Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 83 | 2019 |
Coverage and mobile sensor placement for vehicles on predetermined routes: A greedy heuristic approach J Ali, V Dyo SCITEPRESS–Science and Technology Publications, 2017 | 27 | 2017 |
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols J Ali, V Dyo 2021 International Conference on Information Networking (ICOIN), 181-185, 2021 | 13 | 2021 |
Analysis and safety engineering of fuzzy string matching algorithms M Pikies, J Ali ISA transactions 113, 1-8, 2021 | 11 | 2021 |
Practical hash-based anonymity for mac addresses J Ali, V Dyo arXiv preprint arXiv:2005.06580, 2020 | 11 | 2020 |
String similarity algorithms for a ticket classification system M Pikies, J Ali 2019 6th International Conference on Control, Decision and Information …, 2019 | 10 | 2019 |
Mechanism for the prevention of password reuse through anonymized hashes J Ali PeerJ PrePrints 5, e3322v1, 2017 | 10 | 2017 |
Mastering PHP design patterns J Ali Packt Publishing Ltd, 2016 | 10 | 2016 |
Study to understand the impact of COVID-19 on Software Engineers J Ali Haystack. Retrieved, from https://haystack-books. s3. amazonaws. com/Study+ …, 2021 | 2 | 2021 |
Battery-assisted electric vehicle charging: Data driven performance analysis J Ali, V Dyo, S Zhang 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 429-433, 2020 | 2 | 2020 |
Password authentication attacks at scale J Ali, M Pikies International Conference on Advanced Engineering Theory and Applications …, 2019 | 1 | 2019 |
Cryptographic hash-based anonymisation of wireless unique identifiers J Ali University of Bedfordshire, 2022 | | 2022 |
Novel Keyword Extraction and Language Detection Approaches M Pikies, A Riyono, J Ali arXiv preprint arXiv:2009.11832, 2020 | | 2020 |
Object Oriented PHP J Ali Lulu. com, 2017 | | 2017 |