Nadeem Ahmed Syed

Learn More
Users and network administrators need ways to filter email messages based primarily on the reputation of the sender. Unfortunately, conventional mechanisms for sender reputation—notably, IP blacklists—are cumbersome to maintain and evadable. This paper investigates ways to infer the reputation of an email sender based solely on network-level features,(More)
With the increase in the size of real-world databases, there is an ever-increasing need to scale up inductive learning algorithms. Incremental learning techniques are one possible solution to the scalability problem. In this paper, we propose three ctiteria to evaluate the robustness and reliability of incremental learning methods, and use them to study the(More)
Limited fidelity of software-based wireless network simulations has prompted many researchers to build testbeds for developing and evaluating their wireless protocols and mobile applications. Since most testbeds are tailored to the needs of specific research projects, they cannot be easily reused for other research projects that may have different(More)
P300 is an event-related potential that is elicited by an oddball paradigm. In several neuropsychiatric diseases, differences in latencies and amplitude compared to healthy subjects have been reported. Because of its clinical significance, several investigations have tried to elucidate the intracranial origins of the P300 component. In the present study we(More)
As databases for real-world problems increase in size, there is a need in many situations to select and keep relevant training data for efficient storage and processing reasons. Support vector machines (SVMs) reportedly exhibit certain desirable properties in selecting and preserving useful training data as support vectors. This paper attempts to quantify(More)
A previously well 11-month-old infant presented with lethargy, a blanching rash, vomiting and diarrhoea. She was diagnosed with suspected gastroenteritis and discharged. The patient deteriorated and re-presented 24 h later with lumbar puncture (LP) confirming Neisseria meningitidis. Following an initial good response to ceftriaxone, the patient then(More)
Current spam filtering techniques classify email based on content and IP reputation blacklists or whitelists. Unfortunately, spammers can alter spam content to evade contentbased filters, and spammers continually change the IP addresses from which they send spam. Previous work has suggested that filters based on network-level behavior might be more(More)
Journal of Management and Social Sciences Vol. 6, No. 2, (Fall 2010) 52-64 * The material presented by the author does not necessarily portray the viewpoint of the editors and the management of the Institute of Business & Technology (IBT) or KASB Institute of Technology (KASBIT) and FAST Business School, National University, Karachi. JMSS is published by(More)