Остановите войну!
for scientists:
default search action
Muhammad N. Marsono
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j40]Arwa M. Eldhai, Mosab Hamdan, Ahmed Abdelaziz, Ibrahim Abaker Targio Hashem, Sharief F. Babiker, Muhammad N. Marsono, Muzaffar Hamzah, Noor Zaman Jhanjhi:
Improved Feature Selection and Stream Traffic Classification Based on Machine Learning in Software-Defined Networks. IEEE Access 12: 34141-34159 (2024) - 2023
- [j39]Mohammed Sultan Mohammed, Ahlam Al-Dhamari, Waddah Saeed, Fatima N. Al-Aswadi, Sami Abdulla Mohsen Saleh, Muhammad N. Marsono:
Motion Pattern-Based Scene Classification Using Adaptive Synthetic Oversampling and Fully Connected Deep Neural Network. IEEE Access 11: 119659-119675 (2023) - [j38]Mohammed Sultan Mohammed, Ahlam Al-Dhamari, Mosab Hamdan, Abdul-Malik H. Y. Saad, Antar S. H. Abdul-Qawy, Muhammad N. Marsono:
3D-DNaPE: Dynamic Neighbor-Aware Performance Enhancement for Thermally Constrained 3D Many-Core Systems. IEEE Access 11: 131964-131978 (2023) - 2022
- [j37]Tze Hon Tan, Chia Yee Ooi, Muhammad Nadzir Marsono:
RtFog: A Real-Time FPGA-Based Fog Node With Remote Dynamically Reconfigurable Application Plane for Fog Analytics Redeployment. IEEE Trans. Green Commun. Netw. 6(1): 341-351 (2022) - 2021
- [j36]Mohammed Sultan Mohammed, Norlina Paraman, Ab Al-Hadi Ab Rahman, Fuad A. Ghaleb, Ahlam Al-Dhamari, Muhammad Nadzir Marsono:
PEW: Prediction-Based Early Dark Cores Wake-up Using Online Ridge Regression for Many-Core Systems. IEEE Access 9: 124087-124099 (2021) - [j35]Arwa Mohamed, Mosab Hamdan, Suleman Khan, Ahmed Abdelaziz, Sharief F. Babiker, Muhammad Imran, Muhammad Nadzir Marsono:
Software-defined networks for resource allocation in cloud computing: A survey. Comput. Networks 195: 108151 (2021) - [j34]Mosab Hamdan, Suleman Khan, Ahmed Abdelaziz, Shahidatul Sadiah, Nasir Shaikh-Husin, Sattam Al Otaibi, Carsten Maple, Muhammad N. Marsono:
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks. Comput. Commun. 180: 315-327 (2021) - [j33]Mosab Hamdan, Entisar Hassan, Ahmed Abdelaziz, Abdallah Elhigazi Abdallah, Bushra Mohammed, Suleman Khan, Athanasios V. Vasilakos, Muhammad Nadzir Marsono:
A comprehensive survey of load balancing techniques in software-defined network. J. Netw. Comput. Appl. 174: 102856 (2021) - [j32]Omer Elsier Tayfour, Muhammad Nadzir Marsono:
Collaborative detection and mitigation of DDoS in software-defined networks. J. Supercomput. 77(11): 13166-13190 (2021) - 2020
- [j31]Mosab Hamdan, Bushra Mohammed, Usman Humayun, Ahmed Abdelaziz, Suleman Khan, M. Akhtar Ali, Muhammad Imran, Muhammad Nadzir Marsono:
Flow-Aware Elephant Flow Detection for Software-Defined Networks. IEEE Access 8: 72585-72597 (2020) - [j30]Bushra Mohammed, Mosab Hamdan, Joseph Stephen Bassi, Haitham A. Jamil, Suleman Khan, Abdallah Elhigazi Abdallah, Danda B. Rawat, Ismahani Binti Ismail, Muhammad Nadzir Marsono:
Edge Computing Intelligence Using Robust Feature Selection for Network Traffic Classification in Internet-of-Things. IEEE Access 8: 224059-224070 (2020) - [j29]Omer Elsier Tayfour, Muhammad Nadzir Marsono:
Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network. Mob. Networks Appl. 25(4): 1338-1347 (2020) - 2018
- [j28]Jia Wei Tang, Nasir Shaikh-Husin, Usman Ullah Sheikh, Muhammad N. Marsono:
A linked list run-length-based single-pass connected component analysis for real-time embedded hardware. J. Real Time Image Process. 15(1): 197-215 (2018) - [j27]Yee Hui Lee, Mohamed Khalil Hani, Muhammad N. Marsono:
Improved quantum circuit modelling based on Heisenberg representation. Quantum Inf. Process. 17(2): 36 (2018) - 2017
- [j26]Jeevan Sirkunan, Chia Yee Ooi, Nasir Shaikh-Husin, Yuan Wen Hau, Muhammad N. Marsono:
Hardware transactional memory architecture with adaptive version management for multi-processor FPGA platforms. J. Syst. Archit. 73: 42-52 (2017) - [j25]Alireza Monemi, Jia Wei Tang, Maurizio Palesi, Muhammad N. Marsono:
ProNoC: A low latency network-on-chip based many-core system-on-chip prototyping platform. Microprocess. Microsystems 54: 60-74 (2017) - [j24]Alireza Monemi, Chia Yee Ooi, Maurizio Palesi, Muhammad N. Marsono:
Ping-lock round robin arbiter. Microelectron. J. 63: 81-93 (2017) - 2016
- [j23]Hui Ru Loo, Stephen Bassi Joseph, Muhammad Nadzir Marsono:
Online Incremental Learning for High Bandwidth Network Traffic Classification. Appl. Comput. Intell. Soft Comput. 2016: 1465810:1-1465810:13 (2016) - [j22]Hui Ru Loo, Muhammad N. Marsono:
Online network traffic classification with incremental learning. Evol. Syst. 7(2): 129-143 (2016) - [j21]Yee Hui Lee, Mohamed Khalil Hani, Muhammad Nadzir Marsono:
An FPGA-Based Quantum Computing Emulation Framework Based on Serial-Parallel Architecture. Int. J. Reconfigurable Comput. 2016: 5718124:1-5718124:18 (2016) - [j20]Jia Wei Tang, Nasir Shaikh-Husin, Usman Ullah Sheikh, Muhammad Nadzir Marsono:
FPGA-Based Real-Time Moving Target Detection System for Unmanned Aerial Vehicle Application. Int. J. Reconfigurable Comput. 2016: 8457908:1-8457908:16 (2016) - 2015
- [j19]Mahdieh Nadi Senejani, Mahdiar Hosein Ghadiry, Chia Yee Ooi, Muhammad Nadzir Marsono:
Built-in Self Test Power and Test Time Analysis in On-chip Networks. Circuits Syst. Signal Process. 34(4): 1057-1075 (2015) - [j18]Ismahani Binti Ismail, Muhammad Nadzir Marsono, Ban Mohammed Khammas, Sulaiman Mohd Nor:
Incorporating known malware signatures to classify new malware variants in network traffic. Int. J. Netw. Manag. 25(6): 471-489 (2015) - [j17]Alireza Monemi, Chia Yee Ooi, Muhammad Nadzir Marsono:
Low Latency Network-on-Chip Router Microarchitecture Using Request Masking Technique. Int. J. Reconfigurable Comput. 2015: 570836:1-570836:13 (2015) - [j16]Roozbeh Zarei, Alireza Monemi, Muhammad Nadzir Marsono:
Automated Dataset Generation for Training Peer-to-Peer Machine Learning Classifiers. J. Netw. Syst. Manag. 23(1): 89-110 (2015) - [j15]Boon Hui Ang, Usman Ullah Sheikh, Muhammad Nadzir Marsono:
2-D DWT System Architecture for Image Compression. J. Signal Process. Syst. 78(2): 131-137 (2015) - 2014
- [j14]Ismahani Binti Ismail, Sulaiman Mohd Nor, Muhammad Nadzir Marsono:
Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures. Appl. Comput. Intell. Soft Comput. 2014: 197961:1-197961:8 (2014) - [j13]Yin Zhen Tei, Yuan Wen Hau, Nasir Shaikh-Husin, Muhammad Nadzir Marsono:
Network Partitioning Domain Knowledge Multiobjective Application Mapping for Large-Scale Network-on-Chip. Appl. Comput. Intell. Soft Comput. 2014: 867612:1-867612:10 (2014) - [j12]Ismahani Binti Ismail, Muhammad Nadzir Marsono, Sulaiman Mohd Nor:
Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise. Int. J. Inf. Comput. Secur. 6(2): 179-197 (2014) - [j11]Vishnu P. Nambiar, Mohamed Khalil Hani, Riadh Sahnoun, Muhammad N. Marsono:
Hardware implementation of evolvable block-based neural networks utilizing a cost efficient sigmoid-like activation function. Neurocomputing 140: 228-241 (2014) - [j10]Vishnu P. Nambiar, Mohamed Khalil Hani, Muhammad N. Marsono, Chen Wei Sia:
Optimization of structure and system latency in evolvable block-based neural networks using genetic algorithm. Neurocomputing 145: 285-302 (2014) - 2013
- [j9]Alireza Monemi, Roozbeh Zarei, Muhammad N. Marsono:
Online NetFPGA decision tree statistical traffic classifier. Comput. Commun. 36(12): 1329-1340 (2013) - [j8]Vishnu P. Nambiar, Sathivellu Balakrishnan, Mohamed Khalil Hani, Muhammad N. Marsono:
HW/SW co-design of reconfigurable hardware-based genetic algorithm in FPGAs applicable to a variety of problems. Computing 95(9): 863-896 (2013) - [j7]Mohamed Khalil Hani, Muhammad N. Marsono, Rabia Bakhteri:
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3): 800-810 (2013) - [j6]Mahdieh Nadi Senjani, Mahdiar Hosein Ghadiry, Chia Yee Ooi, Muhammad N. Marsono:
A Semi-Analytical Approach to Study the Energy Consumption of On-Chip Networks Testing. J. Low Power Electron. 9(2): 189-197 (2013) - 2012
- [j5]Muhammad N. Marsono:
Packet-level open-digest fingerprinting for spam detection on middleboxes. Int. J. Netw. Manag. 22(1): 12-26 (2012) - 2009
- [j4]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
Targeting spam control on middleboxes: Spam detection based on layer-3 e-mail content classification. Comput. Networks 53(6): 835-848 (2009) - [j3]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification. J. Netw. Comput. Appl. 32(1): 236-257 (2009) - 2008
- [j2]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
Binary LNS-based naive Bayes inference engine for spam control: noise analysis and FPGA implementation. IET Comput. Digit. Tech. 2(1): 56-62 (2008) - [j1]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
Prioritized e-mail servicing to reduce non-spam delay and loss: A performance analysis. Int. J. Netw. Manag. 18(4): 325-344 (2008)
Conference and Workshop Papers
- 2023
- [c37]Mosab Hamdan, Arwa M. Eldhai, Samah Abdelsalam, Kifayat Ullah, Ali Kashif Bashir, Muhammad N. Marsono, Fabio Kon, Daniel Macêdo Batista:
A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart Cities. INFOCOM Workshops 2023: 1-7 - 2022
- [c36]Arwa Mohamed, Mosab Hamdan, Suleman Khan, Muzaffar Hamzah, Muhammad N. Marsono:
Traffic Classification based on Incremental Learning Algorithms for the Software-Defined Networks. FIT 2022: 338-343 - [c35]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
An FPGA-based IP Core Subscription-Oriented Fog Computing Platform. IPDPS Workshops 2022: 128-131 - 2021
- [c34]Ayodeji Ireti Fasiku, Olagoke Oladokun, Shahrizal Rusli, Muhammad N. Marsono:
A Centralized Token-based Medium Access Control Mechanism for Wireless Network-on-Chip. ICAICST 2021: 102-107 - [c33]Usman Humayun, Mosab Hamdan, Muhammad N. Marsono:
Early Flow Table Eviction Impact on Delay and Throughput in Software-Defined Networks. ICCSCE 2021: 7-12 - [c32]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
An FPGA-based Middlebox with Remote Dynamically Reconfigurable Application Plane. TENCON 2021: 52-56 - 2019
- [c31]Jeevan Sirkunan, Nasir Shaikh-Husin, Muhammad N. Marsono:
Interleaved Incremental/Decremental Support Vector Machine for Embedded System. ISCAS 2019: 1-5 - 2018
- [c30]Ban Mohammed Khammas, Sami Hasan, Noor Nateq, Joseph Stephen Bassi, Ismahani Binti Ismail, Muhammad Nadzir Marsono:
First Line Defense Against Spreading New Malware in the Network. CEEC 2018: 113-118 - [c29]Tze Hon Tan, Chia Yee Ooi, Muhammad Nadzir Marsono:
drDRM: A PUF-Based Dynamically Reconfigurable DRM Mechanism for FPGA-Based Platform. CANDAR 2018: 194-200 - 2017
- [c28]Tze Hon Tan, Chia Yee Ooi, Muhammad Nadzir Marsono:
hpFog: A FPGA-Based Fog Computing Platform. NAS 2017: 1-2 - 2016
- [c27]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
A modular architecture for dynamically reconfigurable middlebox with customized reconfiguration handler. FPT 2016: 225-228 - [c26]Alireza Monemi, Chia Yee Ooi, Muhammad Nadzir Marsono, Maurizio Palesi:
Improved Flow Control for Minimal Fully Adaptive Routing in 2D Mesh NoC. NoCArc@MICRO 2016: 9-14 - 2015
- [c25]Hui Ru Loo, Muhammad N. Marsono:
Online data stream classification with incremental semi-supervised learning. CODS 2015: 132-133 - [c24]Andrea Mineo, Mohd Shahrizal Rusli, Maurizio Palesi, Giuseppe Ascia, Vincenzo Catania, Muhammad N. Marsono:
A closed loop transmitting power self-calibration scheme for energy efficient WiNoC architectures. DATE 2015: 513-518 - [c23]Jeevan Sirkunan, Chia Yee Ooi, Muhammad N. Shaikh-Husin, Yuan Wen Hau, Muhammad N. Marsono:
Adaptive Configurable Transactional Memory for Multi-processor FPGA Platforms. FCCM 2015: 102 - [c22]Alireza Monemi, Chia Yee Ooi, Muhammad Nadzir Marsono:
Virtual Channel and Switch Allocation for Low Latency Network-on-Chip Routers. FCCM 2015: 234 - [c21]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
rrBox: A remote dynamically reconfigurable network processing middlebox. FPL 2015: 1-4 - [c20]Jia Wei Tang, Yuan Wen Hau, Muhammad N. Marsono:
Hardware/software partitioning of embedded System-on-Chip applications. VLSI-SoC 2015: 331-336 - 2014
- [c19]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
rrBox: A Remote Dynamically Reconfigurable Middlebox for Network Protection. CANDAR 2014: 219-225 - [c18]Mohd Shahrizal Rusli, Andrea Mineo, Maurizio Palesi, Giuseppe Ascia, Vincenzo Catania, Muhammad N. Marsono:
A Closed Loop Control based Power Manager for WiNoC Architectures. MES 2014: 60-63 - [c17]Tze Hon Tan, Chia Yee Ooi, Yuan Wen Hau, Nasir Shaikh-Husin, Muhammad N. Marsono:
Remote dynamically reconfigurable platform using NetFPGA. ISCAS 2014: 1239-1242 - [c16]Ling Kim Loo, Chia Yee Ooi, V. Y. Liew, Yuan Wen Hau, Muhammad N. Marsono:
Packet logging mechanism for adaptive online fault detection on Network-on-Chip. ISCAS 2014: 1760-1763 - [c15]Jeevan Sirkunan, Chia Yee Ooi, Nasir Shaikh-Husin, Yuan Wen Hau, Muhammad Nadzir Marsono:
Hardware transactional memory on multi-processor FPGA platform. ISCAS 2014: 2744-2747 - [c14]Tze Hon Tan, Chia Yee Ooi, Muhammad N. Marsono:
rrBox: Remote dynamically reconfigurable middlebox using NetFPGA. ISCIT 2014: 409-413 - [c13]Yee Hui Lee, Mohamed Khalil Hani, Muhammad N. Marsono:
FPGA-based quantum circuit emulation: A case study on Quantum Fourier transform. ISIC 2014: 512-515 - 2013
- [c12]Mohamed Khalil Hani, Vishnu P. Nambiar, Muhammad N. Marsono:
Co-simulation methodology for improved design and verification of hardware neural networks. IECON 2013: 2226-2231 - [c11]Haitham A. Jamil, Aliyu Mohammed, A. Hamza, Sulaiman Mohd Nor, Muhammad Nadzir Marsono:
Selection of On-line Features for Peer-to-Peer Network Traffic Classification. ISI 2013: 379-390 - [c10]Yin Zhen Tei, Muhammad N. Marsono, Nasir Shaikh-Husin, Yuan Wen Hau:
Network partitioning and GA heuristic crossover for NoC application mapping. ISCAS 2013: 1228-1231 - [c9]Sieng Wong, Chia Yee Ooi, Yuan Wen Hau, Muhammad N. Marsono, Nasir Shaikh-Husin:
Feasible transition path generation for EFSM-based system testing. ISCAS 2013: 1724-1727 - 2012
- [c8]Mohamed Khalil Hani, Vishnu P. Nambiar, Muhammad N. Marsono:
GA-based parameter tuning in finger-vein biometric embedded systems for information security. ICCC 2012: 236-241 - [c7]Alireza Monemi, Roozbeh Zarei, Muhammad Nadzir Marsono, Mohamed Khalil Hani:
Parameterizable Decision Tree Classifier on NetFPGA. ISI 2012: 119-128 - [c6]Roozbeh Zarei, Alireza Monemi, Muhammad Nadzir Marsono:
Retraining Mechanism for On-Line Peer-to-Peer Traffic Classification. ISI 2012: 373-382 - 2011
- [c5]Yuan Wen Hau, Muhammad N. Marsono, Chia Yee Ooi, Mohamed Khalil Hani:
A Network-on-Chip simulation framework for homogeneous Multi-Processor System-on-Chip. ASICON 2011: 175-179 - [c4]Aliyu Mohammed, Sulaiman Mohd Nor, Muhammad Nadzir Marsono:
Network Worm Propagation Model Based on a Campus Network Topology. iThings/CPSCom 2011: 653-659 - 2010
- [c3]Ismahani Binti Ismail, Muhammad N. Marsono, Sulaiman Mohd Nor:
Detecting Worms Using Data Mining Techniques: Learning in the Presence of Class Noise. SITIS 2010: 187-194 - 2006
- [c2]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali, Sudhakar Ganti:
Distributed Layer-3 E-Mail Classification for Spam Control. CCECE 2006: 742-745 - [c1]Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
Binary LNS-based naive Bayes hardware classifier for spam control. ISCAS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-19 02:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint