Smart Cities: A Survey on Security Concerns AKMA Sidra Ijaz, Munam Ali Shah International Journal of Advanced Computer Science and Applications 7 (2), 2016 | 184 | 2016 |
Android Malware Detection & Protection: A Survey AKMA Saba Arshad, Munam Ali Shah International Journal of Advanced Computer Science and Applications 7 (2), 2016 | 139 | 2016 |
Leveraging IoT and fog computing in healthcare systems KS Awaisi, S Hussain, M Ahmed, AA Khan, G Ahmed IEEE Internet of Things Magazine 3 (2), 52-56, 2020 | 88 | 2020 |
CDED-Net: Joint segmentation of optic disc and optic cup for glaucoma screening M Tabassum, TM Khan, M Arsalan, SS Naqvi, M Ahmed, HA Madni, ... IEEE access 8, 102733-102747, 2020 | 74 | 2020 |
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks MMR Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy Future Generation Computer Systems 82, 274-289, 2018 | 74 | 2018 |
SemanticLIFE ‐A Framework for Managing Information of A Human Lifetime MA Hoang H.H., Karim M.S., Khusro S., LanzenbergerM., Latif K., Michlmayr E ... Proceedings of 6th International Conference on Information Integration and …, 2004 | 63* | 2004 |
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks MA Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan Sensors 16, 2016 | 55 | 2016 |
Intelligent role-based access control model and framework using semantic business roles in multi-domain environments R Ghazal, AK Malik, N Qadeer, B Raza, AR Shahid, H Alquhayz IEEE Access 8, 12253-12267, 2020 | 44 | 2020 |
Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends A Khan, A Ahmad, M Ahmed, J Sessa, M Anisetti Complex & Intelligent Systems 8 (5), 3919-3941, 2022 | 32 | 2022 |
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS) S Beg, A Anjum, M Ahmad, S Hussain, G Ahmad, S Khan, KKR Choo Journal of Network and Computer Applications 174, 102874, 2021 | 30 | 2021 |
BCALS: Blockchain‐based secure log management system for cloud computing A Ali, A Khan, M Ahmed, G Jeon Transactions on Emerging Telecommunications Technologies 33 (4), e4272, 2022 | 29 | 2022 |
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes T Kanwal, SAA Shaukat, A Anjum, KKR Choo, A Khan, N Ahmad, ... Information Sciences 488, 238-256, 2019 | 29 | 2019 |
Towards ontology-based multilingual URL filtering: A Big Data Problem GJ Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid ... The Journal of Supercomputing 74 (10), 5003–5021, 2018 | 29* | 2018 |
τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates MMA Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman ... Computer and Security: Elsevier 66, 20-39, 2017 | 28* | 2017 |
Security and privacy issues in fog computing A Ali, M Ahmed, M Imran, HA Khattak Fog computing: Theory and practice, 105-137, 2020 | 27 | 2020 |
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ... Sustainable cities and society 40, 326-334, 2018 | 24 | 2018 |
Energy theft detection in smart grids: Taxonomy, comparative analysis, challenges, and future research directions M Ahmed, A Khan, M Ahmed, M Tahir, G Jeon, G Fortino, F Piccialli IEEE/CAA Journal of Automatica Sinica 9 (4), 578-600, 2022 | 23 | 2022 |
Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges MKK Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada Journal of Network and Computer Applications 100, 80-94, 2017 | 23 | 2017 |
Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE AMT Mansoor Ahmed, Amin Anjomshoaa International Conference on Availability, Reliability and Security, 2007 | 20* | 2007 |
A semantic rule based digital fraud detection M Ahmed, K Ansar, CB Muckley, A Khan, A Anjum, M Talha PeerJ Computer Science 7, e649, 2021 | 18 | 2021 |