Lightweight sybil attack detection in manets S Abbas, M Merabti, D Llewellyn-Jones, K Kifayat IEEE systems journal 7 (2), 236-248, 2012 | 212 | 2012 |
A mechanism for securing IoT-enabled applications at the fog layer N Abbas, M Asim, N Tariq, T Baker, S Abbas Journal of Sensor and Actuator Networks 8 (1), 16, 2019 | 130 | 2019 |
Deepdetect: detection of distributed denial of service attacks using deep learning M Asad, M Asim, T Javed, MO Beg, H Mujtaba, S Abbas The Computer Journal 63 (7), 983-994, 2020 | 104 | 2020 |
An energy efficient and reliable routing scheme to enhance the stability period in wireless body area networks F Ullah, MZ Khan, M Faisal, HU Rehman, S Abbas, FS Mubarek Computer communications 165, 20-32, 2021 | 85 | 2021 |
Systematic literature review on Internet-of-Vehicles communication security M Abu Talib, S Abbas, Q Nasir, MF Mowakeh International Journal of Distributed Sensor Networks 14 (12), 1550147718815054, 2018 | 73 | 2018 |
An energy-efficient and cooperative fault-tolerant communication approach for wireless body area network G Mehmood, MZ Khan, S Abbas, M Faisal, HU Rahman IEEE Access 8, 69134-69147, 2020 | 69 | 2020 |
Cybersecurity curriculum design: A survey D Mouheb, S Abbas, M Merabti Transactions on Edutainment XV, 93-107, 2019 | 57 | 2019 |
Blockchain-based authentication in internet of vehicles: A survey S Abbas, MA Talib, A Ahmed, F Khan, S Ahmad, DH Kim Sensors 21 (23), 7927, 2021 | 49 | 2021 |
Signal strength based Sybil attack detection in wireless Ad Hoc networks S Abbas, M Merabti, D Llewellyn-Jones 2009 Second International Conference on Developments in eSystems Engineering …, 2009 | 45 | 2009 |
Identity attack detection system for 802.11-based ad hoc networks M Faisal, S Abbas, H Ur Rahman EURASIP Journal on Wireless Communications and Networking 2018, 1-16, 2018 | 43 | 2018 |
Improving security of the Internet of Things via RF fingerprinting based device identification system S Abbas, Q Nasir, D Nouichi, M Abdelsalam, M Abu Talib, O Abu Waraga, ... Neural Computing and Applications, 2021 | 38 | 2021 |
Artificial intelligence & crime prediction: A systematic literature review F Dakalbab, MA Talib, OA Waraga, AB Nassif, S Abbas, Q Nasir Social Sciences & Humanities Open 6 (1), 100342, 2022 | 37 | 2022 |
IoT devices security using RF fingerprinting D Nouichi, M Abdelsalam, Q Nasir, S Abbas 2019 Advances in Science and Engineering Technology International …, 2019 | 34 | 2019 |
Masquerading attacks detection in mobile ad hoc networks S Abbas, M Faisal, HU Rahman, MZ Khan, M Merabti IEEE Access 6, 55013-55025, 2018 | 34 | 2018 |
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks S Abbas, M Merabti, D Llewellyn-Jones 2010 IFIP Wireless Days, 1-6, 2010 | 32 | 2010 |
Counteracting selfish nodes using reputation based system in mobile ad hoc networks M Fayaz, G Mehmood, A Khan, S Abbas, M Fayaz, J Gwak Electronics 11 (2), 185, 2022 | 30 | 2022 |
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment T Rose, K Kifayat, S Abbas, M Asim Journal of Parallel and Distributed Computing 145, 124-139, 2020 | 30 | 2020 |
A survey of reputation based schemes for MANET S Abbas, M Merabti, D Llewellyn-Jones The 11th Annual Conference on the Convergence of Telecommunications …, 2010 | 28 | 2010 |
An efficient and reliable core-assisted multicast routing protocol in mobile Ad-Hoc network F Khan, S Abbas, S Khan International journal of advanced computer science and applications 7 (5), 2016 | 27 | 2016 |
A survey on lightweight authentication schemes in vertical handoff I Ali, M Faisal, S Abbas International Journal of Cooperative Information Systems 26 (01), 1630001, 2017 | 23 | 2017 |