BibTeX records: Junaid Arshad

download as .bib file

@article{DBLP:journals/cee/ParachaAK23,
  author       = {Anum Atique Paracha and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {{S.U.S.} You're SUS! - Identifying influencer hackers on dark web
                  social networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {107},
  pages        = {108627},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108627},
  doi          = {10.1016/J.COMPELECENG.2023.108627},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ParachaAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AlsadiAAPS23,
  author       = {Mohammed Alsadi and
                  Junaid Arshad and
                  Jahid Ali and
                  Alousseynou Prince and
                  Shishank Shishank},
  title        = {TruCert: Blockchain-based trustworthy product certification within
                  autonomous automotive supply chains},
  journal      = {Comput. Electr. Eng.},
  volume       = {109},
  number       = {Part {B}},
  pages        = {108738},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108738},
  doi          = {10.1016/J.COMPELECENG.2023.108738},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/AlsadiAAPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NasirAK23,
  author       = {Muhammad Hassan Nasir and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Collaborative device-level botnet detection for internet of things},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103172},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103172},
  doi          = {10.1016/J.COSE.2023.103172},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NasirAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KhanHKAK23,
  author       = {Muhammad Mubashir Khan and
                  Muhammad Faraz Hyder and
                  Shariq Mahmood Khan and
                  Junaid Arshad},
  title        = {Ransomware prevention using moving target defense based approach},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {7},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7592},
  doi          = {10.1002/CPE.7592},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KhanHKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AzadRARAA23,
  author       = {Muhammad Ajmal Azad and
                  Farhan Riaz and
                  Anum Aftab and
                  Syed Khurram Jah Rizvi and
                  Junaid Arshad and
                  Hany F. Atlam},
  title        = {Corrigendum to "DEEPSEL: {A} novel feature selection for early
                  identification of malware in mobile applications" [Future Gener.
                  Comput. Syst. 129 {(2022)} 54-63]},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {143},
  pages        = {422},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2023.02.026},
  doi          = {10.1016/J.FUTURE.2023.02.026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AzadRARAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-sen/GaoHBAY23,
  author       = {Honghao Gao and
                  Walayat Hussain and
                  Ram{\'{o}}n J. Dur{\'{a}}n Barroso and
                  Junaid Arshad and
                  Yuyu Yin},
  title        = {Guest Editorial: Machine learning applied to quality and security
                  in software systems},
  journal      = {{IET} Softw.},
  volume       = {17},
  number       = {4},
  pages        = {345--347},
  year         = {2023},
  url          = {https://doi.org/10.1049/sfw2.12141},
  doi          = {10.1049/SFW2.12141},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-sen/GaoHBAY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/AwanAAWS23,
  author       = {Samia Masood Awan and
                  Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Urooj Waheed and
                  Tahir Sharif},
  title        = {A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model
                  for IoT},
  journal      = {Inf.},
  volume       = {14},
  number       = {2},
  pages        = {129},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14020129},
  doi          = {10.3390/INFO14020129},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/AwanAAWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/MahmoudAAA23,
  author       = {Haitham Mahmoud and
                  Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Adel Aneiba},
  title        = {A Framework for Decentralized, Real-Time Reputation Aggregation in
                  IoV},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {2},
  pages        = {44--48},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2300033},
  doi          = {10.1109/IOTM.001.2300033},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/MahmoudAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/WangAAL23,
  author       = {Yonghao Wang and
                  Jahid Ali and
                  Junaid Arshad and
                  Yunxia Liu},
  title        = {A Proxy-Layer Approach to Secure Smart Contract Deployment on Private
                  EVM-Based PoA Blockchains},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2023, Danzhou,
                  China, December 17-21, 2023},
  pages        = {109--112},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/Blockchain60715.2023.00027},
  doi          = {10.1109/BLOCKCHAIN60715.2023.00027},
  timestamp    = {Thu, 22 Feb 2024 20:11:26 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/WangAAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ArshadAPAP22,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Alousseynou Prince and
                  Jahid Ali and
                  Thanasis G. Papaioannou},
  title        = {{REPUTABLE-A} Decentralized Reputation System for Blockchain-Based
                  Ecosystems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {79948--79961},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3194038},
  doi          = {10.1109/ACCESS.2022.3194038},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ArshadAPAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/OmarDJSOA22,
  author       = {Ilhaam A. Omar and
                  Mazin Debe and
                  Raja Jayaraman and
                  Khaled Salah and
                  Mohammed A. Omar and
                  Junaid Arshad},
  title        = {Blockchain-based Supply Chain Traceability for {COVID-19} personal
                  protective equipment},
  journal      = {Comput. Ind. Eng.},
  volume       = {167},
  pages        = {107995},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cie.2022.107995},
  doi          = {10.1016/J.CIE.2022.107995},
  timestamp    = {Wed, 30 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/OmarDJSOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KhanAIAZ22,
  author       = {Kashif Mehboob Khan and
                  Junaid Arshad and
                  Waheed Iqbal and
                  Sidrah Abdullah and
                  Hassan Zaib},
  title        = {Blockchain-enabled real-time {SLA} monitoring for cloud-hosted services},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {1},
  pages        = {537--559},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-021-03416-y},
  doi          = {10.1007/S10586-021-03416-Y},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/KhanAIAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/distribledger/AbdullahAA22,
  author       = {Sidrah Abdullah and
                  Junaid Arshad and
                  Muhammad Alsadi},
  title        = {Chain-Net: An Internet-inspired Framework for Interoperable Blockchains},
  journal      = {Distributed Ledger Technol. Res. Pract.},
  volume       = {1},
  number       = {2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.1145/3554761},
  doi          = {10.1145/3554761},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/distribledger/AbdullahAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AzadAMSI22,
  author       = {Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Shazia Mahmoud and
                  Khaled Salah and
                  Muhammad Imran},
  title        = {A privacy-preserving framework for smart context-aware healthcare
                  applications},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {8},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.3634},
  doi          = {10.1002/ETT.3634},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/AzadAMSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/FarooquiKAS22,
  author       = {M. Najmul Islam Farooqui and
                  Muhammad Mubashir Khan and
                  Junaid Arshad and
                  Omair Shafiq},
  title        = {An empirical investigation of performance challenges within context-aware
                  content sharing for vehicular ad hoc networks},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {10},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4157},
  doi          = {10.1002/ETT.4157},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/FarooquiKAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NasirAKFSJ22,
  author       = {Muhammad Hassan Nasir and
                  Junaid Arshad and
                  Muhammad Mubashir Khan and
                  Mahawish Fatima and
                  Khaled Salah and
                  Raja Jayaraman},
  title        = {Scalable blockchains - {A} systematic review},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {126},
  pages        = {136--162},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.07.035},
  doi          = {10.1016/J.FUTURE.2021.07.035},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/NasirAKFSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AzadRARAA22,
  author       = {Muhammad Ajmal Azad and
                  Farhan Riaz and
                  Anum Aftab and
                  Syed Khurram Jah Rizvi and
                  Junaid Arshad and
                  Hany F. Atlam},
  title        = {{DEEPSEL:} {A} novel feature selection for early identification of
                  malware in mobile applications},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {129},
  pages        = {54--63},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.10.029},
  doi          = {10.1016/J.FUTURE.2021.10.029},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AzadRARAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/DeguaraAPA22,
  author       = {Nathan Deguara and
                  Junaid Arshad and
                  Anum Paracha and
                  Muhammad Ajmal Azad},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Threat Miner - {A} Text Analysis Engine for Threat Identification
                  Using Dark Web Data},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {3043--3052},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10020397},
  doi          = {10.1109/BIGDATA55660.2022.10020397},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/DeguaraAPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MusamihSJADAE21,
  author       = {Ahmad Musamih and
                  Khaled Salah and
                  Raja Jayaraman and
                  Junaid Arshad and
                  Mazin Debe and
                  Yousof Al{-}Hammadi and
                  Samer Ellahham},
  title        = {A Blockchain-Based Approach for Drug Traceability in Healthcare Supply
                  Chain},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {9728--9743},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3049920},
  doi          = {10.1109/ACCESS.2021.3049920},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MusamihSJADAE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlkhooriHADSJAR21,
  author       = {Omar Alkhoori and
                  Abduraouf Hassan and
                  Omar Almansoori and
                  Mazin Debe and
                  Khaled Salah and
                  Raja Jayaraman and
                  Junaid Arshad and
                  Muhammad Habib Ur Rehman},
  title        = {Design and Implementation of CryptoCargo: {A} Blockchain-Powered Smart
                  Shipping Container for Vaccine Distribution},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {53786--53803},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3070911},
  doi          = {10.1109/ACCESS.2021.3070911},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlkhooriHADSJAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MadineSJAAY21,
  author       = {Mohammad Moussa Madine and
                  Khaled Salah and
                  Raja Jayaraman and
                  Yousof Al{-}Hammadi and
                  Junaid Arshad and
                  Ibrar Yaqoob},
  title        = {appXchain: Application-Level Interoperability for Blockchain Networks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {87777--87791},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3089603},
  doi          = {10.1109/ACCESS.2021.3089603},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MadineSJAAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DebeSJYA21,
  author       = {Mazin Debe and
                  Khaled Salah and
                  Raja Jayaraman and
                  Ibrar Yaqoob and
                  Junaid Arshad},
  title        = {Trustworthy Blockchain Gateways for Resource-Constrained Clients and
                  IoT Devices},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {132875--132887},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3115150},
  doi          = {10.1109/ACCESS.2021.3115150},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DebeSJYA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KhanKKAA21,
  author       = {Ammar Ahmed Khan and
                  Muhammad Mubashir Khan and
                  Kashif Mehboob Khan and
                  Junaid Arshad and
                  Farhan Ahmad},
  title        = {A blockchain-based decentralized machine learning framework for collaborative
                  intrusion detection within UAVs},
  journal      = {Comput. Networks},
  volume       = {196},
  pages        = {108217},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108217},
  doi          = {10.1016/J.COMNET.2021.108217},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KhanKKAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanAK21,
  author       = {Kashif Mehboob Khan and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Empirical analysis of transaction malleability within blockchain-based
                  e-Voting},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102081},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102081},
  doi          = {10.1016/J.COSE.2020.102081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AzadAARAIA21,
  author       = {Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Syed Muhammad Ali Akmal and
                  Farhan Riaz and
                  Sidrah Abdullah and
                  Muhammad Imran and
                  Farhan Ahmad},
  title        = {A First Look at Privacy Analysis of {COVID-19} Contact-Tracing Mobile
                  Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {21},
  pages        = {15796--15806},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3024180},
  doi          = {10.1109/JIOT.2020.3024180},
  timestamp    = {Tue, 11 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/AzadAARAIA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbi/ArshadAKP21,
  author       = {Saadia Arshad and
                  Junaid Arshad and
                  Muhammad Mubashir Khan and
                  Simon Parkinson},
  title        = {Analysis of security and privacy challenges for DNA-genomics applications
                  and databases},
  journal      = {J. Biomed. Informatics},
  volume       = {119},
  pages        = {103815},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jbi.2021.103815},
  doi          = {10.1016/J.JBI.2021.103815},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbi/ArshadAKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lht/FarooquiAK21,
  author       = {M. Najmul Islam Farooqui and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {A bibliometric approach to quantitatively assess current research
                  trends in 5G security},
  journal      = {Libr. Hi Tech},
  volume       = {39},
  number       = {4},
  pages        = {1097--1120},
  year         = {2021},
  url          = {https://doi.org/10.1108/LHT-04-2021-0133},
  doi          = {10.1108/LHT-04-2021-0133},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lht/FarooquiAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MuhammadKAAK21,
  author       = {Mujahid Muhammad and
                  Paul Kearney and
                  Adel Aneiba and
                  Junaid Arshad and
                  Andreas Kunz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{RMCCS:} RSSI-based Message Consistency Checking Scheme for {V2V}
                  Communications},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {722--727},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010561107220727},
  doi          = {10.5220/0010561107220727},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MuhammadKAAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlkhaderASJAO20,
  author       = {Wala' Alkhader and
                  Nouf Alkaabi and
                  Khaled Salah and
                  Raja Jayaraman and
                  Junaid Arshad and
                  Mohammed A. Omar},
  title        = {Blockchain-Based Traceability and Management for Additive Manufacturing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {188363--188377},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3031536},
  doi          = {10.1109/ACCESS.2020.3031536},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlkhaderASJAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DebeSJA20,
  author       = {Mazin Debe and
                  Khaled Salah and
                  Raja Jayaraman and
                  Junaid Arshad},
  title        = {Blockchain-Based Verifiable Tracking of Resellable Returned Drugs},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {205848--205862},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3037363},
  doi          = {10.1109/ACCESS.2020.3037363},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DebeSJA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HasanSJAYOE20,
  author       = {Haya R. Hasan and
                  Khaled Salah and
                  Raja Jayaraman and
                  Junaid Arshad and
                  Ibrar Yaqoob and
                  Mohammed A. Omar and
                  Samer Ellahham},
  title        = {Blockchain-Based Solution for {COVID-19} Digital Medical Passports
                  and Immunity Certificates},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {222093--222108},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3043350},
  doi          = {10.1109/ACCESS.2020.3043350},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HasanSJAYOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ShahidKZAS20,
  author       = {Farah Shahid and
                  Asifullah Khan and
                  Aneela Zameer and
                  Junaid Arshad and
                  Kamran Safdar},
  title        = {Wind power prediction using a three stage genetic ensemble and auxiliary
                  predictor},
  journal      = {Appl. Soft Comput.},
  volume       = {90},
  pages        = {106151},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106151},
  doi          = {10.1016/J.ASOC.2020.106151},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ShahidKZAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KhanAK20,
  author       = {Kashif Mehboob Khan and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Simulation of transaction malleability attack for blockchain-based
                  e-Voting},
  journal      = {Comput. Electr. Eng.},
  volume       = {83},
  pages        = {106583},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compeleceng.2020.106583},
  doi          = {10.1016/J.COMPELECENG.2020.106583},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KhanAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KhanAK20,
  author       = {Kashif Mehboob Khan and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Investigating performance constraints for blockchain based secure
                  e-voting system},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {105},
  pages        = {13--26},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.11.005},
  doi          = {10.1016/J.FUTURE.2019.11.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/KhanAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AzadARAA20,
  author       = {Muhammad Ajmal Azad and
                  Mamoun Alazab and
                  Farhan Riaz and
                  Junaid Arshad and
                  Tariq Abullah},
  title        = {Socioscope: {I} know who you are, a robo, human caller or service
                  number},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {105},
  pages        = {297--307},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.11.007},
  doi          = {10.1016/J.FUTURE.2019.11.007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AzadARAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FaizAAS20,
  author       = {Mohamed Falah Faiz and
                  Junaid Arshad and
                  Mamoun Alazab and
                  Andrii Shalaginov},
  title        = {Predicting likelihood of legitimate data loss in email {DLP}},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {110},
  pages        = {744--757},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.11.004},
  doi          = {10.1016/J.FUTURE.2019.11.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FaizAAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-13354,
  author       = {Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Ali Akmal and
                  Sidrah Abdullah and
                  Farhan Ahmad and
                  Muhammad Ali Imran and
                  Farhan Riaz},
  title        = {A First Look at Contact Tracing Apps},
  journal      = {CoRR},
  volume       = {abs/2006.13354},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.13354},
  eprinttype    = {arXiv},
  eprint       = {2006.13354},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-13354.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/NizamuddinSAAR19,
  author       = {Nishara Nizamuddin and
                  Khaled Salah and
                  M. Ajmal Azad and
                  Junaid Arshad and
                  Muhammad Habib Ur Rehman},
  title        = {Decentralized document version control using ethereum blockchain and
                  {IPFS}},
  journal      = {Comput. Electr. Eng.},
  volume       = {76},
  pages        = {183--197},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2019.03.014},
  doi          = {10.1016/J.COMPELECENG.2019.03.014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/NizamuddinSAAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ArshadASITU19,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Khaled Salah and
                  Razi Iqbal and
                  Muhammad Imran Tariq and
                  Tariq Umer},
  title        = {Performance analysis of content discovery for ad-hoc tactile networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {94},
  pages        = {726--739},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.11.037},
  doi          = {10.1016/J.FUTURE.2018.11.037},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ArshadASITU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/RiazAAIHR19,
  author       = {Farhan Riaz and
                  Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Muhammad Imran and
                  Ali Hassan and
                  Saad Rehman},
  title        = {Pervasive blood pressure monitoring using Photoplethysmogram {(PPG)}
                  sensor},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {98},
  pages        = {120--130},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.02.032},
  doi          = {10.1016/J.FUTURE.2019.02.032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/RiazAAIHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/ArshadAARS19,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Mohammad Mahmoud Abdellatif and
                  Muhammad Habib Ur Rehman and
                  Khaled Salah},
  title        = {{COLIDE:} a collaborative intrusion detection framework for Internet
                  of Things},
  journal      = {{IET} Networks},
  volume       = {8},
  number       = {1},
  pages        = {3--14},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-net.2018.5036},
  doi          = {10.1049/IET-NET.2018.5036},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/ArshadAARS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AliSA19,
  author       = {Anum Ali and
                  Ghalib A. Shah and
                  Junaid Arshad},
  title        = {Energy Efficient Resource Allocation for {M2M} Devices in 5G},
  journal      = {Sensors},
  volume       = {19},
  number       = {8},
  pages        = {1830},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19081830},
  doi          = {10.3390/S19081830},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AliSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijegr/KhanAK18,
  author       = {Kashif Mehboob Khan and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Secure Digital Voting System Based on Blockchain Technology},
  journal      = {Int. J. Electron. Gov. Res.},
  volume       = {14},
  number       = {1},
  pages        = {53--62},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJEGR.2018010103},
  doi          = {10.4018/IJEGR.2018010103},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijegr/KhanAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/AzadAR18,
  author       = {Muhammad Ajmal Azad and
                  Junaid Arshad and
                  Farhan Riaz},
  editor       = {Simon Parkinson and
                  Andrew Crampton and
                  Richard Hill},
  title        = {{SOCIO-LENS:} Spotting Unsolicited Caller Through Network Analysis},
  booktitle    = {Guide to Vulnerability Analysis for Computer Networks and Systems
                  - An Artificial Intelligence Approach},
  series       = {Computer Communications and Networks},
  pages        = {235--258},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92624-7\_10},
  doi          = {10.1007/978-3-319-92624-7\_10},
  timestamp    = {Sat, 05 Sep 2020 17:42:16 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/AzadAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-09160,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Khaled Salah and
                  Wei Jie and
                  Razi Iqbal and
                  Mamoun Alazab},
  title        = {A Review of Performance, Energy and Privacy of Intrusion Detection
                  Systems for IoT},
  journal      = {CoRR},
  volume       = {abs/1812.09160},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.09160},
  eprinttype    = {arXiv},
  eprint       = {1812.09160},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-09160.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/ArshadTKWT16,
  author       = {Junaid Arshad and
                  G{\'{a}}bor Tersty{\'{a}}nszky and
                  Tam{\'{a}}s Kiss and
                  Noam Weingarten and
                  Giuliano Taffoni},
  title        = {A Formal Approach to Support Interoperability in Scientific Meta-workflows},
  journal      = {J. Grid Comput.},
  volume       = {14},
  number       = {4},
  pages        = {655--671},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10723-016-9383-x},
  doi          = {10.1007/S10723-016-9383-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/ArshadTKWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcheminf/ArshadHGGKKHT16,
  author       = {Junaid Arshad and
                  Alexander Hoffmann and
                  Sandra Gesing and
                  Richard Grunzke and
                  Jens Kr{\"{u}}ger and
                  Tam{\'{a}}s Kiss and
                  Sonja Herres{-}Pawlis and
                  G{\'{a}}bor Tersty{\'{a}}nszky},
  title        = {Multi-level meta-workflows: new concept for regularly occurring tasks
                  in quantum chemistry},
  journal      = {J. Cheminformatics},
  volume       = {8},
  number       = {1},
  pages        = {58:1--58:17},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13321-016-0169-8},
  doi          = {10.1186/S13321-016-0169-8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcheminf/ArshadHGGKKHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AliSA16,
  author       = {Anum Ali and
                  Ghalib A. Shah and
                  Junaid Arshad},
  title        = {Energy efficient techniques for {M2M} communication: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {68},
  pages        = {42--55},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.04.002},
  doi          = {10.1016/J.JNCA.2016.04.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AliSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AzadMAS16,
  author       = {Muhammad Ajmal Azad and
                  Ricardo Morla and
                  Junaid Arshad and
                  Khaled Salah},
  title        = {Clustering VoIP caller for {SPIT} identification},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {4827--4838},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1656},
  doi          = {10.1002/SEC.1656},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AzadMAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsg/PierantoniFGOJT16,
  author       = {Gabriele Pierantoni and
                  Dermot Frost and
                  Sandra Gesing and
                  S{\'{\i}}lvia Delgado Olabarriaga and
                  Mohammad Mahdi Jaghoori and
                  G{\'{a}}bor Tersty{\'{a}}nszky and
                  Junaid Arshad},
  editor       = {Sandra Gesing and
                  Jens Kr{\"{u}}ger},
  title        = {A Model for Information and Action Flows Connecting Science Gateways
                  to Distributed Computing Infrastructures},
  booktitle    = {Proceedings of the 8th International Workshop on Science Gateways,
                  {IWSG} 2016, Rome, Italy, June 8-10, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1871},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1871/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:48 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsg/PierantoniFGOJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/ArshadZK14,
  author       = {Junaid Arshad and
                  Aneela Zameer and
                  Asifullah Khan},
  title        = {Wind Power Prediction Using Genetic Programming Based Ensemble of
                  Artificial Neural Networks (GPeANN)},
  booktitle    = {12th International Conference on Frontiers of Information Technology,
                  {FIT} 2014, Islamabad, Pakistan, December 17-19, 2014},
  pages        = {257--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FIT.2014.55},
  doi          = {10.1109/FIT.2014.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fit/ArshadZK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ArshadTX13,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu},
  title        = {A novel intrusion severity analysis approach for Clouds},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {416--428},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.future.2011.08.009},
  doi          = {10.1016/J.FUTURE.2011.08.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ArshadTX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ArshadAJT13,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad and
                  Imran Ali Jokhio and
                  Paul Townend},
  title        = {Intrusion damage assessment for multi-stage attacks for clouds},
  journal      = {{IET} Commun.},
  volume       = {7},
  number       = {12},
  pages        = {1304--1315},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-com.2012.0707},
  doi          = {10.1049/IET-COM.2012.0707},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/ArshadAJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijghpc/ArshadTXJ12,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu and
                  Wei Jie},
  title        = {Cloud Computing Security: Opportunities and Pitfalls},
  journal      = {Int. J. Grid High Perform. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {52--66},
  year         = {2012},
  url          = {https://doi.org/10.4018/jghpc.2012010104},
  doi          = {10.4018/JGHPC.2012010104},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijghpc/ArshadTXJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/JieASTL11,
  author       = {Wei Jie and
                  Junaid Arshad and
                  Richard O. Sinnott and
                  Paul Townend and
                  Zhou Lei},
  title        = {A review of grid authentication and authorization technologies and
                  support for federated access control},
  journal      = {{ACM} Comput. Surv.},
  volume       = {43},
  number       = {2},
  pages        = {12:1--12:26},
  year         = {2011},
  url          = {https://doi.org/10.1145/1883612.1883619},
  doi          = {10.1145/1883612.1883619},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/JieASTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijautcomp/ArshadTX11,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu},
  title        = {An automatic intrusion diagnosis approach for clouds},
  journal      = {Int. J. Autom. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {286},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11633-011-0584-2},
  doi          = {10.1007/S11633-011-0584-2},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijautcomp/ArshadTX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcac/ArshadTX11,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu},
  title        = {An Abstract Model for Integrated Intrusion Detection and Severity
                  Analysis for Clouds},
  journal      = {Int. J. Cloud Appl. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.4018/ijcac.2011010101},
  doi          = {10.4018/IJCAC.2011010101},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcac/ArshadTX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcetech/BaylissSJA11,
  author       = {Christopher Bayliss and
                  Richard O. Sinnott and
                  Wei Jie and
                  Junaid Arshad},
  editor       = {Gilbert Babin and
                  Katarina Stanoevska{-}Slabeva and
                  Peter G. Kropf},
  title        = {The Design, Development and Application of a Proxy Credential Auditing
                  Infrastructure for Collaborative Research},
  booktitle    = {E-Technologies: Transformation in a Connected World - 5th International
                  Conference, {MCETECH} 2011, Les Diablerets, Switzerland, January 23-26,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {78},
  pages        = {211--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20862-1\_15},
  doi          = {10.1007/978-3-642-20862-1\_15},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mcetech/BaylissSJA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/ArshadT011,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu},
  editor       = {Xiaoyu Yang and
                  Lizhe Wang and
                  Wei Jie},
  title        = {An Intrusion Diagnosis Perspective on Cloud Computing},
  booktitle    = {Guide to e-Science, Next Generation Scientific Research and Discovery},
  series       = {Computer Communications and Networks},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-0-85729-439-5\_11},
  doi          = {10.1007/978-0-85729-439-5\_11},
  timestamp    = {Thu, 26 Nov 2020 17:53:47 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/ArshadT011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/JieAE10,
  author       = {Wei Jie and
                  Junaid Arshad and
                  Pascal Ekin},
  title        = {Authentication and authorization infrastructure for Grids - issues,
                  technologies, trends and experiences},
  journal      = {J. Supercomput.},
  volume       = {52},
  number       = {1},
  pages        = {82--96},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11227-009-0267-8},
  doi          = {10.1007/S11227-009-0267-8},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/JieAE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/LiLWWAL10,
  author       = {Bo Li and
                  Jianxin Li and
                  Tianyu Wo and
                  Xudong Wu and
                  Junaid Arshad and
                  Wantao Liu},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion
                  Detection Systems},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {115--128},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_10},
  doi          = {10.1007/978-3-642-13577-4\_10},
  timestamp    = {Tue, 07 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/LiLWWAL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ArshadTX09,
  author       = {Junaid Arshad and
                  Paul Townend and
                  Jie Xu},
  title        = {Quantification of Security for Compute Intensive Workloads in Clouds},
  booktitle    = {15th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2009, Shenzhen, China, December 8-11, 2009},
  pages        = {479--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICPADS.2009.46},
  doi          = {10.1109/ICPADS.2009.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ArshadTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/JieYAFPT08,
  author       = {Wei Jie and
                  Alistair Young and
                  Junaid Arshad and
                  June Finch and
                  Rob Procter and
                  Andy Turner},
  editor       = {Marten van Sinderen and
                  Jo{\~{a}}o Paulo A. Almeida and
                  Lu{\'{\i}}s Ferreira Pires and
                  Maarten Steen},
  title        = {A Guanxi Shibboleth based Security Infrastructure},
  booktitle    = {Workshops Proceedings of the 12th International {IEEE} Enterprise
                  Distributed Object Computing Conference, {ECOCW} 2008, 16 September
                  2008, Munich, Germany},
  pages        = {151--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDOCW.2008.6},
  doi          = {10.1109/EDOCW.2008.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/JieYAFPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ArshadA06,
  author       = {Junaid Arshad and
                  Muhammad Ajmal Azad},
  title        = {Performance Evaluation of Secure on-Demand Routing Protocols for Mobile
                  Ad-hoc Networks},
  booktitle    = {Proceedings of the Third Annual {IEEE} Communications Society on Sensor
                  and Ad Hoc Communications and Networks, {SECON} 2006, September 25-28,
                  2006, Reston, VA, {USA}},
  pages        = {971--975},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SAHCN.2006.288591},
  doi          = {10.1109/SAHCN.2006.288591},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ArshadA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics