A Novel Feature Set for Application Identification H Oudah, B Ghita, T Bakhshi Infonomics Society, 2018 | 1 | 2018 |
A novel features set for internet traffic classification using burstiness H Oudah, B Ghita, T Bakhshi SCITEPRESS-Science and Technology Publications, 2019 | 11 | 2019 |
A Practical Assessment of Social Engineering Vulnerabilities. T Bakhshi, M Papadaki, S Furnell HAISA, 12-23, 2008 | 42 | 2008 |
A Review of IoT Firmware Vulnerabilities and Auditing Techniques T Bakhshi, B Ghita, I Kuzminykh Sensors 24 (2), 708, 2024 | 4 | 2024 |
A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things S Zafar, M Nazir, T Bakhshi, HA Khattak, S Khan, M Bilal, KKR Choo, ... IEEE Access 9, 93529-93566, 2021 | 40 | 2021 |
An automated context-aware IoT vulnerability assessment rule-set generator F Hashmat, SG Abbas, S Hina, GA Shah, T Bakhshi, W Abbas Computer Communications 186, 133-152, 2022 | 10 | 2022 |
Anomalous Host Identification in High-Cardinality Network Streams using ML-Enabled Reverse-Sketching T Bakhshi, B Ghita, AB Yusuf IEEE International Conference on Electrical, Computer and Energy …, 2024 | | 2024 |
Anomaly detection in encrypted internet traffic using hybrid deep learning T Bakhshi, B Ghita Security and Communication Networks 2021 (1), 5363750, 2021 | 19 | 2021 |
Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques I Nadir, T Bakhshi 2018 International Conference on Computing, Mathematics and Engineering …, 2018 | 55 | 2018 |
Evaluating Learning Algorithms for Keystroke Based User Authentication T Xi, I Kuzminykh, T Bakhshi, B Ghita 2023 IEEE International Black Sea Conference on Communications and …, 2023 | | 2023 |
Exploring blockchain-secured data validation in smart meter readings ST Bokhari, T Aftab, I Nadir, T Bakhshi 2019 22nd international multitopic conference (INMIC), 1-7, 2019 | 7 | 2019 |
FIT 2017 TJ Chaudhery, S Khan, S Javed, N Naeem, I Ali, MA Habib, T Bakhshi, ... | | |
Forensic of things: Revisiting digital forensic investigations in internet of things T Bakhshi 2019 4th International Conference on Emerging Trends in Engineering …, 2019 | 18 | 2019 |
Hybrid Deep Learning Techniques for Securing Bioluminescent Interfaces in Internet of Bio Nano Things T Bakhshi, S Zafar Sensors 23 (21), 8972, 2023 | 2 | 2023 |
Identification of significant risks in pediatric acute lymphoblastic leukemia (ALL) through machine learning (ML) approach N Mahmood, S Shahid, T Bakhshi, S Riaz, H Ghufran, M Yaqoob Medical & Biological Engineering & Computing 58, 2631-2640, 2020 | 43 | 2020 |
Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach SG Abbas, I Vaccari, F Hussain, S Zahid, UU Fayyaz, GA Shah, T Bakhshi, ... Sensors 21 (14), 4816, 2021 | 39 | 2021 |
Information security risk assessment I Kuzminykh, B Ghita, V Sokolov, T Bakhshi Encyclopedia 1 (3), 602-617, 2021 | 40 | 2021 |
Information Security Risk Assessment. Encyclopedia 2021, 1, 602–617 I Kuzminykh, B Ghita, V Sokolov, T Bakhshi s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2021 | 2 | 2021 |
Internet of Profiling-Traffic, Users and Applications B Ghita, T Bakhshi 2018 International Conference on Communications (COMM), 27-32, 2018 | 1 | 2018 |
IoT-enabled smart city waste management using machine learning analytics T Bakhshi, M Ahmed 2018 2nd international conference on energy conservation and efficiency …, 2018 | 44 | 2018 |