关注
Dr Muhammad Usman
标题
引用次数
引用次数
年份
Anomaly detection in automated vehicles using multistage attention-based convolutional neural network
AR Javed, M Usman, SU Rehman, MU Khan, MS Haghighi
IEEE Transactions on Intelligent Transportation Systems 22 (7), 4291-4300, 2020
1742020
Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures
N Waheed, X He, M Ikram, M Usman, SS Hashmi, M Usman
ACM Computing Surveys (CSUR) 53 (6), 1-37, 2020
1672020
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq
IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020
1072020
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic
M Usman, V Muthukkumarasamy, XW Wu
IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015
562015
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks
K Hasan, MJM Chowdhury, K Biswas, K Ahmed, MS Islam, M Usman
Computer Networks 211, 109004, 2022
392022
Wireless smart home sensor networks: mobile agent based anomaly detection
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
322012
Mobile agent based hierarchical intrusion detection system in wireless sensor networks
S Khanum, M Usman, A Alwabel
International Journal of Computer Science Issues (IJCSI) 9 (1), 101, 2012
322012
Fuzzy-in-the-loop-driven low-cost and secure biometric user access to server
A Irshad, M Usman, SA Chaudhry, AK Bashir, A Jolfaei, G Srivastava
IEEE Transactions on Reliability 70 (3), 1014-1025, 2020
282020
Multiple access control for cognitive radio-based IEEE 802.11 ah networks
M Shafiq, M Ahmad, A Irshad, M Gohar, M Usman, M Khalil Afzal, JG Choi, ...
Sensors 18 (7), 2043, 2018
242018
A provable and secure mobile user authentication scheme for mobile cloud computing services
A Irshad, SA Chaudhry, M Shafiq, M Usman, M Asif, A Ghani
International Journal of Communication Systems 32 (14), e3980, 2019
232019
Trust establishment and estimation in cloud services: a systematic literature review
K Mahmud, M Usman
Journal of Network and Systems Management 27, 489-540, 2019
222019
Securing mobile agent based wireless sensor network applications on middleware
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 International symposium on communications and information technologies …, 2012
212012
An energy efficient clique based clustering and routing mechanism in wireless sensor networks
K Biswas, V Muthukkumarasamy, E Sithirasenan, M Usman
2013 9th International Wireless Communications and Mobile Computing …, 2013
182013
Energy-efficient intrusion detection system for wireless sensor network based on MUSK architecture
S Khanum, M Usman, K Hussain, R Zafar, M Sher
High Performance Computing and Applications: Second International Conference …, 2010
182010
A human-in-the-loop probabilistic CNN-fuzzy logic framework for accident prediction in vehicular networks
M Usman, A Carie, B Marapelli, HD Bedru, K Biswas
IEEE Sensors Journal 21 (14), 15496-15503, 2020
172020
Security Enhancement in MANET Authentication by checking the CRL Status of Servers
A Irshad, W Noshairwan, M Shafiq, S Khurram, E Irshad, M Usman
Int J Adv Sci Technol 1, 91-98, 2008
172008
Application threats to exploit northbound Interface vulnerabilities in software defined networks
B Rauf, H Abbas, M Usman, TA Zia, W Iqbal, Y Abbas, H Afzal
ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021
142021
A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic
MJM Chowdhury, M Usman, MS Ferdous, N Chowdhury, AI Harun, ...
IEEE Internet of Things Journal 9 (16), 14779-14789, 2021
112021
Group Mobility in Mobile Ad hoc Networks
E Irshad, W Noshairwain, M Usman, A Irshad, M Gilani
WWW/Internet, IADIS Germany 102, 2008
102008
Elective learning objects group recommendation using non-cooperative game theory
A Zia, M Usman
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
92018
系统目前无法执行此操作,请稍后再试。
文章 1–20