A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches SM Muzammal, RK Murugesan, NZ Jhanjhi IEEE Internet of Things Journal 8 (6), 4186-4210, 2020 | 85 | 2020 |
Counter measuring conceivable security threats on smart healthcare devices SM Muzammal, MA Shah, HA Khattak, S Jabbar, G Ahmed, S Khalid, ... IEEE Access 6, 20722-20733, 2018 | 29 | 2018 |
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung 2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020 | 23 | 2020 |
A study on leveraging blockchain technology for IoT security enhancement SM Muzammal, RK Murugesan 2018 Fourth International Conference on Advances in Computing, Communication …, 2018 | 16 | 2018 |
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices SM Muzammal, MA Shah, SJ Zhang, HJ Yang International journal of Automation and Computing 13, 350-363, 2016 | 14 | 2016 |
ScreenStealer: Addressing screenshot attacks on android devices SM Muzammal, MA Shah 2016 22nd International Conference on Automation and Computing (ICAC), 336-341, 2016 | 9 | 2016 |
Introducing mobility metrics in trust-based security of routing protocol for internet of things SM Muzammal, RK Murugesan, NZ Jhanjhi 2021 National Computing Colleges Conference (NCCC), 1-5, 2021 | 8 | 2021 |
A trust-based model for secure routing against RPL attacks in internet of things SM Muzammal, RK Murugesan, NZ Jhanjhi, M Humayun, AO Ibrahim, ... Sensors 22 (18), 7052, 2022 | 7 | 2022 |
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things SM Muzammal, RK Murugesan, NZ Jhanjhi, MS Hossain, A Yassine Sensors 22 (16), 6215, 2022 | 5 | 2022 |
A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology SM Muzammal, RK Murugesan Advances in Cyber Security: First International Conference, ACeS 2019 …, 2020 | 4 | 2020 |
Enhanced authentication and access control in Internet of Things: a potential blockchain-based method SM Muzammal, RK Murugesan International Journal of Grid and Utility Computing 12 (5-6), 469-485, 2021 | 2 | 2021 |
Edge caching for mobile devices MR Azeem, SM Muzammal, N Zaman, MA Khan 2022 14th International Conference on Mathematics, Actuarial Science …, 2022 | 1 | 2022 |
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks P Mahadevappa, SM Muzammal, RK Murugesan arXiv preprint arXiv:2111.01383, 2021 | 1 | 2021 |
Convolved Feature Vector Based Adaptive Fuzzy Filter for Image De-Noising M Habib, A Hussain, E Rehman, SM Muzammal, B Cheng, M Aslam, ... Applied Sciences 13 (8), 4861, 2023 | | 2023 |
Conceivable security risks and authentication techniques for smart devices SM Muzammal, MA Shah, S Zhang, H Yang Springer, 2016 | | 2016 |
A TRUST-BASED APPROACH FOR DEFENCE AGAINST RPL RANK ATTACK FOR INTERNET OF THINGS SM MUZAMMAL, RK MURUGESAN, NZ JHANJHI | | |