关注
Monjur Ahmed
标题
引用次数
引用次数
年份
Cloud computing and security issues in the cloud
M Ahmed, MA Hossain
International Journal of Network Security & Its Applications 6 (1), 25, 2014
2542014
Taxonomy for identification of security issues in cloud computing environments
M Ahmed, AT Litchfield
Journal of Computer Information Systems 58 (1), 79-88, 2018
722018
Cybersecurity practices for social media users: a systematic literature review
TBG Herath, P Khanna, M Ahmed
Journal of Cybersecurity and Privacy 2 (1), 1-18, 2022
592022
VoIP performance analysis over IPv4 and IPv6
M Ahmed, AT Litchfield, S Ahmed, A Mahmood, MEH Meazi
International journal of computer Network and Information Security 6 (11), 43-48, 2014
192014
A generalized threat taxonomy for cloud computing
M Ahmed, AT Litchfield, S Ahmed
ACIS, 2014
132014
A zero-trust federated identity and access management framework for cloud and cloud-based computing environments
M Ahmed, K Petrova
122020
A distributed security model for cloud computing
M Ahmed, A Litchfield, C Sharma
Proceedings of the Americas Conference on Information Systems, 2016
122016
Impact of human factors in cloud data breach
M Ahmed, HR Kambam, Y Liu, MN Uddin
Advances in Intelligent Systems and Interactive Applications: Proceedings of …, 2020
92020
Security in decentralised computing, IoT and industrial IoT
M Ahmed, S Jaidka, NI Sarkar
Industrial IoT: Challenges, Design Principles, Applications, and Security …, 2020
82020
A framework for strategic cloud migration
M Ahmed, N Singh
Proceedings of the 2019 5th International Conference on Computing and …, 2019
82019
Ki-Ngā-Kōpuku: a decentralised, distributed security model for cloud computing
M Ahmed
Auckland University of Technology, 2018
82018
Physical server and virtual server: The performance trade-offs
M Ahmed
European Scientific Journal 9 (12), 2013
72013
A survey on energy harvesting wireless networks: Channel capacity, scheduling, and transmission power optimization
NI Sarkar, DP Singh, M Ahmed
Electronics 10 (19), 2342, 2021
52021
Privacy in cloud-based computing
M Ahmed, NI Sarkar
Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing …, 2020
52020
Handshaking problem associated with addressing scheme for the nodes of a wireless sensor network
M Ahmed
Int J Adv Res Technol 1 (5), 74-78, 2012
52012
A decentralised mechanism for secure cloud computing transactions
M Ahmed, MMA Bhuiyan, S Jaidka, P Jiranantanagorn
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-5, 2021
32021
A Survey on the Social Impacts of On-line Social Networking Sites
M Ahmed
22013
ContoGram: A novel contextual requirements engineering tool
AT Litchfield, M Ahmed, FH Mozumder, MN Uddin, M Rahman
2014 IEEE International Conference on Computer and Information Technology …, 2014
12014
Audio Codecs in VoIPv6: A Performance Analysis
M Ahmed, MSH Mollah
International Journal of Computer Network and Information Security 6 (5), 50, 2014
12014
Wireless Sensor Network: An Emerging Technology
M Ahmed
IOSR Journal of Electronics and Communication Engineering (IOSRJECE), ISSN …, 0
1
系统目前无法执行此操作,请稍后再试。
文章 1–20