Md. Enamul Karim

Learn More
Malicious programs, such as viruses and worms, are frequently related to previous programs through evolutionary relationships. Discovering those relationships and constructing a phylogeny model is expected to be helpful for analyzing new malware and for establishing a principled naming scheme. Matching permutations of code may help build better models in(More)
Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior. In particular, malicious programs employ obfuscations of stack-based instructions, such as call and return instructions, to prevent an analyzer from determining which system functions it calls. Instead of using these instructions(More)
Steady two-dimensional Magneto hydrodynamic free convection flow with thermal radiation in the presence of magnetic field along a vertical flat plate is concerned in the present study. The fluid is taken to be gray, absorbing-emitting radiation. The non-linear governing equations have been transformed by the usual similarity transformation to a system of(More)
Miller Fisher syndrome (MFS) is an uncommon variant of Guillain-Barré syndrome (GBS). It is characterized by external ophthalmoplegia, ataxia, and areflexia. The incidence of MFS as a proportion of GBS was reported to be 1 to 5 % in western countries and considerably higher in Eastern Asia i.e. 19% in Taiwan and 25% in Japan. Here we report the clinical(More)
Abstract In this paper we present a random shuffling scheme to apply with adaptive sorting algorithms. Adaptive sorting algorithms utilize the presortedness present in a given sequence. We have probabilistically increased the amount of presortedness present in a sequence by using a random shuffling technique that requires little computation. Theoretical(More)
  • 1