Security in cloud computing: Opportunities and challenges M Ali, SU Khan, AV Vasilakos Information sciences 305, 357-383, 2015 | 996 | 2015 |
SeDaSC: secure data sharing in clouds M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya IEEE Systems Journal 11 (2), 395-404, 2017 | 244 | 2017 |
A taxonomy and survey on green data center networks K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ... Future Generation Computer Systems 36, 189-208, 2014 | 239 | 2014 |
Incremental proxy re-encryption scheme for mobile cloud computing environment AN Khan, MLM Kiah, SA Madani, M Ali, AR Khan, S Shamshirband The Journal of Supercomputing 68, 624-651, 2014 | 122 | 2014 |
DROPS: Division and replication of data in the cloud for optimal performance and security M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya IEEE Transactions on Cloud computing 6 (2), 303-315, 2018 | 88 | 2018 |
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment AN Khan, MLM Kiah, M Ali, SA Madani, AUR Khan, S Shamshirband The Journal of Supercomputing 70, 946-976, 2014 | 81 | 2014 |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing AN Khan, ML Mat Kiah, SA Madani, AR Khan, M Ali The Journal of Supercomputing 66, 1687-1706, 2013 | 72 | 2013 |
DaSCE: Data security for cloud environment with semi-trusted third party M Ali, S Malik, S Khan IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017 | 58 | 2017 |
Towards a fog enabled efficient car parking architecture KS Awaisi, A Abbas, M Zareei, HA Khattak, MUS Khan, M Ali, IU Din, ... IEEE Access 7, 159100-159111, 2019 | 54 | 2019 |
A survey on energy-efficient methodologies and architectures of network-on-chip A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ... Computers & Electrical Engineering 40 (8), 333-347, 2014 | 54 | 2014 |
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach AN Khan, ML Mat Kiah, M Ali, S Shamshirband, AR Khan Journal of Grid Computing 13, 651-675, 2015 | 45 | 2015 |
Personalized healthcare cloud services for disease risk assessment and wellness management using social media A Abbas, M Ali, MUS Khan, SU Khan Pervasive and Mobile Computing 28, 81-99, 2016 | 43 | 2016 |
A survey on privacy and access control schemes in fog computing T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ... International Journal of Communication Systems 34 (2), e4181, 2021 | 40 | 2021 |
A multi‐attack resilient lightweight IoT authentication scheme A Adeel, M Ali, AN Khan, T Khalid, F Rehman, Y Jararweh, J Shuja Transactions on Emerging Telecommunications Technologies 33 (3), e3676, 2022 | 38 | 2022 |
3D-RP: A DHT-based routing protocol for MANETs SA Abid, M Othman, N Shah, M Ali, AR Khan The Computer Journal 58 (2), 258-279, 2015 | 38 | 2015 |
Segregating spammers and unsolicited bloggers from genuine experts on Twitter MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016 | 36 | 2016 |
A fog-based security framework for intelligent traffic light control system T Khalid, AN Khan, M Ali, A Adeel, A ur Rehman Khan, J Shuja Multimedia Tools and Applications 78, 24595-24615, 2019 | 32 | 2019 |
Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs A Khurshid, AN Khan, FG Khan, M Ali, J Shuja, AR Khan Concurrency and Computation: Practice and Experience 31 (8), e4729, 2019 | 32 | 2019 |
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs) MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya IEEE Systems Journal 12 (1), 82-91, 2018 | 31 | 2018 |
Bot detection using a single post on social media S Mohammad, MUS Khan, M Ali, L Liu, M Shardlow, R Nawaz 2019 Third World Conference on Smart Trends in Systems Security and …, 2019 | 30 | 2019 |