Vehicular ad-hoc networks (VANETs): an overview and challenges SU Rehman, M Khan, T Zia, L Zheng Journal of Wireless Networking and communications 3 (3), 29-38, 2013 | 248 | 2013 |
Security issues in wireless sensor networks T Zia, A Zomaya 2006 International Conference on Systems and Networks Communications (ICSNC …, 2006 | 236 | 2006 |
Multimodal big data affective analytics: A comprehensive survey using text, audio, visual and physiological signals NJ Shoumy, LM Ang, KP Seng, DMM Rahaman, T Zia Journal of Network and Computer Applications 149, 102447, 2020 | 117 | 2020 |
A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things S Zhao, W Li, T Zia, AY Zomaya 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 98 | 2017 |
Application-specific digital forensics investigative model in internet of things (iot) T Zia, P Liu, W Han Proceedings of the 12th International Conference on Availability …, 2017 | 96 | 2017 |
A security framework for wireless sensor networks T Zia, A Zomaya LAP LAMBERT Academic Publishing, 2013 | 76 | 2013 |
A lightweight hybrid security framework for wireless sensor networks H Sedjelmaci, SM Senouci 2014 IEEE international conference on communications (ICC), 3636-3641, 2014 | 59 | 2014 |
A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection EUH Qazi, A Almorjan, T Zia Applied Sciences 12 (16), 7986, 2022 | 58 | 2022 |
A continuous change detection mechanism to identify anomalies in ECG signals for WBAN-based healthcare environments FA Khan, NAH Haldar, A Ali, M Iftikhar, TA Zia, AY Zomaya IEEE Access 5, 13531-13544, 2017 | 58 | 2017 |
Deep learning-based digital image forgery detection system EUH Qazi, T Zia, A Almorjan Applied Sciences 12 (6), 2851, 2022 | 42 | 2022 |
Threat models and security issues in wireless sensor networks IS Kocher, CO Chow, H Ishii, T Zia International Journal of Computer Theory and Engineering 5 (5), 830-835, 2013 | 39 | 2013 |
A zero-watermarking algorithm for privacy protection in biomedical signals Z Ali, M Imran, M Alsulaiman, T Zia, M Shoaib Future Generation Computer Systems 82, 290-303, 2018 | 38 | 2018 |
Reputation-based trust management in wireless sensor networks TA Zia 2008 International conference on intelligent sensors, sensor networks and …, 2008 | 37 | 2008 |
HDLNIDS: hybrid deep-learning-based network intrusion detection system EUH Qazi, MH Faheem, T Zia Applied Sciences 13 (8), 4921, 2023 | 29 | 2023 |
A secure triple-key management scheme for wireless sensor networks T Zia, A Zomaya Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006 | 28 | 2006 |
A synopsis of simulation and mobility modeling in vehicular ad-hoc networks (VANETs) SU Rehman, M Khan, T Zia, R Khokhar IOSR Journal of Computer Engineering (IOSR-JCE) 15 (2), 1-16, 2013 | 26 | 2013 |
A novel secure key management module for hierarchical clustering wireless sensor networks IS Gawdan, CO Chow, TA Zia, QI Sarhan 2011 Third International Conference on Computational Intelligence, Modelling …, 2011 | 26 | 2011 |
A data mining framework to predict cyber attack for cyber security MA Rahman, Y Al-Saggaf, T Zia 2020 15th IEEE Conference on industrial electronics and applications (ICIEA …, 2020 | 24 | 2020 |
D2MAC: Dynamic delayed Medium Access Control (MAC) protocol with fuzzy technique for Wireless Body Area Networks N Mouzehkesh, T Zia, S Shafigh, L Zheng 2013 IEEE International Conference on Body Sensor Networks, 1-6, 2013 | 24 | 2013 |
A quantitative analysis into the economics of correcting software bugs CS Wright, TA Zia Computational Intelligence in Security for Information Systems: 4th …, 2011 | 23 | 2011 |