Saira Zahid and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {A hybrid {GA-PSO} fuzzy system for user identification on smart phones},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1617--1624},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570117},
  doi          = {10.1145/1569901.1570117},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ShahzadZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ShafiqTF09,
  author       = {M. Zubair Shafiq and
                  S. Momina Tabish and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {Are evolutionary rule learning algorithms appropriate for malware
                  detection?},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1915--1916},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570233},
  doi          = {10.1145/1569901.1570233},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ShafiqTF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ShafiqTF09a,
  author       = {M. Zubair Shafiq and
                  S. Momina Tabish and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {On the appropriateness of evolutionary rule learning algorithms for
                  malware detection},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material},
  pages        = {2609--2616},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1570256.1570370},
  doi          = {10.1145/1570256.1570370},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ShafiqTF09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/TanwaniF09,
  author       = {Ajay Kumar Tanwani and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {Performance evaluation of evolutionary algorithms in classification
                  of biomedical datasets},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material},
  pages        = {2617--2624},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1570256.1570371},
  doi          = {10.1145/1570256.1570371},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/TanwaniF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/Farooq09,
  author       = {Muddassar Farooq},
  editor       = {Franz Rothlauf},
  title        = {Bio-inspired telecommunications},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material},
  pages        = {3513--3550},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1570256.1570429},
  doi          = {10.1145/1570256.1570429},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/Farooq09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RafiqueAF09,
  author       = {M. Zubair Rafique and
                  Muhammad Ali Akbar and
                  Muddassar Farooq},
  title        = {Evaluating DoS Attacks against Sip-Based VoIP Systems},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5426247},
  doi          = {10.1109/GLOCOM.2009.5426247},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RafiqueAF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/ManzoorSTF09,
  author       = {Salman Manzoor and
                  M. Zubair Shafiq and
                  S. Momina Tabish and
                  Muddassar Farooq},
  editor       = {Paul S. Andrews and
                  Jon Timmis and
                  Nick D. L. Owens and
                  Uwe Aickelin and
                  Emma Hart and
                  Andrew Hone and
                  Andy M. Tyrrell},
  title        = {A Sense of 'Danger' for Windows Processes},
  booktitle    = {Artificial Immune Systems, 8th International Conference, {ICARIS}
                  2009, York, UK, August 9-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5666},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03246-2\_22},
  doi          = {10.1007/978-3-642-03246-2\_22},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaris/ManzoorSTF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcls/TanwaniF09,
  author       = {Ajay Kumar Tanwani and
                  Muddassar Farooq},
  editor       = {Jaume Bacardit and
                  Will N. Browne and
                  Jan Drugowitsch and
                  Ester Bernad{\'{o}}{-}Mansilla and
                  Martin V. Butz},
  title        = {Classification Potential vs. Classification Accuracy: {A} Comprehensive
                  Study of Evolutionary Algorithms with Biomedical Datasets},
  booktitle    = {Learning Classifier Systems - 11th International Workshop, {IWLCS}
                  2008, Atlanta, GA, USA, July 13, 2008, and 12th International Workshop,
                  {IWLCS} 2009, Montreal, QC, Canada, July 9, 2009, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6471},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-17508-4\_9},
  doi          = {10.1007/978-3-642-17508-4\_9},
  timestamp    = {Sun, 02 Jun 2019 21:10:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcls/TanwaniF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/TabishSF09,
  author       = {S. Momina Tabish and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Hsinchun Chen and
                  Marc Dacier and
                  Marie{-}Francine Moens and
                  Gerhard Paass and
                  Christopher C. Yang},
  title        = {Malware detection using statistical analysis of byte-level file content},
  booktitle    = {Proceedings of the {ACM} {SIGKDD} Workshop on CyberSecurity and Intelligence
                  Informatics, Paris, France, June 28, 2009},
  pages        = {23--31},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1599272.1599278},
  doi          = {10.1145/1599272.1599278},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/TabishSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShafiqTMF09,
  author       = {M. Zubair Shafiq and
                  S. Momina Tabish and
                  Fauzan Mirza and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {PE-Miner: Mining Structural Information to Detect Malicious Executables
                  in Realtime},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_7},
  doi          = {10.1007/978-3-642-04342-0\_7},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShafiqTMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZahidSKF09,
  author       = {Saira Zahid and
                  Muhammad Shahzad and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Keystroke-Based User Identification on Smart Phones},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_12},
  doi          = {10.1007/978-3-642-04342-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZahidSKF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NoreenMSF09,
  author       = {Sadia Noreen and
                  Shafaq Murtaza and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Using Formal Grammar and Genetic Operators to Evolve Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {374--375},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_30},
  doi          = {10.1007/978-3-642-04342-0\_30},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NoreenMSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2009,
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni A. Di Caro and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Anna Esparcia{-}Alc{\'{a}}zar and
                  Muddassar Farooq and
                  Andreas Fink and
                  Penousal Machado and
                  Jon McCormack and
                  Michael O'Neill and
                  Ferrante Neri and
                  Mike Preuss and
                  Franz Rothlauf and
                  Ernesto Tarantino and
                  Shengxiang Yang},
  title        = {Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET,
                  EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION,
                  EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T{\"{u}}bingen, Germany,
                  April 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5484},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01129-0},
  doi          = {10.1007/978-3-642-01129-0},
  isbn         = {978-3-642-01128-3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/antsw/SaleemKF08,
  author       = {Muhammad Saleem and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Marco Dorigo and
                  Mauro Birattari and
                  Christian Blum and
                  Maurice Clerc and
                  Thomas St{\"{u}}tzle and
                  Alan F. T. Winfield},
  title        = {Formal Modeling of BeeAdHoc: {A} Bio-inspired Mobile Ad Hoc Network
                  Routing Protocol},
  booktitle    = {Ant Colony Optimization and Swarm Intelligence, 6th International
                  Conference, {ANTS} 2008, Brussels, Belgium, September 22-24, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5217},
  pages        = {315--322},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87527-7\_32},
  doi          = {10.1007/978-3-540-87527-7\_32},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/antsw/SaleemKF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShafiqKF08,
  author       = {M. Zubair Shafiq and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Diego Zamboni},
  title        = {Embedded Malware Detection Using Markov n-Grams},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5137},
  pages        = {88--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70542-0\_5},
  doi          = {10.1007/978-3-540-70542-0\_5},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/ShafiqKF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/ShafiqFK08,
  author       = {M. Zubair Shafiq and
                  Muddassar Farooq and
                  Syed Ali Khayam},
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni Di Caro and
                  Rolf Drechsler and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Anna Esparcia{-}Alc{\'{a}}zar and
                  Muddassar Farooq and
                  Andreas Fink and
                  Jon McCormack and
                  Michael O'Neill and
                  Juan Romero and
                  Franz Rothlauf and
                  Giovanni Squillero and
                  Sima Uyar and
                  Shengxiang Yang},
  title        = {A Comparative Study of Fuzzy Inference Systems, Neural Networks and
                  Adaptive Neuro Fuzzy Inference Systems for Portscan Detection},
  booktitle    = {Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET,
                  EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog,
                  Naples, Italy, March 26-28, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4974},
  pages        = {52--61},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78761-7\_6},
  doi          = {10.1007/978-3-540-78761-7\_6},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/evoW/ShafiqFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MazharF08,
  author       = {Nauman Mazhar and
                  Muddassar Farooq},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {A sense of danger: dendritic cells inspired artificial immune system
                  for manet security},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389105},
  doi          = {10.1145/1389095.1389105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/MazharF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SaleemKF08,
  author       = {Muhammad Saleem and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {A formal performance modeling framework for bio-inspired ad hoc routing
                  protocols},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389110},
  doi          = {10.1145/1389095.1389110},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/SaleemKF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ShafiqKF08,
  author       = {M. Zubair Shafiq and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Improving accuracy of immune-inspired malware detectors by using intelligent
                  features},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {119--126},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389112},
  doi          = {10.1145/1389095.1389112},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ShafiqKF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/AwaisFJ08,
  author       = {Aliya Awais and
                  Muddassar Farooq and
                  Muhammad Younus Javed},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Attack analysis {\&} bio-inspired security framework for {IP}
                  multimedia subsystem},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {161--162},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389119},
  doi          = {10.1145/1389095.1389119},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/AwaisFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/AwaisFJ08a,
  author       = {Aliya Awais and
                  Muddassar Farooq and
                  Muhammad Younus Javed},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Attack analysis {\&} bio-inspired security framework for IPMultimedia
                  subsystem},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008, Companion Material},
  pages        = {2093--2098},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1388969.1389029},
  doi          = {10.1145/1388969.1389029},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/AwaisFJ08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/ShahzadZF08,
  author       = {Muhammad Shahzad and
                  Saira Zahid and
                  Muddassar Farooq},
  editor       = {G{\"{u}}nter Rudolph and
                  Thomas Jansen and
                  Simon M. Lucas and
                  Carlo Poloni and
                  Nicola Beume},
  title        = {A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired
                  Routing Protocols},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} X, 10th International
                  Conference Dortmund, Germany, September 13-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5199},
  pages        = {1130--1139},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87700-4\_112},
  doi          = {10.1007/978-3-540-87700-4\_112},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/ShahzadZF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ncs/FarooqC08,
  author       = {Muddassar Farooq and
                  Gianni A. Di Caro},
  editor       = {Christian Blum and
                  Daniel Merkle},
  title        = {Routing Protocols for Next-Generation Networks Inspired by Collective
                  Behaviors of Insect Societies: An Overview},
  booktitle    = {Swarm Intelligence: Introduction and Applications},
  series       = {Natural Computing Series},
  pages        = {101--160},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-74089-6\_4},
  doi          = {10.1007/978-3-540-74089-6\_4},
  timestamp    = {Tue, 16 May 2017 14:24:38 +0200},
  biburl       = {https://dblp.org/rec/series/ncs/FarooqC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2008,
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni Di Caro and
                  Rolf Drechsler and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Anna Esparcia{-}Alc{\'{a}}zar and
                  Muddassar Farooq and
                  Andreas Fink and
                  Jon McCormack and
                  Michael O'Neill and
                  Juan Romero and
                  Franz Rothlauf and
                  Giovanni Squillero and
                  Sima Uyar and
                  Shengxiang Yang},
  title        = {Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET,
                  EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog,
                  Naples, Italy, March 26-28, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4974},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78761-7},
  doi          = {10.1007/978-3-540-78761-7},
  isbn         = {978-3-540-78760-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ZahidSAF07,
  author       = {Saira Zahid and
                  Muhammad Shahzad and
                  Syed Usman Ali and
                  Muddassar Farooq},
  title        = {A comprehensive formal framework for analyzing the behavior of nature-inspired
                  routing protocols},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2007, 25-28 September 2007, Singapore},
  pages        = {180--187},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC.2007.4424470},
  doi          = {10.1109/CEC.2007.4424470},
  timestamp    = {Thu, 16 Dec 2021 14:01:04 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ZahidSAF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/SaleemF07,
  author       = {Muhammad Saleem and
                  Muddassar Farooq},
  title        = {A framework for empirical evaluation of nature inspired routing protocols
                  for wireless sensor networks},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2007, 25-28 September 2007, Singapore},
  pages        = {751--758},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC.2007.4424546},
  doi          = {10.1109/CEC.2007.4424546},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/SaleemF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ShafiqKHF07,
  author       = {M. Zubair Shafiq and
                  Mehrin Kiani and
                  Bisma Hashmi and
                  Muddassar Farooq},
  title        = {Extended thymus action for improving response of {AIS} based {NID}
                  system against malicious traffic},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2007, 25-28 September 2007, Singapore},
  pages        = {3369--3376},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC.2007.4424907},
  doi          = {10.1109/CEC.2007.4424907},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ShafiqKHF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/SaleemF07,
  author       = {Muhammad Saleem and
                  Muddassar Farooq},
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni Di Caro and
                  Rolf Drechsler and
                  Muddassar Farooq and
                  Andreas Fink and
                  Evelyne Lutton and
                  Penousal Machado and
                  Stefan Minner and
                  Michael O'Neill and
                  Juan Romero and
                  Franz Rothlauf and
                  Giovanni Squillero and
                  Hideyuki Takagi and
                  Sima Uyar and
                  Shengxiang Yang},
  title        = {BeeSensor: {A} Bee-Inspired Power Aware Routing Protocol for Wireless
                  Sensor Networks},
  booktitle    = {Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet,
                  EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog,
                  Valencia, Spain, April11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4448},
  pages        = {81--90},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71805-5\_9},
  doi          = {10.1007/978-3-540-71805-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/SaleemF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MazharF07,
  author       = {Nauman Mazhar and
                  Muddassar Farooq},
  editor       = {Hod Lipson},
  title        = {Vulnerability analysis and security framework (BeeSec) for nature
                  inspired {MANET} routing protocols},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings,
                  London, England, UK, July 7-11, 2007},
  pages        = {102--109},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1276958.1276973},
  doi          = {10.1145/1276958.1276973},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/MazharF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ShafiqKHF07,
  author       = {M. Zubair Shafiq and
                  Mehrin Kiani and
                  Bisma Hashmi and
                  Muddassar Farooq},
  editor       = {Hod Lipson},
  title        = {Extended thymus action for reducing false positives in ais based network
                  intrusion detection systems},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings,
                  London, England, UK, July 7-11, 2007},
  pages        = {182},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1276958.1276996},
  doi          = {10.1145/1276958.1276996},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ShafiqKHF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/ShafiqF07,
  author       = {M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Leandro Nunes de Castro and
                  Fernando J. Von Zuben and
                  Helder Knidel},
  title        = {Defence Against 802.11 DoS Attacks Using Artificial Immune System},
  booktitle    = {Artificial Immune Systems, 6th International Conference, {ICARIS}
                  2007, Santos, Brazil, August 26-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4628},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73922-7\_9},
  doi          = {10.1007/978-3-540-73922-7\_9},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaris/ShafiqF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/MazharF07,
  author       = {Nauman Mazhar and
                  Muddassar Farooq},
  editor       = {Leandro Nunes de Castro and
                  Fernando J. Von Zuben and
                  Helder Knidel},
  title        = {BeeAIS: Artificial Immune System Security for Nature Inspired, {MANET}
                  Routing Protocol, BeeAdHoc},
  booktitle    = {Artificial Immune Systems, 6th International Conference, {ICARIS}
                  2007, Santos, Brazil, August 26-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4628},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73922-7\_32},
  doi          = {10.1007/978-3-540-73922-7\_32},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaris/MazharF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/evoW/2007,
  editor       = {Mario Giacobini and
                  Anthony Brabazon and
                  Stefano Cagnoni and
                  Gianni Di Caro and
                  Rolf Drechsler and
                  Muddassar Farooq and
                  Andreas Fink and
                  Evelyne Lutton and
                  Penousal Machado and
                  Stefan Minner and
                  Michael O'Neill and
                  Juan Romero and
                  Franz Rothlauf and
                  Giovanni Squillero and
                  Hideyuki Takagi and
                  Sima Uyar and
                  Shengxiang Yang},
  title        = {Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet,
                  EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog,
                  Valencia, Spain, April11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4448},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71805-5},
  doi          = {10.1007/978-3-540-71805-5},
  isbn         = {978-3-540-71804-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Farooq2006,
  author       = {Muddassar Farooq},
  title        = {From the wisdom of the hive to intelligent routing in telecommunication
                  networks: a step towards intelligent network management through natural
                  engineering},
  school       = {Technical University of Dortmund, Germany},
  year         = {2006},
  url          = {http://eldorado.tu-dortmund.de:8080/bitstream/2003/22186/1/Phdthesis.pdf},
  urn          = {urn:nbn:de:hbz:290-2003/22186-3},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Farooq2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/FarooqM06,
  author       = {Muddassar Farooq and
                  Ronaldo Menezes},
  title        = {Special issue on nature-inspired applications and systems},
  journal      = {J. Syst. Archit.},
  volume       = {52},
  number       = {8-9},
  pages        = {441--442},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.sysarc.2006.02.004},
  doi          = {10.1016/J.SYSARC.2006.02.004},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/FarooqM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/WeddeF06,
  author       = {Horst F. Wedde and
                  Muddassar Farooq},
  title        = {A comprehensive review of nature inspired routing algorithms for fixed
                  telecommunication networks},
  journal      = {J. Syst. Archit.},
  volume       = {52},
  number       = {8-9},
  pages        = {461--484},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.sysarc.2006.02.005},
  doi          = {10.1016/J.SYSARC.2006.02.005},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/WeddeF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/WeddeTF06,
  author       = {Horst F. Wedde and
                  Constantin Timm and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf and
                  J{\"{u}}rgen Branke and
                  Stefano Cagnoni and
                  Ernesto Costa and
                  Carlos Cotta and
                  Rolf Drechsler and
                  Evelyne Lutton and
                  Penousal Machado and
                  Jason H. Moore and
                  Juan Romero and
                  George D. Smith and
                  Giovanni Squillero and
                  Hideyuki Takagi},
  title        = {BeeHiveGuard: {A} Step Towards Secure Nature Inspired Routing Algorithms},
  booktitle    = {Applications of Evolutionary Computing, EvoWorkshops 2006: EvoBIO,
                  EvoCOMNET, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, and EvoSTOC,
                  Budapest, Hungary, April 10-12, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3907},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11732242\_22},
  doi          = {10.1007/11732242\_22},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/WeddeTF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/WeddeTF06,
  author       = {Horst F. Wedde and
                  Constantin Timm and
                  Muddassar Farooq},
  editor       = {Thomas Philip Runarsson and
                  Hans{-}Georg Beyer and
                  Edmund K. Burke and
                  Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and
                  L. Darrell Whitley and
                  Xin Yao},
  title        = {BeeHiveAIS: {A} Simple, Efficient, Scalable and Secure Routing Framework
                  Inspired by Artificial Immune Systems},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} IX, 9th International
                  Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4193},
  pages        = {623--632},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844297\_63},
  doi          = {10.1007/11844297\_63},
  timestamp    = {Sun, 25 Jul 2021 11:46:24 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/WeddeTF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ki/X05u,
  author       = {Horst F. Wedde and
                  Muddassar Farooq},
  title        = {BeeHive: Routing Algorithms Inspired by Honey Bee Behavior},
  journal      = {K{\"{u}}nstliche Intell.},
  volume       = {19},
  number       = {4},
  pages        = {18--24},
  year         = {2005},
  url          = {http://www.kuenstliche-intelligenz.de/index.php?id=no-6408\&\#38;tx\_ki\_pi1\%5BshowUid\%5D=1115\&\#38;cHash=2cac07d7f8},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ki/X05u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/WeddeF05,
  author       = {Horst F. Wedde and
                  Muddassar Farooq},
  editor       = {Franz Rothlauf and
                  J{\"{u}}rgen Branke and
                  Stefano Cagnoni and
                  David W. Corne and
                  Rolf Drechsler and
                  Yaochu Jin and
                  Penousal Machado and
                  Elena Marchiori and
                  Juan Romero and
                  George D. Smith and
                  Giovanni Squillero},
  title        = {A Performance Evaluation Framework for Nature Inspired Routing Algorithms},
  booktitle    = {Applications of Evolutionary Computing, EvoWorkshops 2005: EvoBIO,
                  EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC, Lausanne, Switzerland,
                  March 30 - April 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3449},
  pages        = {136--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32003-6\_14},
  doi          = {10.1007/978-3-540-32003-6\_14},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/WeddeF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/WeddeFPVMMJ05,
  author       = {Horst F. Wedde and
                  Muddassar Farooq and
                  Thorsten Pannenbaecker and
                  Bjoern Vogel and
                  Christian Mueller and
                  Johannes Meth and
                  Ren{\'{e}} Jeruschkat},
  editor       = {Hans{-}Georg Beyer and
                  Una{-}May O'Reilly},
  title        = {BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc
                  networks inspired by bee behavior},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings,
                  Washington DC, USA, June 25-29, 2005},
  pages        = {153--160},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1068009.1068034},
  doi          = {10.1145/1068009.1068034},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/WeddeFPVMMJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icai/WeddeF05,
  author       = {Horst F. Wedde and
                  Muddassar Farooq},
  editor       = {Hamid R. Arabnia and
                  Rose Joshua},
  title        = {Nature Centered Information Systems: How Philosophy and Poetry Helps
                  in Designing Technical Systems},
  booktitle    = {Proceedings of the 2005 International Conference on Artificial Intelligence,
                  {ICAI} 2005, Las Vegas, Nevada, USA, June 27-30, 2005, Volume 2},
  pages        = {938--943},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icai/WeddeF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swis/WeddeF05,
  author       = {Horst F. Wedde and
                  Muddassar Farooq},
  title        = {The wisdom of the hive applied to mobile ad-hoc networks},
  booktitle    = {2005 {IEEE} Swarm Intelligence Symposium, {SIS} 2005, Pasadena, California,
                  USA, June 8-10, 2005},
  pages        = {341--348},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SIS.2005.1501641},
  doi          = {10.1109/SIS.2005.1501641},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/swis/WeddeF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/FarooqW05,
  author       = {Muddassar Farooq and
                  Horst F. Wedde},
  editor       = {Stephan Olariu and
                  Albert Y. Zomaya},
  title        = {BeeHive},
  booktitle    = {Handbook of Bioinspired Algorithms and Applications},
  publisher    = {Chapman and Hall/CRC},
  year         = {2005},
  url          = {https://doi.org/10.1201/9781420035063.ch21},
  doi          = {10.1201/9781420035063.CH21},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/FarooqW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/antsw/WeddeFZ04,
  author       = {Horst F. Wedde and
                  Muddassar Farooq and
                  Yue Zhang},
  editor       = {Marco Dorigo and
                  Mauro Birattari and
                  Christian Blum and
                  Luca Maria Gambardella and
                  Francesco Mondada and
                  Thomas St{\"{u}}tzle},
  title        = {BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by
                  Honey Bee Behavior},
  booktitle    = {Ant Colony Optimization and Swarm Intelligence, 4th International
                  Workshop, {ANTS} 2004, Brussels, Belgium, September 5 - 8, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3172},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28646-2\_8},
  doi          = {10.1007/978-3-540-28646-2\_8},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/antsw/WeddeFZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/WeddeFL04,
  author       = {Horst F. Wedde and
                  Muddassar Farooq and
                  Mario Lischka},
  editor       = {Kalyanmoy Deb and
                  Riccardo Poli and
                  Wolfgang Banzhaf and
                  Hans{-}Georg Beyer and
                  Edmund K. Burke and
                  Paul J. Darwen and
                  Dipankar Dasgupta and
                  Dario Floreano and
                  James A. Foster and
                  Mark Harman and
                  Owen Holland and
                  Pier Luca Lanzi and
                  Lee Spector and
                  Andrea Tettamanzi and
                  Dirk Thierens and
                  Andrew M. Tyrrell},
  title        = {An Evolutionary Meta Hierarchical Scheduler for the Linux Operating
                  System},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary
                  Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3103},
  pages        = {1334--1335},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24855-2\_153},
  doi          = {10.1007/978-3-540-24855-2\_153},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/WeddeFL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icai/WeddeFL04,
  author       = {Horst F. Wedde and
                  Muddassar Farooq and
                  Mario Lischka},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {A User Centered Evolutionary Scheduling Framework},
  booktitle    = {Proceedings of the International Conference on Artificial Intelligence,
                  {IC-AI} '04, Volume 2 {\&} Proceedings of the International Conference
                  on Machine Learning; Models, Technologies {\&} Applications, {MLMTA}
                  '04, June 21-24, 2004, Las Vegas, Nevada, {USA}},
  pages        = {1126--1132},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icai/WeddeFL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip3-1/WeddeBF02,
  author       = {Horst F. Wedde and
                  Frank Thorsten Breuer and
                  Muddassar Farooq},
  editor       = {Tom J. van Weert and
                  Robert Munro},
  title        = {A Role-Based Adaptive {CSCL} Environment for Intensive Hands-on Teaching
                  and Learning under Rigid Time Constraints},
  booktitle    = {Informatics and The Digital Society: Social, Ethical and Cognitive
                  Issues, {IFIP} TC3/WG3.1{\&}3.2 Open Conference on Social, Ethical
                  and Cognitive Issues on Informatics and ICT, July 22-26, 2002, Dortmund,
                  Germany},
  series       = {{IFIP} Conference Proceedings},
  volume       = {244},
  pages        = {241--250},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip3-1/WeddeBF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}