Dr. Farrukh Shahzad
Dr. Farrukh Shahzad
Vice President of Professional Services, Ebryx LLC
Verified email at
Cited by
Cited by
Leverging Behavior-based Rules For Malware Family Classification
FS Fahim H. Abbasi, Abdul Salam
US Patent 20,170,083,703, 2017
IoT DoS and DDoS Attack Detection using ResNet
F Hussain, SG Abbas, M Husnain, UU Fayyaz, F Shahzad, GA Shah
2020 IEEE 23rd International Multitopic Conference (INMIC), 1-6, 2020
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
F Hussain, SG Abbas, GA Shah, IM Pires, UU Fayyaz, F Shahzad, ...
Sensors 21 (9), 3025, 2021
Secure biometric template generation for multi-factor authentication
SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan
Pattern Recognition 48 (2), 458-472, 2015
A Survey on Security in Vehicular Ad Hoc Networks
S Gillani, F Shahzad, A Qayyum, R Mehmood
Communication Technologies for Vehicles, 59-74, 2013
Opposition-based particle swarm optimization with velocity clamping (OVCPSO)
F Shahzad, AR Baig, S Masood, M Kamran, N Naveed
Advances in Computational Intelligence, 339-348, 2009
IoT-Flock: An Open-source Framework for IoT Traffic Generation
S Ghazanfar, F Hussain, AU Rehman, UU Fayyaz, F Shahzad, GA Shah
arXiv preprint arXiv:2004.00844, 2020
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables
F Shahzad, M Farooq
Knowledge and information systems 30 (3), 589-612, 2012
A Two-fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks
F Hussain, SG Abbas, IM Pires, S Tanveer, UU Fayyaz, NM Garcia, ...
IEEE Access, 2021
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
F Shahzad, M Shahzad, M Farooq
Information Sciences 231, 45-63, 2013
Probabilistic opposition-based particle swarm optimization with velocity clamping
F Shahzad, S Masood, NK Khan
Knowledge and Information Systems 39 (3), 703-737, 2014
In-execution malware detection using task structures of linux processes
F Shahzad, S Bhatti, M Shahzad, M Farooq
Communications (ICC), 2011 IEEE International Conference on, 1-6, 2011
System and method for detecting cyberattacks impersonating legitimate sources
MZ ul abadin Gardezi, M Saeed, H Ahmad, F Abbasi, F Shahzad
US Patent App. 16/725,674, 2020
Tstructdroid: Realtime malware detection using in-execution dynamic analysis of kernel process control blocks on android
F Shahzad, M Akbar, S Khan, M Farooq
National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2013
An Auditing Framework for Vulnerability Analysis of IoT System
I Nadir, Z Ahmad, H Mahmood, GA Shah, F Shahzad, M Umair, H Khan, ...
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 39-47, 2019
A Hybrid Approach for Malware Family Classification
N Aman, Y Saleem, FH Abbasi, F Shahzad
International Conference on Applications and Techniques in Information …, 2017
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source
SG Abbas, M Husnain, UU Fayyaz, F Shahzad, GA Shah, K Zafar
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
A survey on recent advances in malicious applications analysis and detection techniques for smartphones
F Shahzad, MA Akbar, M Farooq
National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2012
A Hybrid Framework for Malware Detection on Smartphones using ELF Structural & PCB Runtime Traces
F Shahzad, M Saleem, M Farooq
Tech. Report TR-58 FAST-National University, Pakistan, 2012
The DroidKnight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
MA Akbar, F Shahzad, M Farooq
23rd Virus Bulletin International Conference (VB2013)(Inpress). VB, 2013
The system can't perform the operation now. Try again later.
Articles 1–20