Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Publications: Kaosar, Mohammed

Stats for Kaosar, Mohammed
Export as [feed] RSS
Group by: Item Type | Year
Number of items: 53.

Journal Article

Hussain, S., Sajid Ullah, S., Shorfuzzaman, M., Uddin, M. and Kaosar, M. (2021) Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things. Intelligent Automation & Soft Computing, 30 (3). pp. 983-993.

Makhdoom, I., Hayawi, K., Kaosar, M., Mathew, S.S. and Ho, P-H (2021) D2Gen: A decentralized device genome based integrity verification mechanism for collaborative intrusion detection systems. IEEE Access, 9 . pp. 137260-137280.

Sharif, H., Haroon, K.M., Paracha, Z.J., Kaosar, M. and Javed, H. (2020) Identification of low frequency oscillation disturbance with the help of phasor measurement unit. Solid State Technology, 63 (1 Supp.).

Kaosar, M. and Yi, X. (2020) Privacy preserving participatory sensor network on named data networking infrastructure. International Journal of Wireless & Mobile Networks, 12 (1).

Sharif, H., Oo, A.M.T., Haroon, K.M. and Kaosar, M. (2020) Protection of interconnected transmission network using phasor measurement unit scheme. International Research Journal of Engineering and Technology, 7 (8). pp. 4303-4308.

Haroon, K.M., Sharif, H., Kaosar, M. and Javed, H. (2020) A review on different algorithms and methods used for neural spike detection. International Research Journal of Engineering and Technology (IRJET), 7 (8). pp. 4098-4104.

Sharif, H., Oo, A.M.T., Haroon, K.M. and Kaosar, M. (2020) A review on various Smart Grid Technologies used in Power System. International Research Journal of Engineering and Technology, 7 (8). pp. 4091-4097.

Trang, C., Ahmed, R. and Kaosar, M.G. (2019) Liquid water film on the outer surface of a half-submerged rotating drum. Journal of Plastic Film & Sheeting, 35 (3). pp. 281-294.

Binajjaj, A., Sheltami, T., Aliyu, F. and Kaosar, M. (2018) Design and implementation of a wearable gas sensor network for oil and gas industry workers. Journal of Computers, 13 (3). pp. 300-308.

Albugami, S., Arief, B. and Kaosar, M. (2018) Privacy statement regulating based on user preferences using document mining. International Journal of Security, Privacy and Trust Management (IJSPTM) .

Alabdulatif, A. and Kaosar, M. (2016) Privacy preserving cloud computation using Domingo-Ferrer scheme. Journal of King Saud University - Computer and Information Sciences, 28 (1). pp. 27-36.

Mamun, Q., Islam, R. and Kaosar, M. (2014) Anomaly detection in wireless sensor networks. Journal of Networks, 9 (11). pp. 2914-2924.

Kaosar, M. and Mamun, Q. (2014) Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption. Journal of Information Privacy and Security, 10 (1). pp. 44-52.

Paulet, R., Kaosar, M.G., Yi, X. and Bertino, E. (2014) Privacy-Preserving and Content-Protecting Location Based Queries. IEEE Transactions on Knowledge and Data Engineering, 26 (5). pp. 1200-1210.

Yi, X., Kaosar, M.G., Paulet, R. and Bertino, E. (2013) Single-Database private information retrieval from fully homomorphic encryption. IEEE Transactions on Knowledge and Data Engineering, 25 (5). pp. 1125-1134.

Kaosar, M.G., Paulet, R. and Yi, X. (2012) Fully homomorphic encryption based two-party association rule mining. Data & Knowledge Engineering, 76-78 . pp. 1-15.

Kaosar, M.G. and Yi, X. (2011) Secure Two-Party association rule mining based on One-Pass FP-Tree. International Journal of Information Security and Privacy, 5 (2). pp. 13-32.

Kaosar, M.G. and Yi, X. (2010) Semi-Trusted mixer based privacy preserving distributed data mining for resource constrained devices. International Journal of Computer Science and Information Security,, 8 (1). pp. 44-51.

Kaosar, M.G. and Yi, X. (2009) Privacy preserving association rule mining in ubiquitous computing environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933.

Kaosar, M.G. and Sheltami, T.R. (2009) Voice transmission over ad hoc network adapting optimum approaches to maximize the performance. Computer Communications, 32 (4). pp. 634-639.

Sheltami, T.R. and Kaosar, M.G. (2006) Improved caching mechanism for Ad-hoc Network Routing Protocol. PCTE Journal of Computer Sciences, 2 (2).

Kaosar, M.G. (2006) Shortest and simplest solutions for N-Queen problem. PCTE Journal of Computer Science, 2 (2).

Kaosar, M.G. (2005) Finding multiple solutions from a single solution of N-queen problem. PCTE Journal of Computer Sciences, 1 (2).

Conference Paper

Makhdoom, L., Hayawi, K., Kaosar, M., Mathew, S. and Masud, M. (2021) Blockchain-based Secure CIDS Operation. In: 5th Cyber Security in Networking Conference (CSNet 2021), 12 - 14 October 2014, Abu Dhabi, UAE

Shahraki, A., Abbasi, M., Taherkordi, A. and Kaosar, M. (2021) Internet traffic classification using an ensemble of deep convolutional neural networks. In: 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility (Part of SIGCOMM '21), 23 August 2021, Virtual pp. 38-43.

Magomelo, M. and Kaosar, M. (2020) Security and privacy preserving in precision agriculture. In: 2nd African International Conference on Industrial Engineering and Operations Management, 7 - 10 December 2020, Harare, Zimbabwe

Chimeura, T. and Kaosar, M. (2020) User identity preservation and data protection in the Internet of Things. In: 2nd African International Conference on Industrial Engineering and Operations Management, 7 - 10 December 2020, Harare, Zimbabwe

Al-Bugami, S., Arif, B. and Kaosar, M. (2015) Shaping and regulating privacy statements to increase customer satisfaction. In: Customer Service in the Public Sector Conference, 17 - 19 November 2015, The Saudi Ministry of Civil Service, Saudi Arabia

Alhamid, A., Al-Khaldi, K. and Kaosar, M. (2015) Smart home base safe playground for kids. In: Playground Conference KSU, 13 July 2015, Ryadh, KSA

Kaosar, M.G. (2014) Backtracking based integer factorisation, primality testing and square root calculation. In: CCSIT 2014 : The Fourth International Conference on Computer Science and Information Technology, 21 - 22 February 2014, Sydney, Australia

Rabbi, K., Islam, R., Mamun, Q. and Kaosar, M.G. (2014) MTTG: An efficient technique for test data generation. In: The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), 18 - 20 Dec. 2014, Dhaka, Bangladesh

Mamun, Q. and Kaosar, M. (2014) What is the first step in designing an application protocol for wireless sensor networks (WSNs)? In: IEEE Sensors Applications Symposium (SAS) 2014, 18 - 20 February 2014, Queenstown, New Zealand

Mandal, A.K., Kaosar, M., Islam, M.O. and Hossain, M.D. (2014) An approach for enhancing message security in audio steganography. In: 16th International Conference on Computer and Information Technology, 8 - 10 March 2014, Khulna, Bangladesh

Mamun, Q., Islam, R. and Kaosar, M. (2013) Establishing secured communications in cluster based wireless sensor networks. In: International Symposium on Wireless and pervasive Computing (ISWPC) 2013, 20 - 22 November 2013, Taipei, Taiwan

Begum, M., Mamun, Q. and Kaosar, M. (2013) A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System. In: 2nd Australian eHealth Informatics and Security Conference, 2 - 4 December 2013, Edith Cowan University, WA

Kaosar, M.G., Paulet, R. and Yi, X. (2011) Secure two-party association rule mining. In: 9th Australasian Information Security Conference (AISC '11), 17 - 20 January 2011, Perth, Australia

Paulett, R., Kaosar, M.G. and Yi, X. (2011) k-Anonymous private query based on blind signature and oblivious transfer. In: 2nd International Cyber Resilience Conference, 1 - 2 August 2011, The Duxton Hotel, Perth

Kaosar, M.G., Xu, Z. and Yi, X. (2009) Distributed association rule mining with minimum communication payload. In: The 8th Australasian Data Mining Conference (AusDM 2009), 1 - 4 December 2009, Melbourne, Australia

Kaosar, M.G., Sheltami, T.R. and Mahmoud, A.S.H. (2007) Delay and Power Efficient Voice Transmission over MANET. In: IEEE International Conference on Communications 2007, 24 - 28 June 2007, Glasgow, UK

Kaosar, M.G. and Sheltami, T.R. (2006) Effect of voice transmission over MANET using energy aware cluster based routing protocol. In: TSSA and WSSA 2006, 8 - 9 December 2006, Bandung, Indonesia

Kaosar, M.G., Hasif, A.M., Sheltami, T.R. and Mahmoud, A.S.H. (2006) Simulation study of delay analysis for voice transmission over MANET. In: 1st IEEE International Conference on Information and Industrial Systems (ICIIS) 2006, 8 - 11 August 2006, Peradeniya, Sri Lanka

Kaosar, M.G. (2005) Finding multiple solutions from a single solution of N-Queen Problem. In: International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 12 November 2005, Ludhiana, Punjab, India

Kaosar, M.G. (2005) Primality Test – An Enhanced Method. In: International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 12 November 2005, Ludhiana, Punjab, India

Kaosar, M.G. (2005) Solving the N-Queen Problem Using Direct Placement Method. In: International Conference On Intelligent Systems (ICIS 2005), 1 - 3 December 2005, Kuala Lumpur, Malaysia

Hassan, M.M., Islam, S.M.S. and Kaosar, M.G. (2005) ”Virtual Ear”: A centre based visual clustering approach. In: International Conference On Intelligent Systems (ICIS 2005), 1 - 3 December 2005, Kuala Lumpur, Malaysia

Kaosar, M.G., Shorfuzzaman, M. and Ahmed, S. (2004) A novel approach to solving N-queens problem. In: 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), 18 - 21 July 2004, Orlando, FL

Conference Item

Kaosar, M.G. and Asif, H.M. (2005) Comparative Study of Two MANET Routing Protocols DSR and TORA Using OPNET. In: 2nd CIIT Workshop on Research in Computing, 18 November 2005, Lahore, Pakistan.

Book Chapter

Rabbi, K., Kaosar, M., Islam, M.R. and Mamun, Q. (2014) A secure real time data processing framework for Personally Controlled Electronic Health Record (PCEHR) System. In: Tian, J., Jing, J. and Srivatsa, M., (eds.) SecureComm 2014: International Conference on Security and Privacy in Communication Networks. Springer, Cham, pp. 141-156.

Mamun, Q., Islam, R. and Kaosar, M. (2013) Ensuring data integrity by anomaly node detection during Data Gathering in WSNs. In: Zia, T., Zomaya, A., Varadharajan, V. and Mao, M., (eds.) Security and Privacy in Communication Networks. Springer, Cham, pp. 367-379.

Kaosar, M.G. and Yi, X. (2013) Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree. In: Nemati, H., (ed.) Privacy Solutions and Security Frameworks in Information Protection. IGI Global, pp. 82-102.

Kaosar, M., Mamun, Q., Islam, R. and Yi, X. (2013) (k − n) Oblivious Transfer Using Fully Homomorphic Encryption System. In: Zia, T., Zomaya, A., Varadharajan, V. and Mao, M., (eds.) Security and Privacy in Communication Networks. Springer, Cham, pp. 380-392.

Kaosar, M.G., Paulet, R. and Yi, X. (2011) Optimized two party privacy preserving association rule mining using fully homomorphic encryption. In: Xiang, Y., Cuzzocrea, A., Hobbs, M. and Zhou, W., (eds.) ICA3PP 2011: Algorithms and Architectures for Parallel Processing. Springer, Berlin, Heidelberg, pp. 360-370.

Kaosar, M.G. and Yi, X. (2011) Privacy Preserving Data Gathering in Wireless Sensor Network. In: Kar, D.C. and Syed, R., (eds.) Network Security, Administration and Management. IGI Global, pp. 237-251.

This list was generated on Sat Dec 4 13:56:35 2021 UTC.