Leverging Behavior-based Rules For Malware Family Classification FS Fahim H. Abbasi, Abdul Salam US Patent 20,170,083,703, 2017 | 188* | 2017 |
IoT DoS and DDoS Attack Detection using ResNet F Hussain, SG Abbas, M Husnain, UU Fayyaz, F Shahzad, GA Shah 2020 IEEE 23rd International Multitopic Conference (INMIC), 1-6, 2020 | 147 | 2020 |
A Framework for Malicious Traffic Detection in IoT Healthcare Environment F Hussain, SG Abbas, GA Shah, IM Pires, UU Fayyaz, F Shahzad, ... Sensors 21 (9), 3025, 2021 | 140 | 2021 |
Secure biometric template generation for multi-factor authentication SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan Pattern Recognition 48 (2), 458-472, 2015 | 118 | 2015 |
A Survey on Security in Vehicular Ad Hoc Networks S Gillani, F Shahzad, A Qayyum, R Mehmood Communication Technologies for Vehicles, 59-74, 2013 | 103 | 2013 |
Opposition-based particle swarm optimization with velocity clamping (OVCPSO) F Shahzad, AR Baig, S Masood, M Kamran, N Naveed Advances in Computational Intelligence, 339-348, 2009 | 76 | 2009 |
IoT-Flock: An Open-source Framework for IoT Traffic Generation S Ghazanfar, F Hussain, AU Rehman, UU Fayyaz, F Shahzad, GA Shah arXiv preprint arXiv:2004.00844, 2020 | 74 | 2020 |
A Two-fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks F Hussain, SG Abbas, IM Pires, S Tanveer, UU Fayyaz, NM Garcia, ... IEEE Access, 2021 | 72 | 2021 |
ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables F Shahzad, M Farooq Knowledge and information systems 30 (3), 589-612, 2012 | 71 | 2012 |
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS F Shahzad, M Shahzad, M Farooq Information Sciences 231, 45-63, 2013 | 65 | 2013 |
Probabilistic opposition-based particle swarm optimization with velocity clamping F Shahzad, S Masood, NK Khan Knowledge and Information Systems 39 (3), 703-737, 2014 | 45 | 2014 |
In-execution malware detection using task structures of linux processes F Shahzad, S Bhatti, M Shahzad, M Farooq Communications (ICC), 2011 IEEE International Conference on, 1-6, 2011 | 34 | 2011 |
System and method for detecting cyberattacks impersonating legitimate sources MZ ul abadin Gardezi, M Saeed, H Ahmad, F Abbasi, F Shahzad US Patent App. 16/725,674, 2020 | 28 | 2020 |
Tstructdroid: Realtime malware detection using in-execution dynamic analysis of kernel process control blocks on android F Shahzad, M Akbar, S Khan, M Farooq National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2013 | 23 | 2013 |
An Auditing Framework for Vulnerability Analysis of IoT System I Nadir, Z Ahmad, H Mahmood, GA Shah, F Shahzad, M Umair, H Khan, ... 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 39-47, 2019 | 22 | 2019 |
A Hybrid Approach for Malware Family Classification N Aman, Y Saleem, FH Abbasi, F Shahzad International Conference on Applications and Techniques in Information …, 2017 | 18 | 2017 |
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source SG Abbas, M Husnain, UU Fayyaz, F Shahzad, GA Shah, K Zafar 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 12 | 2020 |
A survey on recent advances in malicious applications analysis and detection techniques for smartphones F Shahzad, MA Akbar, M Farooq National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2012 | 9 | 2012 |
A Hybrid Framework for Malware Detection on Smartphones using ELF Structural & PCB Runtime Traces F Shahzad, M Saleem, M Farooq Tech. Report TR-58 FAST-National University, Pakistan, 2012 | 7 | 2012 |
The DroidKnight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications MA Akbar, F Shahzad, M Farooq 23rd Virus Bulletin International Conference (VB2013)(Inpress). VB, 2013 | 2 | 2013 |