Lafayette, LA, United States of America

Md Enamul Karim


Average Co-Inventor Count = 3.0

ph-index = 1

Forward Citations = 30(Granted Patents)


Company Filing History:

goldMedal1 out of 832,843 
Other
 patents

Years Active: 2011

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Md Enamul Karim: Innovator in Malware Comparison Technology

Introduction

Md Enamul Karim is an accomplished inventor based in Lafayette, LA (US). He has made significant contributions to the field of computer science, particularly in the area of malware comparison and classification. His innovative approach has the potential to enhance the security and efficiency of software programs.

Latest Patents

Md Enamul Karim holds a patent for a method titled "Phylogeny generation." This method provides a systematic approach for comparing malware and other types of computer programs. The process involves three main steps: selecting and extracting tokens from a pair of programs, building features from these tokens, and comparing the programs based on the frequency of feature occurrences to produce a similarity measure. This innovative technique can be utilized for searching matching programs, classifying programs, and constructing classification systems within a collection of programs. He has 1 patent to his name.

Career Highlights

Throughout his career, Md Enamul Karim has demonstrated a strong commitment to advancing technology in the field of computer science. His work has not only contributed to academic knowledge but also has practical applications in enhancing cybersecurity measures.

Collaborations

Md Enamul Karim has collaborated with notable professionals in his field, including Arun Lakhotia and Andrew Eric Walenstein. These collaborations have further enriched his research and development efforts.

Conclusion

Md Enamul Karim is a notable inventor whose work in malware comparison technology showcases his innovative spirit and dedication to improving software security. His contributions are valuable to the ongoing evolution of computer science and cybersecurity.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…