Follow
Md Hasan Furhad
Md Hasan Furhad
Senior Cyber security Advisor
Verified email at deloitte.com.au
Title
Cited by
Cited by
Year
Ai-driven cybersecurity: an overview, security intelligence modeling and research directions
IH Sarker, MH Furhad, R Nowrozy
SN Computer Science 2 (3), 173, 2021
2822021
A Data-Driven Heart Disease Prediction Model Through K-Means Clustering-Based Anomaly Detection
RC Ripan, IH Sarker, SMM Hossain, MM Anwar, R Nowrozy, MM Hoque, ...
SN Computer Science 2 (2), 112, 2021
442021
Restoring atmospheric-turbulence-degraded images
MH Furhad, M Tahtali, A Lambert
Applied optics 55 (19), 5082-5090, 2016
412016
A shortly connected mesh topology for high performance and energy efficient network-on-chip architectures
MH Furhad, JM Kim
The Journal of Supercomputing 69, 766-792, 2014
172014
An isolation forest learning based outlier detection approach for effectively classifying cyber anomalies
RC Ripan, IH Sarker, MM Anwar, MH Furhad, F Rahat, MM Hoque, ...
Hybrid Intelligent Systems: 20th International Conference on Hybrid …, 2021
152021
An analysis of reducing communication delay in network-on-chip interconnect architecture
H Furhad, MA Haque, CH Kim, JM Kim
Wireless Personal Communications 73, 1403-1419, 2013
132013
An extended diagonal mesh topology for network-on-chip architectures
MH Furhad, JM Kim
International Journal of Multimedia and Ubiquitous Engineering 10 (10), 197-210, 2015
122015
Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot
SMZU Rashid, A Haq, ST Hasan, MH Furhad, M Ahmed, AB Ullah
Wireless Networks, 1-15, 2022
92022
A new audio watermarking method based on discrete cosine transform with a gray image
MI Khan, MIH Sarker, K Deb, MH Furhad
AIRCC's International Journal of Computer Science and Information Technology …, 2012
72012
Ai-driven cybersecurity: An overview, security intelligence modeling and research directions, SN Comput. Sci., 2 (2021), 1–18
IH Sarker, MH Furhad, R Nowrozy
7
AI-driven cyber security: an overview, security intelligence modelling and research directions. SN Comput Sci 2 (3)
IH Sarker, MH Furhad, R Nowrozy
62021
Nowrozy Ra (2021) AI-driven cybersecurity: an overview, security intelligence modeling, and research directions
IH Sarker, M Hasan Furhad
SN Comput Sci 2 (3), 1-18, 0
6
An effective heart disease prediction model based on machine learning techniques
RC Ripan, IH Sarker, M Hasan Furhad, M Musfique Anwar, MM Hoque
International Conference on Hybrid Intelligent Systems, 280-288, 2020
42020
E-miim: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management
IH Sarker, ASM Kayes, MH Furhad, MM Islam, MS Islam
AI & SOCIETY 35 (2), 459-467, 2020
42020
Predicting diabetes mellitus and analysing risk-factors correlation
MF Faruque, A Asaduzzaman, SMM Hossain, MH Furhad, IH Sarker
EAI Endorsed Transactions on Pervasive Health and Technology 5 (20), e7-e7, 2019
42019
A hybrid framework for detecting structured query language injection attacks in web-based applications
MH Furhad, RK Chakrabortty, MJ Ryan, J Uddin, IH Sarker
International Journal of Electrical and Computer Engineering 12 (5), 5405, 2022
32022
Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape
SMZU Rashid, A Haq, ST Hasan, MH Furhad, M Ahmed, ...
International Conference on Cognitive Radio Oriented Wireless Networks, 307-324, 2021
32021
Industrial Fault Diagnosis using Hilbert Transform and Texture Features
M Zabin, HJ Choi, J Uddin, MH Furhad, AB Ullah
2021 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2021
32021
Surrogate approximation on bilevel multi follower optimization problems
MM Islam, AB Ullah, MH Furhad, S Nazah
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1663-1671, 2020
22020
Object detection from images obtained through underwater turbulence medium
MH Furhad, M Tahtali, A Lambert
Unconventional and Indirect Imaging, Image Reconstruction, and Wavefront …, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20