Follow
Maqsood Mahmud, PhD.
Maqsood Mahmud, PhD.
School of Computing, Ulster University, Belfast, NI, UK
Verified email at ulster.ac.uk - Homepage
Title
Cited by
Cited by
Year
Stock market forecasting by using a hybrid model of exponential fuzzy time series
FM Talarposhti, HJ Sadaei, R Enayatifar, FG Guimarães, M Mahmud, ...
International Journal of Approximate Reasoning 70, 79-98, 2016
972016
Evolutionary-based image encryption using RNA codons truth table
JYC MaqsoodMahmud, Atta-ur-Rahman, MalreyLee
Optics & Laser Technology 121, 2020
932020
A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting
HJ Sadaei, R Enayatifar, MH Lee, M Mahmud
Applied Soft Computing 40, 132-149, 2016
812016
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series
HJ Sadaei, R Enayatifar, FG Guimarães, M Mahmud, ZA Alzamil
Neurocomputing 175, 782-796, 2016
702016
Frequency based feature selection method using whale algorithm
EA Hossein Nematzadeh, Rasul Enayatifar, Maqsood Mahmud
Genomics, 2019
662019
Toward zero trust security in 5g open architecture network slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2022
412022
Reversible and fragile watermarking for medical images
K Sultan, N Aldhafferi, A Alqahtani, M Mahmud
Computational and mathematical methods in medicine 2018 (1), 3461382, 2018
392018
Network Anomaly Detection in 5G Networks
DA Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Linah Saraireh, Hisham ...
Mathematical Modelling of Engineering Problems 9 (2), 397-404, 2022
38*2022
Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories
MM Atta Ur Rahman, Kiran Sultan, Dhiaa Musleh,Nahier Aldhafferi, Abdullah ...
Journal of Healthcare Engineering 2018, 11, 2018
35*2018
Bio-chaotic stream cipher-based iris image encryption
AS Alghamdi, H Ullah, M Mahmud, MK Khan
2009 International Conference on Computational Science and Engineering 2 …, 2009
262009
Development and validation of embedded device for electrocardiogram arrhythmia empowered with transfer learning
RN Asif, S Abbas, MA Khan, K Sultan, M Mahmud, A Mosavi
Computational Intelligence and Neuroscience 2022 (1), 5054641, 2022
232022
A novel cybersecurity framework for countermeasure of SME's in saudi arabia
L Ajmi, N Alqahtani, AU Rahman, M Mahmud
2019 2nd International Conference on Computer Applications & Information …, 2019
222019
Security analysis of firewall rule sets in computer networks
B Khan, MK Khan, M Mahmud, KS Alghathbar
2010 Fourth International Conference on Emerging Security Information …, 2010
182010
Adoption of open innovation and entrepreneurial orientation practices in Malaysian furniture industry
F Wadood, ME Alshaikh, F Akbar, M Mahmud
Entrepreneurial Business and Economics Review 10 (2), 21-40, 2022
152022
MR imaging enhancement and segmentation of tumor using fuzzy curvelet
MA Jaffar, AA Mirza, M Mahmud
International Journal of the Physical Sciences 6 (31), 7242-7246, 2011
152011
The impact of cyberattacks awareness on customers’ trust and commitment: an empirical evidence from the Pakistani banking sector
IA Bajwa, S Ahmad, M Mahmud, FA Bajwa
Information & Computer Security 31 (5), 635-654, 2023
142023
Impact of social networking sites (SNSs) on youth
Z Akram, M Mahmud, A Mahmood
Applied Science Reports 11 (1), 6-10, 2015
142015
SUNFIT: A Machine Learning-Based Sustainable University Field Training Framework for Higher Education
M Gollapalli, A Rahman, M Alkharraa, L Saraireh, D AlKhulaifi, AA Salam, ...
Sustainability 15 (10), 8057, 2023
122023
Information security in business: a bibliometric analysis of the 100 top cited articles
M Mahmud, IU Haq
Library Philosophy and Practice, 1-49, 2021
122021
Assessment of Information Extraction Techniques, Models and Systems.
A Rahman, D Musleh, M Nabil, H Alubaidan, M Gollapalli, G Krishnasamy, ...
Mathematical Modelling of Engineering Problems 9 (3), 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20