AdDroid: rule-based machine learning framework for android malware analysis A Mehtab, WB Shahid, T Yaqoob, MF Amjad, H Abbas, H Afzal, MN Saqib Mobile Networks and Applications 25, 180-192, 2020 | 45 | 2020 |
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis M Noor, H Abbas, WB Shahid Journal of Network and Computer Applications 103, 249-261, 2018 | 33 | 2018 |
DNS security challenges and best practices to deploy secure DNS with digital signatures MH Jalalzai, WB Shahid, MMW Iqbal 2015 12th International Bhurban Conference on Applied Sciences and …, 2015 | 30 | 2015 |
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling WB Shahid, B Aslam, H Abbas, SB Khalid, H Afzal Journal of Network and Computer Applications 198, 103270, 2022 | 29 | 2022 |
Cybersecurity standards in the context of operating system: practical aspects, analysis, and comparisons SWA Hamdani, H Abbas, AR Janjua, WB Shahid, MF Amjad, J Malik, ... ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021 | 29 | 2021 |
Forensic analysis of social networking applications on an android smartphone A Menahil, W Iqbal, M Iftikhar, WB Shahid, K Mansoor, S Rubab Wireless Communications and Mobile Computing 2021 (1), 5567592, 2021 | 21 | 2021 |
A malware evasion technique for auditing android anti-malware solutions S Mirza, H Abbas, WB Shahid, N Shafqat, M Fugini, Z Iqbal, Z Muhammad 2021 IEEE 30th International Conference on Enabling Technologies …, 2021 | 12 | 2021 |
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan T Yaqoob, F Mir, H Abbas, WB Shahid, N Shafqat, MF Amjad 2017 IEEE 19th International Conference on e-Health Networking, Applications …, 2017 | 9 | 2017 |
Security Assessment and Evaluation of VPNs: A Comprehensive Survey H Abbas, N Emmanuel, MF Amjad, T Yaqoob, M Atiquzzaman, Z Iqbal, ... ACM Computing Surveys 55 (13s), 1-47, 2023 | 7 | 2023 |
A deep learning assisted personalized deception system for countering web application attacks WB Shahid, B Aslam, H Abbas, H Afzal, SB Khalid Journal of Information Security and Applications 67, 103169, 2022 | 7 | 2022 |
Attaining accessibility and personalization with Socio-Captcha (SCAP) H Ishfaq, W Iqbal, WB Shahid 2015 12th International Bhurban Conference on Applied Sciences and …, 2015 | 5 | 2015 |
Automatic frequency planning and optimization algorithm for cellular networks M Umair, W Shahid, M Abbasi Proceedings of the World Congress on Engineering 2 (4-6), 2012 | 4 | 2012 |
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization WB Shahid, H Abbas, B Aslam, H Afzal, SB Khalid IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC …, 2021 | 3 | 2021 |
Deceiving eavesdroppers by real time persistent spoofing of android users’ location coordinates for privacy enhancement A Arshad, H Abbas, WB Shahid, A Azhar 2020 IEEE 29th International Conference on Enabling Technologies …, 2020 | 1 | 2020 |
Profiling vulnerabilities threatening dual persona in Android framework K Siddiquie, N Shafqat, A Masood, H Abbas, W bin Shahid 2019 International Conference on Advances in the Emerging Computing …, 2020 | 1 | 2020 |
A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks J Rubab, H Afzal, WB Shahid Asian Conference on Intelligent Information and Database Systems, 77-88, 2022 | | 2022 |
An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks W Bin Shahid, B Aslam, H Abbas, H Afzal, I Rashid Asian Conference on Intelligent Information and Database Systems, 183-195, 2022 | | 2022 |
A Revamp Malware Evasion Technique for Auditing Android Anti-Malware Solutions S Mirza, H Abbas, WB Shahid, N Shafqat, M Fugini, Z Iqbal, Z Muhammad | | |