Internet of Things in Higher Education: A Study on Future Learning H Aldowah, SU Rehman, S Ghazal, IN Umar Journal of Physics Conference Series 892 (1), 1-10, 2017 | 343 | 2017 |
FCM–SVM based intrusion detection system for cloud computing environment AN Jaber, SU Rehman Cluster Computing 23 (4), 3221-3231, 2020 | 117 | 2020 |
Security in Internet of Things: Issues, Challenges, and Solutions H Aldowah, SU Rehman, I Umar Recent Trends in Data Science and Soft Computing, 396-405, 2018 | 48 | 2018 |
A Study of Smart Home Environment and its Security Threats SU Rehman, S Manickam International Journal of Reliability, Quality and Safety Engineering 23 (03 …, 2016 | 44 | 2016 |
Privacy and security of IoT based healthcare systems: concerns, solutions, and recommendations I Sadek, SU Rehman, J Codjo, B Abdulrazak How AI Impacts Urban Living and Public Health: 17th International Conference …, 2019 | 42 | 2019 |
An Overview of DDoS attacks based on DNS K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi 6th IEEE International Conference on ICT Convergence, October 19-21, 2016 …, 2016 | 39 | 2016 |
A SURVEY of MITIGATION TECHNIQUES AGAINST ECONOMIC DENIAL of SUSTAINABILITY (EDOS) ATTACK on CLOUD COMPUTING ARCHITECTURE P Singh, S Manickam, SU Rehman 3rd IEEE International Conference on Reliability, Infocom Technologies and …, 2014 | 36 | 2014 |
Improved Mechanism to Prevent Denial of Service Attacks in IPv6 Duplicate Address Detection Process SU Rehman, S Manickam International Journal of Advanced Computer Science and Applications(IJACSA …, 2017 | 21 | 2017 |
Trust in iot systems: a vision on the current issues, challenges, and recommended solutions H Aldowah, S Ul Rehman, I Umar Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 329-339, 2021 | 19 | 2021 |
Rule-based mechanism to detect Denial of Service (DoS) attacks on Duplicate Address Detection process in IPv6 link local communication SU Rehman, S Manickam 4th IEEE International Conference on Reliability, Infocom Technologies and …, 2015 | 19 | 2015 |
SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape SUA Laghari, S Manickam, AK Al-Ani, SU Rehman, S Karuppayah Ieee Access 9, 154380-154394, 2021 | 18 | 2021 |
Enhanced Mechanism to Detect and Mitigate Economic Denial of Sustainability (EDoS) Attack in Cloud Computing Environments PS Bawa, SU Rehman, S Manickam International Journal of Advanced Computer Science and Applications 8 (9), 51-58, 2017 | 17 | 2017 |
Denial of Service Attack in IPv6 Duplicate Address Detection Process SU Rehman, S Manickam (IJACSA) International Journal of Advanced Computer Science and Applications …, 2016 | 14 | 2016 |
Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process SU Rehman, S Manickam International Journal of Security and Its Applications 10 (4), 143-154, 2016 | 14 | 2016 |
Security and privacy in the internet of things healthcare systems: Toward a robust solution in real-life deployment I Sadek, J Codjo, SU Rehman, B Abdulrazak Computer Methods and Programs in Biomedicine Update, 2022 | 12 | 2022 |
Towards Sustainable IoT Ecosystem SU Rehman, P Singh, S Manickam, S Praptodiyono 2nd International Conference on Industrial Electrical and Electronics (ICIEE), 2020 | 12 | 2020 |
Significance of Duplicate Address Detection Mechanism in Ipv6 and its Security Issues: A Survey SU Rehman, S Manickam Indian Journal of Science and Technology 8 (30), 1-8, 2015 | 11 | 2015 |
Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques I Sadek, P Chong, SU Rehman, Y Elovici, A Binder Data in brief 26, 104437, 2019 | 9 | 2019 |
Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university SU Rehman, S Manickam, A Al-Charchafchi Education and Information Technologies 27 (9), 2022 | 7 | 2022 |
Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication SU Rehman, S Manickam International Journal of Security and Its Applications 9 (No.11 (2015), pp.77-86, 2015 | 7 | 2015 |