Cloud computing and security issues in the cloud M Ahmed, MA Hossain International Journal of Network Security & Its Applications 6 (1), 25, 2014 | 254 | 2014 |
Taxonomy for identification of security issues in cloud computing environments M Ahmed, AT Litchfield Journal of Computer Information Systems 58 (1), 79-88, 2018 | 72 | 2018 |
Cybersecurity practices for social media users: a systematic literature review TBG Herath, P Khanna, M Ahmed Journal of Cybersecurity and Privacy 2 (1), 1-18, 2022 | 59 | 2022 |
VoIP performance analysis over IPv4 and IPv6 M Ahmed, AT Litchfield, S Ahmed, A Mahmood, MEH Meazi International journal of computer Network and Information Security 6 (11), 43-48, 2014 | 19 | 2014 |
A generalized threat taxonomy for cloud computing M Ahmed, AT Litchfield, S Ahmed ACIS, 2014 | 13 | 2014 |
A zero-trust federated identity and access management framework for cloud and cloud-based computing environments M Ahmed, K Petrova | 12 | 2020 |
A distributed security model for cloud computing M Ahmed, A Litchfield, C Sharma Proceedings of the Americas Conference on Information Systems, 2016 | 12 | 2016 |
Impact of human factors in cloud data breach M Ahmed, HR Kambam, Y Liu, MN Uddin Advances in Intelligent Systems and Interactive Applications: Proceedings of …, 2020 | 9 | 2020 |
Security in decentralised computing, IoT and industrial IoT M Ahmed, S Jaidka, NI Sarkar Industrial IoT: Challenges, Design Principles, Applications, and Security …, 2020 | 8 | 2020 |
A framework for strategic cloud migration M Ahmed, N Singh Proceedings of the 2019 5th International Conference on Computing and …, 2019 | 8 | 2019 |
Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing M Ahmed Auckland University of Technology, 2018 | 8 | 2018 |
Physical server and virtual server: The performance trade-offs M Ahmed European Scientific Journal 9 (12), 2013 | 7 | 2013 |
A survey on energy harvesting wireless networks: Channel capacity, scheduling, and transmission power optimization NI Sarkar, DP Singh, M Ahmed Electronics 10 (19), 2342, 2021 | 5 | 2021 |
Privacy in cloud-based computing M Ahmed, NI Sarkar Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing …, 2020 | 5 | 2020 |
Handshaking problem associated with addressing scheme for the nodes of a wireless sensor network M Ahmed Int J Adv Res Technol 1 (5), 74-78, 2012 | 5 | 2012 |
A decentralised mechanism for secure cloud computing transactions M Ahmed, MMA Bhuiyan, S Jaidka, P Jiranantanagorn 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-5, 2021 | 3 | 2021 |
A Survey on the Social Impacts of On-line Social Networking Sites M Ahmed | 2 | 2013 |
ContoGram: A novel contextual requirements engineering tool AT Litchfield, M Ahmed, FH Mozumder, MN Uddin, M Rahman 2014 IEEE International Conference on Computer and Information Technology …, 2014 | 1 | 2014 |
Audio Codecs in VoIPv6: A Performance Analysis M Ahmed, MSH Mollah International Journal of Computer Network and Information Security 6 (5), 50, 2014 | 1 | 2014 |
Wireless Sensor Network: An Emerging Technology M Ahmed IOSR Journal of Electronics and Communication Engineering (IOSRJECE), ISSN …, 0 | 1 | |