


default search action
BibTeX records: Muddassar Farooq
@article{DBLP:journals/corr/abs-2501-15969, author = {Shaheer Ahmad Khan and Muhammad Usamah Shahid and Ahmad Abdullah and Ibrahim Hashmat and Muddassar Farooq}, title = {An Explainable Disease Surveillance System for Early Prediction of Multiple Chronic Diseases}, journal = {CoRR}, volume = {abs/2501.15969}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2501.15969}, doi = {10.48550/ARXIV.2501.15969}, eprinttype = {arXiv}, eprint = {2501.15969}, timestamp = {Wed, 26 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2501-15969.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aime/ZaidiBF24, author = {Syed Hamail Hussain Zaidi and Amna Basharat and Muddassar Farooq}, editor = {Joseph Finkelstein and Robert Moskovitch and Enea Parimbelli}, title = {Mining Disease Progression Patterns for Advanced Disease Surveillance}, booktitle = {Artificial Intelligence in Medicine - 22nd International Conference, {AIME} 2024, Salt Lake City, UT, USA, July 9-12, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14844}, pages = {81--89}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-66538-7\_10}, doi = {10.1007/978-3-031-66538-7\_10}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aime/ZaidiBF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aime/ShahidF23, author = {Muhammad Usamah Shahid and Muddassar Farooq}, editor = {Jose M. Juarez and Mar Marcos and Gregor Stiglic and Allan Tucker}, title = {Boosted Random Forests for Predicting Treatment Failure of Chemotherapy Regimens}, booktitle = {Artificial Intelligence in Medicine - 21st International Conference on Artificial Intelligence in Medicine, {AIME} 2023, Portoro{\v{z}}, Slovenia, June 12-15, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13897}, pages = {13--24}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34344-5\_2}, doi = {10.1007/978-3-031-34344-5\_2}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aime/ShahidF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AnsariAMMF20, author = {Omar Ansari and Muhammad Amin and Moazam Maqsood and Abdul Rahman Muhammad Maud and Muddassar Farooq}, title = {Inter-Subset Hamming Distance Maximization for Enhancing the Physical Layer Security of Antenna Subset Modulation}, journal = {{IEEE} Access}, volume = {8}, pages = {221513--221524}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3042969}, doi = {10.1109/ACCESS.2020.3042969}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AnsariAMMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-08271, author = {Muhammad Kamran and Muddassar Farooq}, title = {A Comprehensive Survey of Watermarking Relational Databases Research}, journal = {CoRR}, volume = {abs/1801.08271}, year = {2018}, url = {http://arxiv.org/abs/1801.08271}, eprinttype = {arXiv}, eprint = {1801.08271}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-08271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-09741, author = {Muhammad Kamran and Muddassar Farooq}, title = {An Optimized Information-Preserving Relational Database Watermarking Scheme for Ownership Protection of Medical Data}, journal = {CoRR}, volume = {abs/1801.09741}, year = {2018}, url = {http://arxiv.org/abs/1801.09741}, eprinttype = {arXiv}, eprint = {1801.09741}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-09741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/AhmadAF17, author = {Abrar Ahmad and Muhammad Amin and Muddassar Farooq}, title = {Analyzing Directional Modulation Techniques as Block Encryption Ciphers for Physical Layer Security}, booktitle = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2017, San Francisco, CA, USA, March 19-22, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCNC.2017.7925525}, doi = {10.1109/WCNC.2017.7925525}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/AhmadAF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/AhmadFA16, author = {Abrar Ahmad and Muddassar Farooq and Muhammad Amin}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {SBoxScope: {A} Meta S-box Strength Evaluation Framework for Heterogeneous Confusion Boxes}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {5545--5553}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.685}, doi = {10.1109/HICSS.2016.685}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/AhmadFA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/KhanASFK15, author = {Salman H. Khan and Muhammad Ali Akbar and Farrukh Shahzad and Muddassar Farooq and Zeashan H. Khan}, title = {Secure biometric template generation for multi-factor authentication}, journal = {Pattern Recognit.}, volume = {48}, number = {2}, pages = {458--472}, year = {2015}, url = {https://doi.org/10.1016/j.patcog.2014.08.024}, doi = {10.1016/J.PATCOG.2014.08.024}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/KhanASFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ShoaibF15, author = {Muhammad Shoaib and Muddassar Farooq}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {USpam - {A} User Centric Ontology Driven Spam Detection System}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {3661--3669}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.440}, doi = {10.1109/HICSS.2015.440}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ShoaibF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/AkbarF14, author = {Muhammad Ali Akbar and Muddassar Farooq}, title = {Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over {IP} Telephony}, journal = {Knowl. Inf. Syst.}, volume = {38}, number = {2}, pages = {491--510}, year = {2014}, url = {https://doi.org/10.1007/s10115-012-0595-5}, doi = {10.1007/S10115-012-0595-5}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/AkbarF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShahzadSF13, author = {Farrukh Shahzad and Muhammad Shahzad and Muddassar Farooq}, title = {In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux {OS}}, journal = {Inf. Sci.}, volume = {231}, pages = {45--63}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.09.016}, doi = {10.1016/J.INS.2011.09.016}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShahzadSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KamranF13, author = {Muhammad Kamran and Muddassar Farooq}, title = {A Formal Usability Constraints Model for Watermarking of Outsourced Datasets}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {6}, pages = {1061--1072}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2259234}, doi = {10.1109/TIFS.2013.2259234}, timestamp = {Sat, 28 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KamranF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/KamranSF13, author = {Muhammad Kamran and Sabah Suhail and Muddassar Farooq}, title = {A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {12}, pages = {2694--2707}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2012.227}, doi = {10.1109/TKDE.2012.227}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/KamranSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SaleemUF12, author = {Muhammad Saleem and Israr Ullah and Muddassar Farooq}, title = {BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks}, journal = {Inf. Sci.}, volume = {200}, pages = {38--56}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.02.024}, doi = {10.1016/J.INS.2012.02.024}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SaleemUF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/ShahzadF12, author = {Farrukh Shahzad and Muddassar Farooq}, title = {ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables}, journal = {Knowl. Inf. Syst.}, volume = {30}, number = {3}, pages = {589--612}, year = {2012}, url = {https://doi.org/10.1007/s10115-011-0393-5}, doi = {10.1007/S10115-011-0393-5}, timestamp = {Fri, 16 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/ShahzadF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/KamranF12, author = {Muhammad Kamran and Muddassar Farooq}, title = {An Information-Preserving Watermarking Scheme for Right Protection of {EMR} Systems}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {11}, pages = {1950--1962}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2011.223}, doi = {10.1109/TKDE.2011.223}, timestamp = {Sat, 28 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/KamranF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2012a, editor = {Cecilia Di Chio and Alexandros Agapitos and Stefano Cagnoni and Carlos Cotta and Francisco Fern{\'{a}}ndez de Vega and Gianni A. Di Caro and Rolf Drechsler and Anik{\'{o}} Ek{\'{a}}rt and Anna Isabel Esparcia{-}Alc{\'{a}}zar and Muddassar Farooq and William B. Langdon and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and Mike Preuss and Hendrik Richter and Sara Silva and Anabela Sim{\~{o}}es and Giovanni Squillero and Ernesto Tarantino and Andrea Tettamanzi and Julian Togelius and Neil Urquhart and Sima Uyar and Georgios N. Yannakakis}, title = {Applications of Evolutionary Computation - EvoApplications 2012: EvoCOMNET, EvoCOMPLEX, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoNUM, EvoPAR, EvoRISK, EvoSTIM, and EvoSTOC, M{\'{a}}laga, Spain, April 11-13, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7248}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29178-4}, doi = {10.1007/978-3-642-29178-4}, isbn = {978-3-642-29177-7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2012a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SaleemUKF11, author = {Muhammad Saleem and Israr Ullah and Syed Ali Khayam and Muddassar Farooq}, title = {On the reliability of ad hoc routing protocols for loss-and-delay sensitive applications}, journal = {Ad Hoc Networks}, volume = {9}, number = {3}, pages = {285--299}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2010.07.012}, doi = {10.1016/J.ADHOC.2010.07.012}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/SaleemUKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/MazharF11, author = {N. Mazhar and Muddassar Farooq}, title = {A hybrid artificial immune system {(AIS)} model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols}, journal = {Appl. Soft Comput.}, volume = {11}, number = {8}, pages = {5695--5714}, year = {2011}, url = {https://doi.org/10.1016/j.asoc.2011.03.021}, doi = {10.1016/J.ASOC.2011.03.021}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/MazharF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SaleemCF11, author = {Muhammad Saleem and Gianni A. Di Caro and Muddassar Farooq}, title = {Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions}, journal = {Inf. Sci.}, volume = {181}, number = {20}, pages = {4597--4624}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.07.005}, doi = {10.1016/J.INS.2010.07.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SaleemCF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/JunaidF11, author = {Muhammad Bilal Junaid and Muddassar Farooq}, editor = {Natalio Krasnogor and Pier Luca Lanzi}, title = {Using evolutionary learning classifiers to do MobileSpam {(SMS)} filtering}, booktitle = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO} 2011, Proceedings, Dublin, Ireland, July 12-16, 2011}, pages = {1795--1802}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2001576.2001817}, doi = {10.1145/2001576.2001817}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/JunaidF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/AfridiF11, author = {M. Jamal Afridi and Muddassar Farooq}, title = {OG-Miner: An Intelligent Health Tool for Achieving Millennium Development Goals (MDGs) in m-Health Environments}, booktitle = {44th Hawaii International International Conference on Systems Science {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HICSS.2011.320}, doi = {10.1109/HICSS.2011.320}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/AfridiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ShahzadBSF11, author = {Farrukh Shahzad and Sohail Bhatti and Muhammad Shahzad and Muddassar Farooq}, title = {In-Execution Malware Detection Using Task Structures of Linux Processes}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963012}, doi = {10.1109/ICC.2011.5963012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ShahzadBSF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/WaseemJRF11, author = {Komal Waseem and Awais Javed and Rashad Ramzan and Muddassar Farooq}, editor = {Yongsheng Ding and Haiying Wang and Ning Xiong and Kuangrong Hao and Lipo Wang}, title = {Using evolutionary algorithms for {ECG} Arrhythmia detection and classification}, booktitle = {Seventh International Conference on Natural Computation, {ICNC} 2011, Shanghai, China, 26-28 July, 2011}, pages = {2386--2390}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNC.2011.6022596}, doi = {10.1109/ICNC.2011.6022596}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/icnc/WaseemJRF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/RafiqueKAF11, author = {M. Zubair Rafique and Muhammad Khurram Khan and Khaled Alghathbar and Muddassar Farooq}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Embedding High Capacity Covert Channels in Short Message Service {(SMS)}}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {1--10}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_1}, doi = {10.1007/978-3-642-22339-6\_1}, timestamp = {Sat, 11 Jan 2025 00:34:04 +0100}, biburl = {https://dblp.org/rec/conf/sta/RafiqueKAF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/RafiqueKAF11a, author = {M. Zubair Rafique and Muhammad Khurram Khan and Khaled Alghathbar and Muddassar Farooq}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {A Framework for Detecting Malformed {SMS} Attack}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {11--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_2}, doi = {10.1007/978-3-642-22339-6\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/RafiqueKAF11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2011a2, editor = {Cecilia Di Chio and Anthony Brabazon and Gianni A. Di Caro and Rolf Drechsler and Muddassar Farooq and J{\"{o}}rn Grahl and Gary Greenfield and Christian Prins and Juan Romero and Giovanni Squillero and Ernesto Tarantino and Andrea Tettamanzi and Neil Urquhart and A. Sima Etaner{-}Uyar}, title = {Applications of Evolutionary Computation - EvoApplications 2011: EvoCOMNET, EvoFIN, EvoHOT, EvoMUSART, EvoSTIM, and EvoTRANSLOG, Torino, Italy, April 27-29, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6625}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20520-0}, doi = {10.1007/978-3-642-20520-0}, isbn = {978-3-642-20519-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2011a2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/SaleemKF10, author = {Muhammad Saleem and Syed Ali Khayam and Muddassar Farooq}, title = {On Performance Modeling of Ad Hoc Routing Protocols}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/373759}, doi = {10.1155/2010/373759}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/SaleemKF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/antsw/UllahSF10, author = {Israr Ullah and Muhammad Saleem and Muddassar Farooq}, editor = {Marco Dorigo and Mauro Birattari and Gianni A. Di Caro and Ren{\'{e}} Doursat and Andries P. Engelbrecht and Dario Floreano and Luca Maria Gambardella and Roderich Gro{\ss} and Erol Sahin and Hiroki Sayama and Thomas St{\"{u}}tzle}, title = {Bee-Sensor: {A} Step Towards Meta-Routing Strategies in Hybrid Ad Hoc Networks}, booktitle = {Swarm Intelligence - 7th International Conference, {ANTS} 2010, Brussels, Belgium, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6234}, pages = {392--399}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15461-4\_36}, doi = {10.1007/978-3-642-15461-4\_36}, timestamp = {Mon, 16 Aug 2021 17:13:22 +0200}, biburl = {https://dblp.org/rec/conf/antsw/UllahSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MehdiAKF10, author = {Bilal Mehdi and Faraz Ahmed and Syed Ali Khayam and Muddassar Farooq}, title = {Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5501969}, doi = {10.1109/ICC.2010.5501969}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MehdiAKF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nossdav/AkbarF10, author = {Muhammad Ali Akbar and Muddassar Farooq}, editor = {Dick C. A. Bulterman and Mohamed Hefeeda}, title = {RTP-miner: a real-time security framework for {RTP} fuzzing attacks}, booktitle = {Network and Operating System Support for Digital Audio and Video, 20th International Workshop, {NOSSDAV} 2010, Amsterdam, The Netherlands, June 2-4, 2010, Proceedings}, pages = {87--92}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806565.1806587}, doi = {10.1145/1806565.1806587}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nossdav/AkbarF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/AhmedSF10, author = {Faraz Ahmed and Farrukh Shahzad and Muddassar Farooq}, editor = {Robert Schaefer and Carlos Cotta and Joanna Kolodziej and G{\"{u}}nter Rudolph}, title = {Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System}, booktitle = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International Conference, Krak{\'{o}}w, Poland, September 11-15, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6238}, pages = {304--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15844-5\_31}, doi = {10.1007/978-3-642-15844-5\_31}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/AhmedSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2010a2, editor = {Cecilia Di Chio and Anthony Brabazon and Gianni A. Di Caro and Marc Ebner and Muddassar Farooq and Andreas Fink and J{\"{o}}rn Grahl and Gary Greenfield and Penousal Machado and Michael O'Neill and Ernesto Tarantino and Neil Urquhart}, title = {Applications of Evolutionary Computation, EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6025}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12242-2}, doi = {10.1007/978-3-642-12242-2}, isbn = {978-3-642-12241-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2010a2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aime/TanwaniF09, author = {Ajay Kumar Tanwani and Muddassar Farooq}, editor = {Carlo Combi and Yuval Shahar and Ameen Abu{-}Hanna}, title = {The Role of Biomedical Dataset in Classification}, booktitle = {Artificial Intelligence in Medicine, 12th Conference on Artificial Intelligence in Medicine, {AIME} 2009, Verona, Italy, July 18-22, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5651}, pages = {370--374}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02976-9\_51}, doi = {10.1007/978-3-642-02976-9\_51}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/aime/TanwaniF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedHSF09, author = {Faraz Ahmed and Haider Hameed and M. Zubair Shafiq and Muddassar Farooq}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Using spatio-temporal information in {API} calls with machine learning algorithms for malware detection}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {55--62}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1655003}, doi = {10.1145/1654988.1655003}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AhmedHSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/TanwaniASF09, author = {Ajay Kumar Tanwani and M. Jamal Afridi and M. Zubair Shafiq and Muddassar Farooq}, editor = {Clara Pizzuti and Marylyn D. Ritchie and Mario Giacobini}, title = {Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets}, booktitle = {Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, 7th European Conference, EvoBIO 2009, T{\"{u}}bingen, Germany, April 15-17, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5483}, pages = {128--139}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01184-9\_12}, doi = {10.1007/978-3-642-01184-9\_12}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/evoW/TanwaniASF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/MehmoodCMF09, author = {Shahid Mehmood and Stefano Cagnoni and Monica Mordonini and Muddassar Farooq}, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni A. Di Caro and Anik{\'{o}} Ek{\'{a}}rt and Anna Esparcia{-}Alc{\'{a}}zar and Muddassar Farooq and Andreas Fink and Penousal Machado and Jon McCormack and Michael O'Neill and Ferrante Neri and Mike Preuss and Franz Rothlauf and Ernesto Tarantino and Shengxiang Yang}, title = {Particle Swarm Optimisation as a Hardware-Oriented Meta-heuristic for Image Analysis}, booktitle = {Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T{\"{u}}bingen, Germany, April 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5484}, pages = {369--374}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01129-0\_41}, doi = {10.1007/978-3-642-01129-0\_41}, timestamp = {Wed, 25 Sep 2019 18:21:09 +0200}, biburl = {https://dblp.org/rec/conf/evoW/MehmoodCMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/AkbarF09, author = {Muhammad Ali Akbar and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {Application of evolutionary algorithms in detection of {SIP} based flooding attacks}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1419--1426}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570092}, doi = {10.1145/1569901.1570092}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/AkbarF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MehdiTF09, author = {Syed Bilal Mehdi and Ajay Kumar Tanwani and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {{IMAD:} in-execution malware analysis and detection}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1553--1560}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570109}, doi = {10.1145/1569901.1570109}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/MehdiTF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/NoreenMSF09, author = {Sadia Noreen and Shafaq Murtaza and M. Zubair Shafiq and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {Evolvable malware}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1569--1576}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570111}, doi = {10.1145/1569901.1570111}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/NoreenMSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ShahzadZF09, author = {Muhammad Shahzad and Saira Zahid and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {A hybrid {GA-PSO} fuzzy system for user identification on smart phones}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1617--1624}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570117}, doi = {10.1145/1569901.1570117}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ShahzadZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ShafiqTF09, author = {M. Zubair Shafiq and S. Momina Tabish and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {Are evolutionary rule learning algorithms appropriate for malware detection?}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1915--1916}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570233}, doi = {10.1145/1569901.1570233}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ShafiqTF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ShafiqTF09a, author = {M. Zubair Shafiq and S. Momina Tabish and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {On the appropriateness of evolutionary rule learning algorithms for malware detection}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material}, pages = {2609--2616}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1570256.1570370}, doi = {10.1145/1570256.1570370}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ShafiqTF09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/TanwaniF09, author = {Ajay Kumar Tanwani and Muddassar Farooq}, editor = {Franz Rothlauf}, title = {Performance evaluation of evolutionary algorithms in classification of biomedical datasets}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material}, pages = {2617--2624}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1570256.1570371}, doi = {10.1145/1570256.1570371}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/TanwaniF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/Farooq09, author = {Muddassar Farooq}, editor = {Franz Rothlauf}, title = {Bio-inspired telecommunications}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009, Companion Material}, pages = {3513--3550}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1570256.1570429}, doi = {10.1145/1570256.1570429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/Farooq09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RafiqueAF09, author = {M. Zubair Rafique and Muhammad Ali Akbar and Muddassar Farooq}, title = {Evaluating DoS Attacks against Sip-Based VoIP Systems}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5426247}, doi = {10.1109/GLOCOM.2009.5426247}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RafiqueAF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/ManzoorSTF09, author = {Salman Manzoor and M. Zubair Shafiq and S. Momina Tabish and Muddassar Farooq}, editor = {Paul S. Andrews and Jon Timmis and Nick D. L. Owens and Uwe Aickelin and Emma Hart and Andrew Hone and Andy M. Tyrrell}, title = {A Sense of 'Danger' for Windows Processes}, booktitle = {Artificial Immune Systems, 8th International Conference, {ICARIS} 2009, York, UK, August 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5666}, pages = {220--233}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03246-2\_22}, doi = {10.1007/978-3-642-03246-2\_22}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaris/ManzoorSTF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcls/TanwaniF09, author = {Ajay Kumar Tanwani and Muddassar Farooq}, editor = {Jaume Bacardit and Will N. Browne and Jan Drugowitsch and Ester Bernad{\'{o}}{-}Mansilla and Martin V. Butz}, title = {Classification Potential vs. Classification Accuracy: {A} Comprehensive Study of Evolutionary Algorithms with Biomedical Datasets}, booktitle = {Learning Classifier Systems - 11th International Workshop, {IWLCS} 2008, Atlanta, GA, USA, July 13, 2008, and 12th International Workshop, {IWLCS} 2009, Montreal, QC, Canada, July 9, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6471}, pages = {127--144}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-17508-4\_9}, doi = {10.1007/978-3-642-17508-4\_9}, timestamp = {Sun, 02 Jun 2019 21:10:39 +0200}, biburl = {https://dblp.org/rec/conf/iwcls/TanwaniF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/TabishSF09, author = {S. Momina Tabish and M. Zubair Shafiq and Muddassar Farooq}, editor = {Hsinchun Chen and Marc Dacier and Marie{-}Francine Moens and Gerhard Paass and Christopher C. Yang}, title = {Malware detection using statistical analysis of byte-level file content}, booktitle = {Proceedings of the {ACM} {SIGKDD} Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009}, pages = {23--31}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1599272.1599278}, doi = {10.1145/1599272.1599278}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/TabishSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShafiqTMF09, author = {M. Zubair Shafiq and S. Momina Tabish and Fauzan Mirza and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {121--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_7}, doi = {10.1007/978-3-642-04342-0\_7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShafiqTMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZahidSKF09, author = {Saira Zahid and Muhammad Shahzad and Syed Ali Khayam and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Keystroke-Based User Identification on Smart Phones}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {224--243}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_12}, doi = {10.1007/978-3-642-04342-0\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZahidSKF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NoreenMSF09, author = {Sadia Noreen and Shafaq Murtaza and M. Zubair Shafiq and Muddassar Farooq}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Using Formal Grammar and Genetic Operators to Evolve Malware}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {374--375}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_30}, doi = {10.1007/978-3-642-04342-0\_30}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NoreenMSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2009, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni A. Di Caro and Anik{\'{o}} Ek{\'{a}}rt and Anna Esparcia{-}Alc{\'{a}}zar and Muddassar Farooq and Andreas Fink and Penousal Machado and Jon McCormack and Michael O'Neill and Ferrante Neri and Mike Preuss and Franz Rothlauf and Ernesto Tarantino and Shengxiang Yang}, title = {Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T{\"{u}}bingen, Germany, April 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5484}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01129-0}, doi = {10.1007/978-3-642-01129-0}, isbn = {978-3-642-01128-3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/antsw/SaleemKF08, author = {Muhammad Saleem and Syed Ali Khayam and Muddassar Farooq}, editor = {Marco Dorigo and Mauro Birattari and Christian Blum and Maurice Clerc and Thomas St{\"{u}}tzle and Alan F. T. Winfield}, title = {Formal Modeling of BeeAdHoc: {A} Bio-inspired Mobile Ad Hoc Network Routing Protocol}, booktitle = {Ant Colony Optimization and Swarm Intelligence, 6th International Conference, {ANTS} 2008, Brussels, Belgium, September 22-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5217}, pages = {315--322}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87527-7\_32}, doi = {10.1007/978-3-540-87527-7\_32}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/antsw/SaleemKF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShafiqKF08, author = {M. Zubair Shafiq and Syed Ali Khayam and Muddassar Farooq}, editor = {Diego Zamboni}, title = {Embedded Malware Detection Using Markov n-Grams}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, {DIMVA} 2008, Paris, France, July 10-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5137}, pages = {88--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70542-0\_5}, doi = {10.1007/978-3-540-70542-0\_5}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/ShafiqKF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/ShafiqFK08, author = {M. Zubair Shafiq and Muddassar Farooq and Syed Ali Khayam}, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni Di Caro and Rolf Drechsler and Anik{\'{o}} Ek{\'{a}}rt and Anna Esparcia{-}Alc{\'{a}}zar and Muddassar Farooq and Andreas Fink and Jon McCormack and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Sima Uyar and Shengxiang Yang}, title = {A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection}, booktitle = {Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4974}, pages = {52--61}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78761-7\_6}, doi = {10.1007/978-3-540-78761-7\_6}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/evoW/ShafiqFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MazharF08, author = {Nauman Mazhar and Muddassar Farooq}, editor = {Conor Ryan and Maarten Keijzer}, title = {A sense of danger: dendritic cells inspired artificial immune system for manet security}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {63--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389105}, doi = {10.1145/1389095.1389105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/MazharF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SaleemKF08, author = {Muhammad Saleem and Syed Ali Khayam and Muddassar Farooq}, editor = {Conor Ryan and Maarten Keijzer}, title = {A formal performance modeling framework for bio-inspired ad hoc routing protocols}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {103--110}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389110}, doi = {10.1145/1389095.1389110}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/SaleemKF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ShafiqKF08, author = {M. Zubair Shafiq and Syed Ali Khayam and Muddassar Farooq}, editor = {Conor Ryan and Maarten Keijzer}, title = {Improving accuracy of immune-inspired malware detectors by using intelligent features}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {119--126}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389112}, doi = {10.1145/1389095.1389112}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ShafiqKF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/AwaisFJ08, author = {Aliya Awais and Muddassar Farooq and Muhammad Younus Javed}, editor = {Conor Ryan and Maarten Keijzer}, title = {Attack analysis {\&} bio-inspired security framework for {IP} multimedia subsystem}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {161--162}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389119}, doi = {10.1145/1389095.1389119}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/AwaisFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/AwaisFJ08a, author = {Aliya Awais and Muddassar Farooq and Muhammad Younus Javed}, editor = {Conor Ryan and Maarten Keijzer}, title = {Attack analysis {\&} bio-inspired security framework for IPMultimedia subsystem}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, Companion Material}, pages = {2093--2098}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1388969.1389029}, doi = {10.1145/1388969.1389029}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/AwaisFJ08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/ShahzadZF08, author = {Muhammad Shahzad and Saira Zahid and Muddassar Farooq}, editor = {G{\"{u}}nter Rudolph and Thomas Jansen and Simon M. Lucas and Carlo Poloni and Nicola Beume}, title = {A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols}, booktitle = {Parallel Problem Solving from Nature - {PPSN} X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5199}, pages = {1130--1139}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87700-4\_112}, doi = {10.1007/978-3-540-87700-4\_112}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/ShahzadZF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ncs/FarooqC08, author = {Muddassar Farooq and Gianni A. Di Caro}, editor = {Christian Blum and Daniel Merkle}, title = {Routing Protocols for Next-Generation Networks Inspired by Collective Behaviors of Insect Societies: An Overview}, booktitle = {Swarm Intelligence: Introduction and Applications}, series = {Natural Computing Series}, pages = {101--160}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-74089-6\_4}, doi = {10.1007/978-3-540-74089-6\_4}, timestamp = {Tue, 16 May 2017 14:24:38 +0200}, biburl = {https://dblp.org/rec/series/ncs/FarooqC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2008, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni Di Caro and Rolf Drechsler and Anik{\'{o}} Ek{\'{a}}rt and Anna Esparcia{-}Alc{\'{a}}zar and Muddassar Farooq and Andreas Fink and Jon McCormack and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Sima Uyar and Shengxiang Yang}, title = {Applications of Evolutionary Computing, EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4974}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78761-7}, doi = {10.1007/978-3-540-78761-7}, isbn = {978-3-540-78760-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ZahidSAF07, author = {Saira Zahid and Muhammad Shahzad and Syed Usman Ali and Muddassar Farooq}, title = {A comprehensive formal framework for analyzing the behavior of nature-inspired routing protocols}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2007, 25-28 September 2007, Singapore}, pages = {180--187}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CEC.2007.4424470}, doi = {10.1109/CEC.2007.4424470}, timestamp = {Thu, 16 Dec 2021 14:01:04 +0100}, biburl = {https://dblp.org/rec/conf/cec/ZahidSAF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/SaleemF07, author = {Muhammad Saleem and Muddassar Farooq}, title = {A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2007, 25-28 September 2007, Singapore}, pages = {751--758}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CEC.2007.4424546}, doi = {10.1109/CEC.2007.4424546}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/SaleemF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ShafiqKHF07, author = {M. Zubair Shafiq and Mehrin Kiani and Bisma Hashmi and Muddassar Farooq}, title = {Extended thymus action for improving response of {AIS} based {NID} system against malicious traffic}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2007, 25-28 September 2007, Singapore}, pages = {3369--3376}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CEC.2007.4424907}, doi = {10.1109/CEC.2007.4424907}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/ShafiqKHF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/SaleemF07, author = {Muhammad Saleem and Muddassar Farooq}, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni Di Caro and Rolf Drechsler and Muddassar Farooq and Andreas Fink and Evelyne Lutton and Penousal Machado and Stefan Minner and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Hideyuki Takagi and Sima Uyar and Shengxiang Yang}, title = {BeeSensor: {A} Bee-Inspired Power Aware Routing Protocol for Wireless Sensor Networks}, booktitle = {Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4448}, pages = {81--90}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71805-5\_9}, doi = {10.1007/978-3-540-71805-5\_9}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/evoW/SaleemF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MazharF07, author = {Nauman Mazhar and Muddassar Farooq}, editor = {Hod Lipson}, title = {Vulnerability analysis and security framework (BeeSec) for nature inspired {MANET} routing protocols}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007}, pages = {102--109}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1276958.1276973}, doi = {10.1145/1276958.1276973}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/MazharF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ShafiqKHF07, author = {M. Zubair Shafiq and Mehrin Kiani and Bisma Hashmi and Muddassar Farooq}, editor = {Hod Lipson}, title = {Extended thymus action for reducing false positives in ais based network intrusion detection systems}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings, London, England, UK, July 7-11, 2007}, pages = {182}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1276958.1276996}, doi = {10.1145/1276958.1276996}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ShafiqKHF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/ShafiqF07, author = {M. Zubair Shafiq and Muddassar Farooq}, editor = {Leandro Nunes de Castro and Fernando J. Von Zuben and Helder Knidel}, title = {Defence Against 802.11 DoS Attacks Using Artificial Immune System}, booktitle = {Artificial Immune Systems, 6th International Conference, {ICARIS} 2007, Santos, Brazil, August 26-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4628}, pages = {95--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73922-7\_9}, doi = {10.1007/978-3-540-73922-7\_9}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaris/ShafiqF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/MazharF07, author = {Nauman Mazhar and Muddassar Farooq}, editor = {Leandro Nunes de Castro and Fernando J. Von Zuben and Helder Knidel}, title = {BeeAIS: Artificial Immune System Security for Nature Inspired, {MANET} Routing Protocol, BeeAdHoc}, booktitle = {Artificial Immune Systems, 6th International Conference, {ICARIS} 2007, Santos, Brazil, August 26-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4628}, pages = {370--381}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73922-7\_32}, doi = {10.1007/978-3-540-73922-7\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaris/MazharF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/evoW/2007, editor = {Mario Giacobini and Anthony Brabazon and Stefano Cagnoni and Gianni Di Caro and Rolf Drechsler and Muddassar Farooq and Andreas Fink and Evelyne Lutton and Penousal Machado and Stefan Minner and Michael O'Neill and Juan Romero and Franz Rothlauf and Giovanni Squillero and Hideyuki Takagi and Sima Uyar and Shengxiang Yang}, title = {Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4448}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71805-5}, doi = {10.1007/978-3-540-71805-5}, isbn = {978-3-540-71804-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Farooq2006, author = {Muddassar Farooq}, title = {From the wisdom of the hive to intelligent routing in telecommunication networks: a step towards intelligent network management through natural engineering}, school = {Technical University of Dortmund, Germany}, year = {2006}, url = {http://eldorado.tu-dortmund.de:8080/bitstream/2003/22186/1/Phdthesis.pdf}, urn = {urn:nbn:de:hbz:290-2003/22186-3}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Farooq2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/FarooqM06, author = {Muddassar Farooq and Ronaldo Menezes}, title = {Special issue on nature-inspired applications and systems}, journal = {J. Syst. Archit.}, volume = {52}, number = {8-9}, pages = {441--442}, year = {2006}, url = {https://doi.org/10.1016/j.sysarc.2006.02.004}, doi = {10.1016/J.SYSARC.2006.02.004}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/FarooqM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/WeddeF06, author = {Horst F. Wedde and Muddassar Farooq}, title = {A comprehensive review of nature inspired routing algorithms for fixed telecommunication networks}, journal = {J. Syst. Archit.}, volume = {52}, number = {8-9}, pages = {461--484}, year = {2006}, url = {https://doi.org/10.1016/j.sysarc.2006.02.005}, doi = {10.1016/J.SYSARC.2006.02.005}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/WeddeF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/WeddeTF06, author = {Horst F. Wedde and Constantin Timm and Muddassar Farooq}, editor = {Franz Rothlauf and J{\"{u}}rgen Branke and Stefano Cagnoni and Ernesto Costa and Carlos Cotta and Rolf Drechsler and Evelyne Lutton and Penousal Machado and Jason H. Moore and Juan Romero and George D. Smith and Giovanni Squillero and Hideyuki Takagi}, title = {BeeHiveGuard: {A} Step Towards Secure Nature Inspired Routing Algorithms}, booktitle = {Applications of Evolutionary Computing, EvoWorkshops 2006: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, and EvoSTOC, Budapest, Hungary, April 10-12, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3907}, pages = {243--254}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11732242\_22}, doi = {10.1007/11732242\_22}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/WeddeTF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/WeddeTF06, author = {Horst F. Wedde and Constantin Timm and Muddassar Farooq}, editor = {Thomas Philip Runarsson and Hans{-}Georg Beyer and Edmund K. Burke and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and L. Darrell Whitley and Xin Yao}, title = {BeeHiveAIS: {A} Simple, Efficient, Scalable and Secure Routing Framework Inspired by Artificial Immune Systems}, booktitle = {Parallel Problem Solving from Nature - {PPSN} IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings}, series = {Lecture Notes in Computer Science}, volume = {4193}, pages = {623--632}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844297\_63}, doi = {10.1007/11844297\_63}, timestamp = {Sun, 25 Jul 2021 11:46:24 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/WeddeTF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ki/X05u, author = {Horst F. Wedde and Muddassar Farooq}, title = {BeeHive: Routing Algorithms Inspired by Honey Bee Behavior}, journal = {K{\"{u}}nstliche Intell.}, volume = {19}, number = {4}, pages = {18--24}, year = {2005}, url = {http://www.kuenstliche-intelligenz.de/index.php?id=no-6408\&\#38;tx\_ki\_pi1\%5BshowUid\%5D=1115\&\#38;cHash=2cac07d7f8}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ki/X05u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/WeddeF05, author = {Horst F. Wedde and Muddassar Farooq}, editor = {Franz Rothlauf and J{\"{u}}rgen Branke and Stefano Cagnoni and David W. Corne and Rolf Drechsler and Yaochu Jin and Penousal Machado and Elena Marchiori and Juan Romero and George D. Smith and Giovanni Squillero}, title = {A Performance Evaluation Framework for Nature Inspired Routing Algorithms}, booktitle = {Applications of Evolutionary Computing, EvoWorkshops 2005: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC, Lausanne, Switzerland, March 30 - April 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3449}, pages = {136--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32003-6\_14}, doi = {10.1007/978-3-540-32003-6\_14}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/WeddeF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/WeddeFPVMMJ05, author = {Horst F. Wedde and Muddassar Farooq and Thorsten Pannenbaecker and Bjoern Vogel and Christian Mueller and Johannes Meth and Ren{\'{e}} Jeruschkat}, editor = {Hans{-}Georg Beyer and Una{-}May O'Reilly}, title = {BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings, Washington DC, USA, June 25-29, 2005}, pages = {153--160}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1068009.1068034}, doi = {10.1145/1068009.1068034}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/WeddeFPVMMJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai/WeddeF05, author = {Horst F. Wedde and Muddassar Farooq}, editor = {Hamid R. Arabnia and Rose Joshua}, title = {Nature Centered Information Systems: How Philosophy and Poetry Helps in Designing Technical Systems}, booktitle = {Proceedings of the 2005 International Conference on Artificial Intelligence, {ICAI} 2005, Las Vegas, Nevada, USA, June 27-30, 2005, Volume 2}, pages = {938--943}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icai/WeddeF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swis/WeddeF05, author = {Horst F. Wedde and Muddassar Farooq}, title = {The wisdom of the hive applied to mobile ad-hoc networks}, booktitle = {2005 {IEEE} Swarm Intelligence Symposium, {SIS} 2005, Pasadena, California, USA, June 8-10, 2005}, pages = {341--348}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SIS.2005.1501641}, doi = {10.1109/SIS.2005.1501641}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/swis/WeddeF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/FarooqW05, author = {Muddassar Farooq and Horst F. Wedde}, editor = {Stephan Olariu and Albert Y. Zomaya}, title = {BeeHive}, booktitle = {Handbook of Bioinspired Algorithms and Applications}, publisher = {Chapman and Hall/CRC}, year = {2005}, url = {https://doi.org/10.1201/9781420035063.ch21}, doi = {10.1201/9781420035063.CH21}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/FarooqW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/antsw/WeddeFZ04, author = {Horst F. Wedde and Muddassar Farooq and Yue Zhang}, editor = {Marco Dorigo and Mauro Birattari and Christian Blum and Luca Maria Gambardella and Francesco Mondada and Thomas St{\"{u}}tzle}, title = {BeeHive: An Efficient Fault-Tolerant Routing Algorithm Inspired by Honey Bee Behavior}, booktitle = {Ant Colony Optimization and Swarm Intelligence, 4th International Workshop, {ANTS} 2004, Brussels, Belgium, September 5 - 8, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3172}, pages = {83--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28646-2\_8}, doi = {10.1007/978-3-540-28646-2\_8}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/antsw/WeddeFZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/WeddeFL04, author = {Horst F. Wedde and Muddassar Farooq and Mario Lischka}, editor = {Kalyanmoy Deb and Riccardo Poli and Wolfgang Banzhaf and Hans{-}Georg Beyer and Edmund K. Burke and Paul J. Darwen and Dipankar Dasgupta and Dario Floreano and James A. Foster and Mark Harman and Owen Holland and Pier Luca Lanzi and Lee Spector and Andrea Tettamanzi and Dirk Thierens and Andrew M. Tyrrell}, title = {An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3103}, pages = {1334--1335}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24855-2\_153}, doi = {10.1007/978-3-540-24855-2\_153}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/WeddeFL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai/WeddeFL04, author = {Horst F. Wedde and Muddassar Farooq and Mario Lischka}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {A User Centered Evolutionary Scheduling Framework}, booktitle = {Proceedings of the International Conference on Artificial Intelligence, {IC-AI} '04, Volume 2 {\&} Proceedings of the International Conference on Machine Learning; Models, Technologies {\&} Applications, {MLMTA} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {1126--1132}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icai/WeddeFL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip3-1/WeddeBF02, author = {Horst F. Wedde and Frank Thorsten Breuer and Muddassar Farooq}, editor = {Tom J. van Weert and Robert Munro}, title = {A Role-Based Adaptive {CSCL} Environment for Intensive Hands-on Teaching and Learning under Rigid Time Constraints}, booktitle = {Informatics and The Digital Society: Social, Ethical and Cognitive Issues, {IFIP} TC3/WG3.1{\&}3.2 Open Conference on Social, Ethical and Cognitive Issues on Informatics and ICT, July 22-26, 2002, Dortmund, Germany}, series = {{IFIP} Conference Proceedings}, volume = {244}, pages = {241--250}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip3-1/WeddeBF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.