A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) MM Naeem, I Hussain, MMS Missen Computer Networks 175, 107250, 2020 | 18 | 2020 |
Cluster Computing Vs Cloud Computing a Comparison and an Overview MM Naeem, H Mahar, F Memon, M Siddique, A Chohan Sci. Int 28 (6), 5267-5271, 2016 | 11 | 2016 |
Numerical simulation of ethanol production for different carbon sources using thermotolerant Kluyveromyces marxianus H Mahar, AS Jatoi, IN Unar, IA Gopang, M Naeem, MS Siddique Journal of Applied and Emerging Sciences 8 (1), pp1-9, 2018 | 3 | 2018 |
An Artificial Intelligence Based Current Measurement Technique in High Voltage Power Transmission and Distribution Lines using Pyro-Sensors A Rehman, ZN Khan, M Siddique, M Shahzad, MM Naeem, M Hussain Pakistan Journal of Engineering and Technology 4 (2), 94-99, 2021 | 1 | 2021 |
A Technique for Safeguarding Legitimate Users from Media Access Control (MAC) Spoofing Attacks MMN MMS Missen, I Hussain Journal of Computing & Biomedical Informatics 6 (Issue 02), 2024 | | 2024 |
AN OVERVIEW OF VIRTUALIZATION & CLOUD COMPUTING M Naeem, HMF Memon, M Siddique, A Rauf Science international journal lahore 7, 2016 | | 2016 |