Mohammad Masud

Associate Professor

Calculated based on number of publications stored in Pure and citations from Scopus
20062023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2012

    Cloud guided stream classification using class-based ensemble

    Al-Khateeb, T. M., Masud, M. M., Khan, L. & Thuraisingham, B., 2012, Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012. p. 694-701 8 p. 6253568. (Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Design and implementation of a data mining system for malware detection

    Thuraisingham, B., Al-Khatib, T., Khan, L., Masud, M., Hamlen, K., Khadilkar, V. & Abrol, S., 2012, In: Journal of Integrated Design and Process Science. 16, 2, p. 33-49 17 p.

    Research output: Contribution to journalArticlepeer-review

  • Facing the reality of data stream classification: Coping with scarcity of labeled data

    Masud, M. M., Woolam, C., Gao, J., Khan, L., Han, J., Hamlen, K. W. & Oza, N. C., Oct 2012, In: Knowledge and Information Systems. 33, 1, p. 213-244 32 p.

    Research output: Contribution to journalArticlepeer-review

    86 Citations (Scopus)
  • Stream classification with recurring and novel class detection using class-based ensemble

    Al-Khateeb, T., Masud, M. M., Khan, L., Aggarwal, C., Han, J. & Thuraisingham, B., 2012, Proceedings - 12th IEEE International Conference on Data Mining, ICDM 2012. p. 31-40 10 p. 6413716. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Citations (Scopus)
  • 2011

    Classification and novel class detection in concept-drifting data streams under time constraints

    Masud, M., Gao, J., Khan, L., Han, J. & Thuraisingham, B. M., 2011, In: IEEE Transactions on Knowledge and Data Engineering. 23, 6, p. 859-874 16 p., 5453372.

    Research output: Contribution to journalArticlepeer-review

    312 Citations (Scopus)
  • Cloud-based malware detection for evolving data streams

    Masud, M. M., Al-Khateeb, T. M., Hamlen, K. W., Gao, J., Khan, L., Han, J. & Thuraisingham, B., Oct 2011, In: ACM Transactions on Management Information Systems. 2, 3, 16.

    Research output: Contribution to journalArticlepeer-review

    55 Citations (Scopus)
  • Detecting recurring and novel classes in concept-drifting data streams

    Masud, M. M., Al-Khateeb, T. M., Khan, L., Aggarwal, C., Gao, J., Han, J. & Thuraisingham, B., 2011, Proceedings - 11th IEEE International Conference on Data Mining, ICDM 2011. p. 1176-1181 6 p. 6137334. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    60 Citations (Scopus)
  • Heuristics-based query processing for large RDF graphs using cloud computing

    Husain, M. F., McGlothlin, J., Masud, M. M., Khan, L. R. & Thuraisingham, B., 2011, In: IEEE Transactions on Knowledge and Data Engineering. 23, 9, p. 1312-1327 16 p., 5765957.

    Research output: Contribution to journalArticlepeer-review

    163 Citations (Scopus)
  • On-line anomaly detection based on relative entropy

    Altaher, A., Ramadass, S., Thuraisingham, B. & Mehedy, M., 2011, Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011. p. 33-36 4 p. 6155890. (Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Preface

    Khan, L., Pechenizkiy, M., Zliobaite, I., Agrawal, C., Bifet, A., Delany, S. J., Dries, A., Fan, W., Gabrys, B., Gama, J., Gao, J., Gopalkrishnan, V., Holmes, G., Katakis, I., Kuncheva, L., Van Leeuwen, M., Masud, M., Menasalvas, E., Minku, L., Pfahringer, B., & 4 othersPolikar, R., Rodrigues, P. P., Tsoumakas, G. & Tsymbal, A., 2011, In: Proceedings - IEEE International Conference on Data Mining, ICDM. p. xxxvi-xxxvii 6137545.

    Research output: Contribution to journalEditorialpeer-review

  • 2010

    Addressing concept-evolution in concept-drifting data streams

    Masud, M. M., Chen, Q., Khan, L., Aggarwal, C., Gao, J., Han, J. & Thuraisingham, B., 2010, Proceedings - 10th IEEE International Conference on Data Mining, ICDM 2010. p. 929-934 6 p. 5694063. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Citations (Scopus)
  • Classification and novel class detection in data streams with active mining

    Masud, M. M., Gao, J., Khan, L., Han, J. & Thuraisingham, B., 2010, Advances in Knowledge Discovery and Data Mining - 14th Pacific-Asia Conference, PAKDD 2010, Proceedings. PART 2 ed. p. 311-324 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6119 LNAI, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)
  • Classification and novel class detection of data streams in a dynamic feature space

    Masud, M. M., Chen, Q., Gao, J., Khan, L., Han, J. & Thuraisingham, B., 2010, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2010, Proceedings. PART 2 ed. p. 337-352 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6322 LNAI, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • 2009

    A multi-partition multi-chunk ensemble technique to classify concept-drifting data streams

    Masud, M. M., Gao, J., Khan, L., Han, J. & Thuraisingham, B., 2009, 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2009. p. 363-375 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5476 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Citations (Scopus)
  • Email worm detection using data mining

    Masud, M. M., Khan, L. & Thuraisingham, B., 2009, Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. IGI Global, p. 20-34 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Exploiting an antivirus interface

    Hamlen, K. W., Mohan, V., Masud, M. M., Khan, L. & Thuraisingham, B., Nov 2009, In: Computer Standards and Interfaces. 31, 6, p. 1182-1189 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    27 Citations (Scopus)
  • Integrating novel class detection with classification for concept-drifting data streams

    Masud, M. M., Gao, J., Khan, L., Han, J. & Thuraisingham, B., 2009, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2009, Proceedings. PART 2 ed. Springer Verlag, p. 79-94 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5782 LNAI, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)
  • Lacking labels in the stream: Classifying evolving stream data with few labels

    Woolam, C., Masud, M. M. & Khan, L., 2009, Foundations of Intelligent Systems - 18th International Symposium, ISMIS 2009, Proceedings. p. 552-562 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5722 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • 2008

    A practical approach to classify evolving data streams: Training with limited amount of labeled data

    Masud, M. M., Gao, J., Khan, L., Han, J. & Thuraisingham, B., 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 929-934 6 p. 4781203. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    127 Citations (Scopus)
  • A scalable multi-level feature extraction technique to detect malicious executables

    Masud, M. M., Khan, L. & Thuraisingham, B., Mar 2008, In: Information Systems Frontiers. 10, 1, p. 33-45 13 p.

    Research output: Contribution to journalArticlepeer-review

    64 Citations (Scopus)
  • Data mining for security applications

    Thuraisingham, B., Khan, L., Masud, M. M. & Hamlen, K. W., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 585-589 5 p. 4755289. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Detecting remote exploits ising data mining

    Masud, M., Khan, L., Thuraisingham, B., Wang, X., Liu, P. & Zhu, S., 2008, Advances in Digital Forensics IV. Cuenca, P., Guerrero, C., Puigjaner, R. & Serra, B. (eds.). p. 177-189 13 p. (IFIP International Federation for Information Processing; vol. 285).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    7 Citations (Scopus)
  • Flow-based identification of botnet traffic by mining multiple log files

    Masud, M. M., Al-khaleeb, T., Khan, L., Thuraisinghatn, B. & Hamlcn, K. W., 2008, 2008 1st International Conference on Distributed Frameworks and Application, DFmA 2008. p. 200-206 7 p. 4784437. (2008 1st International Conference on Distributed Frameworks and Application, DFmA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Citations (Scopus)
  • Peer to peer botnet detection for cyber-security: A data mining approach

    Khan, L., Masud, M. M., Gao, J., Han, J. & Thuraisingham, B., 2008, CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. a39. (CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • 2007

    A hybrid model to detect malicious executables

    Masud, M. M., Khan, L. & Thuraisingham, B., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1443-1448 6 p. 4288913. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Citations (Scopus)
  • E-Mail Worm Detection Using Data Mining

    Masud, M. M., Khan, L. & Thuraisingham, B., Oct 2007, In: International Journal of Information Security and Privacy (IJISP). 1, 4, p. 47-61 15 p.

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)
  • Feature based techniques for auto-detection of novel email worms

    Masud, M. M., Khan, L. & Thuraisingham, B., 2007, Advances in Knowledge Discovery and Data Mining - 11th Pacific-Asia Conference, PAKDD 2007, Proceedings. Springer Verlag, p. 205-216 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2006

    Email worm detection using naïve bayes and support vector machine

    Masud, M. M., Khan, L. & Al-Shaer, E., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer Verlag, p. 733-734 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)