Biju Issac

Accepting PhD Students

PhD projects

There are projects available in Cybersecurity (Wireless or Wired Security); Internet of Things (IoT); Applications of Artificial Intelligence - Spam Detection, Intelligent Data or Text mining using machine learning, and Intrusion Detection or Response System using machine learning; Secure Electronic Voting; Image Processing; and E-learning/M-learning.

NOTE: PhD queries from good potential students from the above or related areas are welcome.

  • 594
    Citations
If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    Android Malware Classification and Optimisation Based on BM25 Score of Android API

    Yumlembam, R., Issac, B., Yang, L. & Jacob, S. M., 14 Feb 2023, (Accepted/In press) Proceedings of the Seventh IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec 2023): In conjunction with IEEE International Conference on Computer Communications, INFOCOM 2023 (INFOCOM WKSHPS). Piscataway, US: IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    9 Downloads (Pure)
  • 2022

    A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization

    Neera, J., Chen, X., Aslam, N., Issac, B. & O'Brien, E., 11 Jul 2022, Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022). Setúbal, Portugal: Scitepress, p. 325-332 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    20 Downloads (Pure)
  • An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection

    Rafiq, H., Aslam, N., Issac, B. & Randhawa, R. H., 2 May 2022, IEEE INFOCOM 2022: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Piscataway, US: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    1 Citation (Scopus)
    109 Downloads (Pure)
  • On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features

    Rafiq, H., Aslam, N., Issac, B. & Randhawa, R. H., 2 Dec 2022, 2022 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). Piscataway, US: IEEE, p. 216-221 6 p. (International Conference on Software, Knowledge Information, Industrial Management and Applications (SKIMA)).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms

    Pye, J., Issac, B., Aslam, N. & Rafiq, H., Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2020. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (eds.). Piscataway: IEEE, p. 1777-1882 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    3 Citations (Scopus)
    166 Downloads (Pure)
  • Detection of Hate Tweets using Machine Learning and Deep Learning

    Ketsbaia, L., Issac, B. & Chen, X., Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom): 29 December 2020 – 1 January 2021 Guangzhou, China. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (eds.). Piscataway, NJ: IEEE, p. 751-758 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    7 Citations (Scopus)
    298 Downloads (Pure)
  • Phishing Web Page Detection using Optimised Machine Learning

    Stobbs, J., Issac, B. & Jacob, S. M., Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom): 29 December 2020 – 1 January 2021 Guangzhou, China. Wang, G., Ko, R., Bhuiyan, M. Z. A. & Pan, Y. (eds.). Piscataway, NJ: IEEE, p. 483-490 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    4 Citations (Scopus)
    46 Downloads (Pure)
  • 2018

    Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation

    Mistry, K., Issac, B., Jacob, S. M., Jasekar, J. & Zhang, L., 20 Dec 2018, 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2017

    Cancelable iris Biometrics based on data hiding schemes

    Choudhury, B., Then, P., Raman, V., Issac, B. & Haldar, M. K., 9 Jan 2017, Proceedings - 14th IEEE Student Conference on Research and Development: Advancing Technology for Humanity, SCOReD 2016. IEEE, 7810049

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • 2016

    Evaluation of antenna performance for use in wide band wireless protocols

    Mathew, K., Issac, B. & Eng, T. C., 6 Oct 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC). IEEE, p. 54-61 8 p. 7581467

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • PIRIDS: A model on intrusion response system based on biologically inspired response mechanism in plants

    Sharma, R. K., Kalita, H. K. & Issac, B., 1 Jan 2016, Innovations in Bio-Inspired Computing and Applications: Proceedings of the 6th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2015). Snášel, V., Abraham, A., Krömer, P., Pant, M. & Kamilah Muda, A. (eds.). Springer, p. 105-116 12 p. (Advances in Intelligent Systems and Computing; vol. 424).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2015

    Performance analysis of RTS/CTS protocol over basic access in wireless networks: Study of protocol impact on performance in wireless networks

    Mathew, K., Issac, B. & Eng, T. C., 8 Dec 2015, 2015 9th International Conference on IT in Asia: Transforming Big Data into Knowledge, CITA 2015 - Proceedings. IEEE, 7349824

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2014

    A communication architecture using low frequency signals

    Mathew, K., Issac, B. & Eng, T. C., 4 Dec 2014, Proceedings - 2014 International Conference on Data Science and Engineering, ICDSE 2014. IEEE, p. 188-193 6 p. 6974635

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Different firewall techniques: A survey

    Sharma, R. K., Kalita, H. K. & Issac, B., 20 Nov 2014, 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014. IEEE, 6963102

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Citations (Scopus)
  • Wireless network architecture using sound for ubiquitous signal transmission

    Mathew, K., Issac, B. & Eng, T. C., 20 Nov 2014, 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014. IEEE, 6 p. 6963031

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Ambient noise analysis on sound for use in wireless digital transmission

    Mathew, K., Issac, B. & Eng, T. C., 21 Oct 2013, 2013 8th International Conference on Information Technology in Asia - Smart Devices Trend: Technologising Future Lifestyle, Proceedings of CITA 2013. IEEE, 4 p. 6637559

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    3 Citations (Scopus)
    7 Downloads (Pure)
  • Intelligent Corporate Sustainability report scoring solution using machine learning approach to text categorization

    Shahi, A. M., Issac, B. & Modapothala, J. R., 11 Jan 2013, 2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, STUDENT 2012 - Conference Booklet. IEEE, p. 227-232 6 p. 6408409

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • 2012

    Analysis of image steganography techniques in secure online voting

    Rura, L., Issac, B. & Haldar, M. K., 12 Apr 2012, Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011. IEEE, Vol. 1. p. 120-124 5 p. 6181922

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Analysis of supervised text classification algorithms on corporate sustainability reports

    Shahi, A. M., Issac, B. & Modapothala, J. R., 12 Apr 2012, Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011. IEEE, Vol. 1. p. 96-100 5 p. 6181917

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • Enhanced intelligent text categorization using concise keyword analysis

    Shahi, A. M., Issac, B. & Modapothala, J. R., 12 Jul 2012, ICIMTR 2012 - 2012 International Conference on Innovation, Management and Technology Research. IEEE, p. 574-579 6 p. 6236461

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Intelligent spam classification for mobile text message

    Mathew, K. & Issac, B., 12 Apr 2012, Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011. IEEE, Vol. 1. p. 101-105 5 p. 6181918

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Citations (Scopus)
  • Online voting verification with cryptography and steganography approaches

    Rura, L., Issac, B. & Haldar, M. K., 12 Apr 2012, Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011. IEEE, Vol. 1. p. 125-129 5 p. 6181923

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • 2011

    Analysis of handoff mechanisms in mobile IP

    Jayaraj, M. N. S., Issac, B. & Haldar, M. K., 16 Aug 2011, Proceedings of the Fourth Global Conference on Power Control and Optimization. American Institute of Physics, Vol. 1337. p. 160-165 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure electronic voting system based on image steganography

    Rura, L., Issac, B. & Haldar, M. K., 15 Nov 2011, 2011 IEEE Conference on Open Systems, ICOS 2011. IEEE, p. 86-91 6 p. 6079268

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • 2010

    Appraising the corporate sustainability reports - Text mining and multi-discriminatory analysis

    Modapothala, J. R., Issac, B. & Jayamani, E., 1 Jun 2010, Innovations in Computing Sciences and Software Engineering. Sobh, T. & Elleithy, K. (eds.). Springer, p. 489-494 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Citations (Scopus)
  • Effects of online MCQ tests on student learning

    Issac, B. & Jacob, S. M., 4 Mar 2010, Technological Developments in Education and Automation. Iskander, M., Kapila, V. & Karim, M. A. (eds.). Springer, p. 403-408 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • First level text prediction using data mining and letter matching in IEEE 802.11 mobile devices

    Issac, B., 1 Dec 2010, Innovations and Advances in Computer Sciences and Engineering. Springer, p. 319-324 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Implementing spam detection using bayesian and porter stemmer keyword stripping approaches

    Issac, B. & Jap, W. J., 22 Jan 2010, TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 5396056

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Citations (Scopus)
  • Study of UMTS handover scenarios

    Issac, B., 1 Dec 2010, Technological Developments in Networking, Education and Automation. Springer, p. 561-566 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Analysis, design and implementation of a web-based payroll application software

    Then, H. J., Issac, B., Chung, L. T., Wongso, S., Bong, R., Lu, L. & Ling, Y. P., 28 Dec 2009, ICCTD 2009 - 2009 International Conference on Computer Technology and Development. IEEE, Vol. 1. p. 107-111 5 p. 5359891

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Evaluation of corporate environmental reports using data mining approach

    Modapothala, J. R. & Issac, B., 2 Feb 2009, Proceedings - 2009 International Conference on Computer Engineering and Technology, ICCET 2009. IEEE, Vol. 2. p. 543-547 5 p. 4769662

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • Improved bayesian anti-spam filter - Implementation and analysis on independent spam corpuses

    Issac, B., Jap, W. U. & Sutanto, J. H., 2 Feb 2009, 2009 International Conference on Computer Engineering and Technology. Vol. 2. p. 326-330 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Citations (Scopus)
  • Predictive mobility management with delay optimizations in 802.11 infrastructure networks

    Issac, B., Hamid, K. A. & Tan, C. E., 25 Sep 2009, Trends in Communication Technologies and Engineering Science. Wai, P-K. A., Huang, X. & Ao, S-I. (eds.). Springer, p. 67-80 14 p. (Lecture Notes in Electrical Engineering; vol. 33 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Study of 802.11 network performance and wireless multicasting

    Issac, B., 2 Feb 2009, Proceedings - 2009 International Conference on Computer Engineering and Technology, ICCET 2009. IEEE, p. 414-418 5 p. 4769499

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Study of economic, environmental and social factors in sustainability reports using text mining and Bayesian analysis

    Modapothala, J. R. & Issac, B., 18 Dec 2009, 2009 IEEE Symposium on Industrial Electronics and Applications, ISIEA 2009 - Proceedings. IEEE, p. 209-214 6 p. 5356467

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • Study of mixed mode scenarios with IEEE 802.11 networks and Bluetooth network

    Issac, B., 18 Dec 2009, 2009 IEEE Symposium on Industrial Electronics and Applications, ISIEA 2009 - Proceedings. IEEE, p. 319-324 6 p. 5356454

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2007

    Analysis of IPv6 network communication using simulation

    Chen, E., Thiam, T. H., Issac, B. & Nguan, T. H., 8 Oct 2007, SCOReD 2006 - Proceedings of 2006 4th Student Conference on Research and Development "Towards Enhancing Research Excellence in the Region". IEEE, p. 11-15 5 p. 4339298

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Analysis of network communication attacks

    Kamal, S. & Issac, B., 11 Dec 2007, 2007 5th Student Conference on Research and Development, SCORED. IEEE, 4451370

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Pre-authenticated and adaptive IP mobility for WLAN nodes

    Issac, B., Hamid, K. A. & Tan, C. E., 29 Jan 2007, Proceedings of DFMA 2006 - 2nd International Conference on Distributed Frameworks for Multimedia Applications. IEEE, p. 88-95 8 p. 4077725

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Secure transport protocols for DDoS attack resistant communication

    Ghavidel, A. Z. & Issac, B., 11 Dec 2007, 2007 5th Student Conference on Research and Development, SCORED. IEEE, 4451371

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Spam detection proposal in regular and text-based image emails

    Issac, B. & Raman, V., 10 Apr 2007, 2006 IEEE Region 10 Conference, TENCON 2006. IEEE, 4 p. 4142536. (TENCON).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2006

    Analysis of IEEE 802.11b wireless security for university wireless LAN design

    Frankie Chan, K. L., Ang, H. H. & Issac, B., 19 Jun 2006, 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings. IEEE, Vol. 2. p. 1137-1142 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Analysis of Phishing Attacks and Countermeasures

    Issac, B., Chiong, R. & Jacob, S. M., 17 Jun 2006, Managing Information in the Digital Economy: Issues and Solutions - Proceedings of the 6th International Business Information Management Association Conference, IBIMA 2006. International Business Information Management Association, IBIMA, p. 339-346 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Analysis of single and mixed 802.11 networks and mobility architecture

    Issac, B., Hamid, K. A. & Tan, C. E., 1 Dec 2006, 2006 International Conference on Computing and Informatics, ICOCI '06. IEEE, 5276532

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Secure Unicast Address Resolution Protocol (S-UARP) by extending DHCP

    Issac, B. & Mohammed, L. A., 19 Jun 2006, 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings. IEEE, p. 363-368 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • The art of war driving and security threats - A Malaysian case study

    Issac, B., Jacob, S. M. & Mohammed, L. A., 19 Jun 2006, 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings. IEEE, Vol. 1. p. 124-129 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • 2005

    DoS attacks and defense mechanisms in wireless networks

    Mohammed, L. A. & Issac, B., 1 Dec 2005, IEE Mobility Conference 2005 - Second International Conference on Mobile Technology, Applications and Systems. IET

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
Your message has successfully been sent.
Your message was not sent due to an error.