Name
Affiliation
Papers
HAIDER ABBAS
National University of Sciences and Technology, Islamabad, Pakistan,Center of Excellence in Information Assurance, King Saud University, Saudi Arabia
104
Collaborators
Citations 
PageRank 
217
391
43.88
Referers 
Referees 
References 
1253
2601
929
Search Limit
1001000
Title
Citations
PageRank
Year
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN00.342022
Efficient Attribute-Based Encryption With Repeated Attributes Optimization00.342021
Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework10.362021
User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications40.482021
Textual analysis of traitor-based dataset through semi supervised machine learning10.342021
An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing20.372021
Ads: An Adaptive Spectrum Sensing Technique For Survivability Under Jamming Attack In Cognitive Radio Networks10.352021
Robust, Secure and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings00.342021
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes20.382021
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons00.342021
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations00.342021
Hand-based multibiometric systems: state-of-the-art and future challenges00.342021
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP10.362020
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks00.342020
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks20.372020
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices.20.432020
An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security90.492020
Cognitive computing for intelligent application and service00.342020
DST-HRS: A topic driven hybrid recommender system based on deep semantics20.362020
Multi-task reading for intelligent legal services00.342020
Analytical study of hardware-rooted security standards and their implementation techniques in mobile00.342020
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis00.342020
Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards.00.342020
Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems20.372020
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages00.342020
Delay Reduction Through Optimal Controller Placement To Boost Scalability In An Sddc00.342020
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.00.342019
A hybrid-adaptive neuro-fuzzy inference system for multi-objective regression test suites optimization00.342019
CATSWoTS: Context Aware Trustworthy Social Web of Things System.10.352019
A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata00.342019
Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint.00.342019
Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT)00.342019
Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations00.342019
A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques.10.342019
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review20.382019
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy.00.342019
Blockchain's adoption in IoT: The challenges, and a way forward.100.602019
Smart e-commerce integration with recommender systems10.352019
Approximate computing using frequency upscaling00.342019
Flow Constraint Language for Coordination by Exogenous Connectors00.342019
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems.00.342019
AndroKit: A toolkit for forensics analysis of web browsers on android platform.00.342019
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach.10.362019
iBike: Intelligent public bicycle services assisted by data analytics10.422019
Fog computing in internet of things: Practical applications and future directions20.352019
Trust models of internet of smart things: A survey, open issues, and future directions.60.422019
A complex event processing framework for an adaptive language learning system.10.352019
Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review.00.342018
Mobile Intelligence Assisted by Data Analytics and Cognitive Computing.00.342018
Antenna and Propagation Considerations for Amateur UAV Monitoring.10.352018
  • 1
  • 2