Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Junaid Arshad
@article{DBLP:journals/cee/ParachaAK23, author = {Anum Atique Paracha and Junaid Arshad and Muhammad Mubashir Khan}, title = {{S.U.S.} You're SUS! - Identifying influencer hackers on dark web social networks}, journal = {Comput. Electr. Eng.}, volume = {107}, pages = {108627}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108627}, doi = {10.1016/J.COMPELECENG.2023.108627}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ParachaAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/AlsadiAAPS23, author = {Mohammed Alsadi and Junaid Arshad and Jahid Ali and Alousseynou Prince and Shishank Shishank}, title = {TruCert: Blockchain-based trustworthy product certification within autonomous automotive supply chains}, journal = {Comput. Electr. Eng.}, volume = {109}, number = {Part {B}}, pages = {108738}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108738}, doi = {10.1016/J.COMPELECENG.2023.108738}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/AlsadiAAPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NasirAK23, author = {Muhammad Hassan Nasir and Junaid Arshad and Muhammad Mubashir Khan}, title = {Collaborative device-level botnet detection for internet of things}, journal = {Comput. Secur.}, volume = {129}, pages = {103172}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103172}, doi = {10.1016/J.COSE.2023.103172}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NasirAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KhanHKAK23, author = {Muhammad Mubashir Khan and Muhammad Faraz Hyder and Shariq Mahmood Khan and Junaid Arshad}, title = {Ransomware prevention using moving target defense based approach}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {7}, year = {2023}, url = {https://doi.org/10.1002/cpe.7592}, doi = {10.1002/CPE.7592}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KhanHKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AzadRARAA23, author = {Muhammad Ajmal Azad and Farhan Riaz and Anum Aftab and Syed Khurram Jah Rizvi and Junaid Arshad and Hany F. Atlam}, title = {Corrigendum to "DEEPSEL: {A} novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 {(2022)} 54-63]}, journal = {Future Gener. Comput. Syst.}, volume = {143}, pages = {422}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.02.026}, doi = {10.1016/J.FUTURE.2023.02.026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AzadRARAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-sen/GaoHBAY23, author = {Honghao Gao and Walayat Hussain and Ram{\'{o}}n J. Dur{\'{a}}n Barroso and Junaid Arshad and Yuyu Yin}, title = {Guest Editorial: Machine learning applied to quality and security in software systems}, journal = {{IET} Softw.}, volume = {17}, number = {4}, pages = {345--347}, year = {2023}, url = {https://doi.org/10.1049/sfw2.12141}, doi = {10.1049/SFW2.12141}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-sen/GaoHBAY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/AwanAAWS23, author = {Samia Masood Awan and Muhammad Ajmal Azad and Junaid Arshad and Urooj Waheed and Tahir Sharif}, title = {A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT}, journal = {Inf.}, volume = {14}, number = {2}, pages = {129}, year = {2023}, url = {https://doi.org/10.3390/info14020129}, doi = {10.3390/INFO14020129}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/AwanAAWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/MahmoudAAA23, author = {Haitham Mahmoud and Muhammad Ajmal Azad and Junaid Arshad and Adel Aneiba}, title = {A Framework for Decentralized, Real-Time Reputation Aggregation in IoV}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {2}, pages = {44--48}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2300033}, doi = {10.1109/IOTM.001.2300033}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/MahmoudAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/WangAAL23, author = {Yonghao Wang and Jahid Ali and Junaid Arshad and Yunxia Liu}, title = {A Proxy-Layer Approach to Secure Smart Contract Deployment on Private EVM-Based PoA Blockchains}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023}, pages = {109--112}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/Blockchain60715.2023.00027}, doi = {10.1109/BLOCKCHAIN60715.2023.00027}, timestamp = {Thu, 22 Feb 2024 20:11:26 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/WangAAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ArshadAPAP22, author = {Junaid Arshad and Muhammad Ajmal Azad and Alousseynou Prince and Jahid Ali and Thanasis G. Papaioannou}, title = {{REPUTABLE-A} Decentralized Reputation System for Blockchain-Based Ecosystems}, journal = {{IEEE} Access}, volume = {10}, pages = {79948--79961}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3194038}, doi = {10.1109/ACCESS.2022.3194038}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ArshadAPAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/OmarDJSOA22, author = {Ilhaam A. Omar and Mazin Debe and Raja Jayaraman and Khaled Salah and Mohammed A. Omar and Junaid Arshad}, title = {Blockchain-based Supply Chain Traceability for {COVID-19} personal protective equipment}, journal = {Comput. Ind. Eng.}, volume = {167}, pages = {107995}, year = {2022}, url = {https://doi.org/10.1016/j.cie.2022.107995}, doi = {10.1016/J.CIE.2022.107995}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/OmarDJSOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KhanAIAZ22, author = {Kashif Mehboob Khan and Junaid Arshad and Waheed Iqbal and Sidrah Abdullah and Hassan Zaib}, title = {Blockchain-enabled real-time {SLA} monitoring for cloud-hosted services}, journal = {Clust. Comput.}, volume = {25}, number = {1}, pages = {537--559}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03416-y}, doi = {10.1007/S10586-021-03416-Y}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/KhanAIAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/distribledger/AbdullahAA22, author = {Sidrah Abdullah and Junaid Arshad and Muhammad Alsadi}, title = {Chain-Net: An Internet-inspired Framework for Interoperable Blockchains}, journal = {Distributed Ledger Technol. Res. Pract.}, volume = {1}, number = {2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.1145/3554761}, doi = {10.1145/3554761}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/distribledger/AbdullahAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/AzadAMSI22, author = {Muhammad Ajmal Azad and Junaid Arshad and Shazia Mahmoud and Khaled Salah and Muhammad Imran}, title = {A privacy-preserving framework for smart context-aware healthcare applications}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {8}, year = {2022}, url = {https://doi.org/10.1002/ett.3634}, doi = {10.1002/ETT.3634}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/AzadAMSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/FarooquiKAS22, author = {M. Najmul Islam Farooqui and Muhammad Mubashir Khan and Junaid Arshad and Omair Shafiq}, title = {An empirical investigation of performance challenges within context-aware content sharing for vehicular ad hoc networks}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {10}, year = {2022}, url = {https://doi.org/10.1002/ett.4157}, doi = {10.1002/ETT.4157}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/FarooquiKAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/NasirAKFSJ22, author = {Muhammad Hassan Nasir and Junaid Arshad and Muhammad Mubashir Khan and Mahawish Fatima and Khaled Salah and Raja Jayaraman}, title = {Scalable blockchains - {A} systematic review}, journal = {Future Gener. Comput. Syst.}, volume = {126}, pages = {136--162}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.07.035}, doi = {10.1016/J.FUTURE.2021.07.035}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/NasirAKFSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AzadRARAA22, author = {Muhammad Ajmal Azad and Farhan Riaz and Anum Aftab and Syed Khurram Jah Rizvi and Junaid Arshad and Hany F. Atlam}, title = {{DEEPSEL:} {A} novel feature selection for early identification of malware in mobile applications}, journal = {Future Gener. Comput. Syst.}, volume = {129}, pages = {54--63}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.10.029}, doi = {10.1016/J.FUTURE.2021.10.029}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AzadRARAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/DeguaraAPA22, author = {Nathan Deguara and Junaid Arshad and Anum Paracha and Muhammad Ajmal Azad}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Threat Miner - {A} Text Analysis Engine for Threat Identification Using Dark Web Data}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {3043--3052}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020397}, doi = {10.1109/BIGDATA55660.2022.10020397}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/DeguaraAPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MusamihSJADAE21, author = {Ahmad Musamih and Khaled Salah and Raja Jayaraman and Junaid Arshad and Mazin Debe and Yousof Al{-}Hammadi and Samer Ellahham}, title = {A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain}, journal = {{IEEE} Access}, volume = {9}, pages = {9728--9743}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3049920}, doi = {10.1109/ACCESS.2021.3049920}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MusamihSJADAE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlkhooriHADSJAR21, author = {Omar Alkhoori and Abduraouf Hassan and Omar Almansoori and Mazin Debe and Khaled Salah and Raja Jayaraman and Junaid Arshad and Muhammad Habib Ur Rehman}, title = {Design and Implementation of CryptoCargo: {A} Blockchain-Powered Smart Shipping Container for Vaccine Distribution}, journal = {{IEEE} Access}, volume = {9}, pages = {53786--53803}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3070911}, doi = {10.1109/ACCESS.2021.3070911}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlkhooriHADSJAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MadineSJAAY21, author = {Mohammad Moussa Madine and Khaled Salah and Raja Jayaraman and Yousof Al{-}Hammadi and Junaid Arshad and Ibrar Yaqoob}, title = {appXchain: Application-Level Interoperability for Blockchain Networks}, journal = {{IEEE} Access}, volume = {9}, pages = {87777--87791}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3089603}, doi = {10.1109/ACCESS.2021.3089603}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MadineSJAAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DebeSJYA21, author = {Mazin Debe and Khaled Salah and Raja Jayaraman and Ibrar Yaqoob and Junaid Arshad}, title = {Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices}, journal = {{IEEE} Access}, volume = {9}, pages = {132875--132887}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3115150}, doi = {10.1109/ACCESS.2021.3115150}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DebeSJYA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KhanKKAA21, author = {Ammar Ahmed Khan and Muhammad Mubashir Khan and Kashif Mehboob Khan and Junaid Arshad and Farhan Ahmad}, title = {A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs}, journal = {Comput. Networks}, volume = {196}, pages = {108217}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108217}, doi = {10.1016/J.COMNET.2021.108217}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KhanKKAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanAK21, author = {Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan}, title = {Empirical analysis of transaction malleability within blockchain-based e-Voting}, journal = {Comput. Secur.}, volume = {100}, pages = {102081}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102081}, doi = {10.1016/J.COSE.2020.102081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhanAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AzadAARAIA21, author = {Muhammad Ajmal Azad and Junaid Arshad and Syed Muhammad Ali Akmal and Farhan Riaz and Sidrah Abdullah and Muhammad Imran and Farhan Ahmad}, title = {A First Look at Privacy Analysis of {COVID-19} Contact-Tracing Mobile Applications}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {21}, pages = {15796--15806}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3024180}, doi = {10.1109/JIOT.2020.3024180}, timestamp = {Tue, 11 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/AzadAARAIA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbi/ArshadAKP21, author = {Saadia Arshad and Junaid Arshad and Muhammad Mubashir Khan and Simon Parkinson}, title = {Analysis of security and privacy challenges for DNA-genomics applications and databases}, journal = {J. Biomed. Informatics}, volume = {119}, pages = {103815}, year = {2021}, url = {https://doi.org/10.1016/j.jbi.2021.103815}, doi = {10.1016/J.JBI.2021.103815}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbi/ArshadAKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lht/FarooquiAK21, author = {M. Najmul Islam Farooqui and Junaid Arshad and Muhammad Mubashir Khan}, title = {A bibliometric approach to quantitatively assess current research trends in 5G security}, journal = {Libr. Hi Tech}, volume = {39}, number = {4}, pages = {1097--1120}, year = {2021}, url = {https://doi.org/10.1108/LHT-04-2021-0133}, doi = {10.1108/LHT-04-2021-0133}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lht/FarooquiAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MuhammadKAAK21, author = {Mujahid Muhammad and Paul Kearney and Adel Aneiba and Junaid Arshad and Andreas Kunz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{RMCCS:} RSSI-based Message Consistency Checking Scheme for {V2V} Communications}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {722--727}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010561107220727}, doi = {10.5220/0010561107220727}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MuhammadKAAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlkhaderASJAO20, author = {Wala' Alkhader and Nouf Alkaabi and Khaled Salah and Raja Jayaraman and Junaid Arshad and Mohammed A. Omar}, title = {Blockchain-Based Traceability and Management for Additive Manufacturing}, journal = {{IEEE} Access}, volume = {8}, pages = {188363--188377}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3031536}, doi = {10.1109/ACCESS.2020.3031536}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlkhaderASJAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DebeSJA20, author = {Mazin Debe and Khaled Salah and Raja Jayaraman and Junaid Arshad}, title = {Blockchain-Based Verifiable Tracking of Resellable Returned Drugs}, journal = {{IEEE} Access}, volume = {8}, pages = {205848--205862}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3037363}, doi = {10.1109/ACCESS.2020.3037363}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DebeSJA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HasanSJAYOE20, author = {Haya R. Hasan and Khaled Salah and Raja Jayaraman and Junaid Arshad and Ibrar Yaqoob and Mohammed A. Omar and Samer Ellahham}, title = {Blockchain-Based Solution for {COVID-19} Digital Medical Passports and Immunity Certificates}, journal = {{IEEE} Access}, volume = {8}, pages = {222093--222108}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3043350}, doi = {10.1109/ACCESS.2020.3043350}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HasanSJAYOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ShahidKZAS20, author = {Farah Shahid and Asifullah Khan and Aneela Zameer and Junaid Arshad and Kamran Safdar}, title = {Wind power prediction using a three stage genetic ensemble and auxiliary predictor}, journal = {Appl. Soft Comput.}, volume = {90}, pages = {106151}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106151}, doi = {10.1016/J.ASOC.2020.106151}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/ShahidKZAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KhanAK20, author = {Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan}, title = {Simulation of transaction malleability attack for blockchain-based e-Voting}, journal = {Comput. Electr. Eng.}, volume = {83}, pages = {106583}, year = {2020}, url = {https://doi.org/10.1016/j.compeleceng.2020.106583}, doi = {10.1016/J.COMPELECENG.2020.106583}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KhanAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KhanAK20, author = {Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan}, title = {Investigating performance constraints for blockchain based secure e-voting system}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {13--26}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.11.005}, doi = {10.1016/J.FUTURE.2019.11.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/KhanAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AzadARAA20, author = {Muhammad Ajmal Azad and Mamoun Alazab and Farhan Riaz and Junaid Arshad and Tariq Abullah}, title = {Socioscope: {I} know who you are, a robo, human caller or service number}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {297--307}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.11.007}, doi = {10.1016/J.FUTURE.2019.11.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AzadARAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FaizAAS20, author = {Mohamed Falah Faiz and Junaid Arshad and Mamoun Alazab and Andrii Shalaginov}, title = {Predicting likelihood of legitimate data loss in email {DLP}}, journal = {Future Gener. Comput. Syst.}, volume = {110}, pages = {744--757}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.11.004}, doi = {10.1016/J.FUTURE.2019.11.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/FaizAAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-13354, author = {Muhammad Ajmal Azad and Junaid Arshad and Ali Akmal and Sidrah Abdullah and Farhan Ahmad and Muhammad Ali Imran and Farhan Riaz}, title = {A First Look at Contact Tracing Apps}, journal = {CoRR}, volume = {abs/2006.13354}, year = {2020}, url = {https://arxiv.org/abs/2006.13354}, eprinttype = {arXiv}, eprint = {2006.13354}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-13354.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/NizamuddinSAAR19, author = {Nishara Nizamuddin and Khaled Salah and M. Ajmal Azad and Junaid Arshad and Muhammad Habib Ur Rehman}, title = {Decentralized document version control using ethereum blockchain and {IPFS}}, journal = {Comput. Electr. Eng.}, volume = {76}, pages = {183--197}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2019.03.014}, doi = {10.1016/J.COMPELECENG.2019.03.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/NizamuddinSAAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ArshadASITU19, author = {Junaid Arshad and Muhammad Ajmal Azad and Khaled Salah and Razi Iqbal and Muhammad Imran Tariq and Tariq Umer}, title = {Performance analysis of content discovery for ad-hoc tactile networks}, journal = {Future Gener. Comput. Syst.}, volume = {94}, pages = {726--739}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.11.037}, doi = {10.1016/J.FUTURE.2018.11.037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ArshadASITU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RiazAAIHR19, author = {Farhan Riaz and Muhammad Ajmal Azad and Junaid Arshad and Muhammad Imran and Ali Hassan and Saad Rehman}, title = {Pervasive blood pressure monitoring using Photoplethysmogram {(PPG)} sensor}, journal = {Future Gener. Comput. Syst.}, volume = {98}, pages = {120--130}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.02.032}, doi = {10.1016/J.FUTURE.2019.02.032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RiazAAIHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/ArshadAARS19, author = {Junaid Arshad and Muhammad Ajmal Azad and Mohammad Mahmoud Abdellatif and Muhammad Habib Ur Rehman and Khaled Salah}, title = {{COLIDE:} a collaborative intrusion detection framework for Internet of Things}, journal = {{IET} Networks}, volume = {8}, number = {1}, pages = {3--14}, year = {2019}, url = {https://doi.org/10.1049/iet-net.2018.5036}, doi = {10.1049/IET-NET.2018.5036}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/ArshadAARS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AliSA19, author = {Anum Ali and Ghalib A. Shah and Junaid Arshad}, title = {Energy Efficient Resource Allocation for {M2M} Devices in 5G}, journal = {Sensors}, volume = {19}, number = {8}, pages = {1830}, year = {2019}, url = {https://doi.org/10.3390/s19081830}, doi = {10.3390/S19081830}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AliSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijegr/KhanAK18, author = {Kashif Mehboob Khan and Junaid Arshad and Muhammad Mubashir Khan}, title = {Secure Digital Voting System Based on Blockchain Technology}, journal = {Int. J. Electron. Gov. Res.}, volume = {14}, number = {1}, pages = {53--62}, year = {2018}, url = {https://doi.org/10.4018/IJEGR.2018010103}, doi = {10.4018/IJEGR.2018010103}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijegr/KhanAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/AzadAR18, author = {Muhammad Ajmal Azad and Junaid Arshad and Farhan Riaz}, editor = {Simon Parkinson and Andrew Crampton and Richard Hill}, title = {{SOCIO-LENS:} Spotting Unsolicited Caller Through Network Analysis}, booktitle = {Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach}, series = {Computer Communications and Networks}, pages = {235--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92624-7\_10}, doi = {10.1007/978-3-319-92624-7\_10}, timestamp = {Sat, 05 Sep 2020 17:42:16 +0200}, biburl = {https://dblp.org/rec/series/ccn/AzadAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-09160, author = {Junaid Arshad and Muhammad Ajmal Azad and Khaled Salah and Wei Jie and Razi Iqbal and Mamoun Alazab}, title = {A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT}, journal = {CoRR}, volume = {abs/1812.09160}, year = {2018}, url = {http://arxiv.org/abs/1812.09160}, eprinttype = {arXiv}, eprint = {1812.09160}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-09160.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/ArshadTKWT16, author = {Junaid Arshad and G{\'{a}}bor Tersty{\'{a}}nszky and Tam{\'{a}}s Kiss and Noam Weingarten and Giuliano Taffoni}, title = {A Formal Approach to Support Interoperability in Scientific Meta-workflows}, journal = {J. Grid Comput.}, volume = {14}, number = {4}, pages = {655--671}, year = {2016}, url = {https://doi.org/10.1007/s10723-016-9383-x}, doi = {10.1007/S10723-016-9383-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/ArshadTKWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcheminf/ArshadHGGKKHT16, author = {Junaid Arshad and Alexander Hoffmann and Sandra Gesing and Richard Grunzke and Jens Kr{\"{u}}ger and Tam{\'{a}}s Kiss and Sonja Herres{-}Pawlis and G{\'{a}}bor Tersty{\'{a}}nszky}, title = {Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry}, journal = {J. Cheminformatics}, volume = {8}, number = {1}, pages = {58:1--58:17}, year = {2016}, url = {https://doi.org/10.1186/s13321-016-0169-8}, doi = {10.1186/S13321-016-0169-8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcheminf/ArshadHGGKKHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AliSA16, author = {Anum Ali and Ghalib A. Shah and Junaid Arshad}, title = {Energy efficient techniques for {M2M} communication: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {68}, pages = {42--55}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.04.002}, doi = {10.1016/J.JNCA.2016.04.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AliSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AzadMAS16, author = {Muhammad Ajmal Azad and Ricardo Morla and Junaid Arshad and Khaled Salah}, title = {Clustering VoIP caller for {SPIT} identification}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {4827--4838}, year = {2016}, url = {https://doi.org/10.1002/sec.1656}, doi = {10.1002/SEC.1656}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AzadMAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsg/PierantoniFGOJT16, author = {Gabriele Pierantoni and Dermot Frost and Sandra Gesing and S{\'{\i}}lvia Delgado Olabarriaga and Mohammad Mahdi Jaghoori and G{\'{a}}bor Tersty{\'{a}}nszky and Junaid Arshad}, editor = {Sandra Gesing and Jens Kr{\"{u}}ger}, title = {A Model for Information and Action Flows Connecting Science Gateways to Distributed Computing Infrastructures}, booktitle = {Proceedings of the 8th International Workshop on Science Gateways, {IWSG} 2016, Rome, Italy, June 8-10, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1871}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1871/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:48 +0100}, biburl = {https://dblp.org/rec/conf/iwsg/PierantoniFGOJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/ArshadZK14, author = {Junaid Arshad and Aneela Zameer and Asifullah Khan}, title = {Wind Power Prediction Using Genetic Programming Based Ensemble of Artificial Neural Networks (GPeANN)}, booktitle = {12th International Conference on Frontiers of Information Technology, {FIT} 2014, Islamabad, Pakistan, December 17-19, 2014}, pages = {257--262}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FIT.2014.55}, doi = {10.1109/FIT.2014.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fit/ArshadZK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ArshadTX13, author = {Junaid Arshad and Paul Townend and Jie Xu}, title = {A novel intrusion severity analysis approach for Clouds}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {1}, pages = {416--428}, year = {2013}, url = {https://doi.org/10.1016/j.future.2011.08.009}, doi = {10.1016/J.FUTURE.2011.08.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ArshadTX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/ArshadAJT13, author = {Junaid Arshad and Muhammad Ajmal Azad and Imran Ali Jokhio and Paul Townend}, title = {Intrusion damage assessment for multi-stage attacks for clouds}, journal = {{IET} Commun.}, volume = {7}, number = {12}, pages = {1304--1315}, year = {2013}, url = {https://doi.org/10.1049/iet-com.2012.0707}, doi = {10.1049/IET-COM.2012.0707}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/ArshadAJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijghpc/ArshadTXJ12, author = {Junaid Arshad and Paul Townend and Jie Xu and Wei Jie}, title = {Cloud Computing Security: Opportunities and Pitfalls}, journal = {Int. J. Grid High Perform. Comput.}, volume = {4}, number = {1}, pages = {52--66}, year = {2012}, url = {https://doi.org/10.4018/jghpc.2012010104}, doi = {10.4018/JGHPC.2012010104}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijghpc/ArshadTXJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/JieASTL11, author = {Wei Jie and Junaid Arshad and Richard O. Sinnott and Paul Townend and Zhou Lei}, title = {A review of grid authentication and authorization technologies and support for federated access control}, journal = {{ACM} Comput. Surv.}, volume = {43}, number = {2}, pages = {12:1--12:26}, year = {2011}, url = {https://doi.org/10.1145/1883612.1883619}, doi = {10.1145/1883612.1883619}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/JieASTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijautcomp/ArshadTX11, author = {Junaid Arshad and Paul Townend and Jie Xu}, title = {An automatic intrusion diagnosis approach for clouds}, journal = {Int. J. Autom. Comput.}, volume = {8}, number = {3}, pages = {286}, year = {2011}, url = {https://doi.org/10.1007/s11633-011-0584-2}, doi = {10.1007/S11633-011-0584-2}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijautcomp/ArshadTX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/ArshadTX11, author = {Junaid Arshad and Paul Townend and Jie Xu}, title = {An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds}, journal = {Int. J. Cloud Appl. Comput.}, volume = {1}, number = {1}, pages = {1--16}, year = {2011}, url = {https://doi.org/10.4018/ijcac.2011010101}, doi = {10.4018/IJCAC.2011010101}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/ArshadTX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcetech/BaylissSJA11, author = {Christopher Bayliss and Richard O. Sinnott and Wei Jie and Junaid Arshad}, editor = {Gilbert Babin and Katarina Stanoevska{-}Slabeva and Peter G. Kropf}, title = {The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research}, booktitle = {E-Technologies: Transformation in a Connected World - 5th International Conference, {MCETECH} 2011, Les Diablerets, Switzerland, January 23-26, 2011, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {78}, pages = {211--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20862-1\_15}, doi = {10.1007/978-3-642-20862-1\_15}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mcetech/BaylissSJA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/ArshadT011, author = {Junaid Arshad and Paul Townend and Jie Xu}, editor = {Xiaoyu Yang and Lizhe Wang and Wei Jie}, title = {An Intrusion Diagnosis Perspective on Cloud Computing}, booktitle = {Guide to e-Science, Next Generation Scientific Research and Discovery}, series = {Computer Communications and Networks}, pages = {299--319}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-0-85729-439-5\_11}, doi = {10.1007/978-0-85729-439-5\_11}, timestamp = {Thu, 26 Nov 2020 17:53:47 +0100}, biburl = {https://dblp.org/rec/series/ccn/ArshadT011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/JieAE10, author = {Wei Jie and Junaid Arshad and Pascal Ekin}, title = {Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences}, journal = {J. Supercomput.}, volume = {52}, number = {1}, pages = {82--96}, year = {2010}, url = {https://doi.org/10.1007/s11227-009-0267-8}, doi = {10.1007/S11227-009-0267-8}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/JieAE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/LiLWWAL10, author = {Bo Li and Jianxin Li and Tianyu Wo and Xudong Wu and Junaid Arshad and Wantao Liu}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {115--128}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_10}, doi = {10.1007/978-3-642-13577-4\_10}, timestamp = {Tue, 07 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/LiLWWAL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ArshadTX09, author = {Junaid Arshad and Paul Townend and Jie Xu}, title = {Quantification of Security for Compute Intensive Workloads in Clouds}, booktitle = {15th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2009, Shenzhen, China, December 8-11, 2009}, pages = {479--486}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICPADS.2009.46}, doi = {10.1109/ICPADS.2009.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ArshadTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/JieYAFPT08, author = {Wei Jie and Alistair Young and Junaid Arshad and June Finch and Rob Procter and Andy Turner}, editor = {Marten van Sinderen and Jo{\~{a}}o Paulo A. Almeida and Lu{\'{\i}}s Ferreira Pires and Maarten Steen}, title = {A Guanxi Shibboleth based Security Infrastructure}, booktitle = {Workshops Proceedings of the 12th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOCW} 2008, 16 September 2008, Munich, Germany}, pages = {151--158}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDOCW.2008.6}, doi = {10.1109/EDOCW.2008.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/JieYAFPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ArshadA06, author = {Junaid Arshad and Muhammad Ajmal Azad}, title = {Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks}, booktitle = {Proceedings of the Third Annual {IEEE} Communications Society on Sensor and Ad Hoc Communications and Networks, {SECON} 2006, September 25-28, 2006, Reston, VA, {USA}}, pages = {971--975}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SAHCN.2006.288591}, doi = {10.1109/SAHCN.2006.288591}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/ArshadA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.