default search action
Waqas Aman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Arusa Kanwal, Mohammad Nizamuddin, Waseem Iqbal, Waqas Aman, Yawar Abbas Bangash, Shynar Mussiraliyeva:
Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications. IEEE Access 12: 56517-56553 (2024) - [j13]Khalid Hussain, Khaldoon Nusair, Muhammad Junaid, Waqas Aman:
A two-actor model for understanding user engagement with content creators: Applying social capital theory. Comput. Hum. Behav. 156: 108237 (2024) - [j12]Elmehdi Illi, Marwa K. Qaraqe, Saud Althunibat, Abdullah Al-Hasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez, Waqas Aman, Saif Al-Kuwari:
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Commun. Surv. Tutorials 26(1): 347-388 (2024) - [j11]Waqas Aman, Nour Kouzayha, Muhammad Mahboob Ur Rahman, Tareq Y. Al-Naffouri:
On the Downlink Coverage Performance of RIS-Assisted THz Networks. IEEE Commun. Lett. 28(1): 228-232 (2024) - [j10]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
A novel physical layer authentication mechanism for static and mobile 3D underwater acoustic communication networks. Phys. Commun. 66: 102430 (2024) - [i22]Hala Amin, Waqas Aman, Saif Al-Kuwari:
On the Potential of Re-configurable Intelligent Surface (RIS)-assisted Physical Layer Authentication (PLA). CoRR abs/2405.00426 (2024) - [i21]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers. CoRR abs/2405.02885 (2024) - [i20]Asila AlHarmali, Saqib Ali, Waqas Aman, Omar Hussain:
Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness. CoRR abs/2408.16841 (2024) - 2023
- [j9]Waqas Aman, Saif M. Al-Kuwari, Muhammad Muzzammil, Muhammad Mahboob Ur Rahman, Ambrish Kumar:
Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Networks 142: 103114 (2023) - [c12]Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. ISNCC 2023: 1-6 - [c11]Waqas Aman, Saif Al-Kuwari, Marwa K. Qaraqe:
Location-based Physical Layer Authentication in Underwater Acoustic Communication Networks. VTC2023-Spring 2023: 1-6 - [i19]M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, Muhammad Wasim Nawaz, Qammer H. Abbasi:
Transfer learning for non-intrusive load monitoring and appliance identification in a smart home. CoRR abs/2301.03018 (2023) - [i18]Waqas Aman, Flavio Giorgi, Giulio Attenni, Saif Al-Kuwari, Elmehdi Illi, Marwa K. Qaraqe, Gaia Maselli, Roberto Di Pietro:
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication. CoRR abs/2307.12643 (2023) - [i17]Muhammad Asim, Muhammad Ozair Iqbal, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi:
Pathloss-based non-Line-of-Sight Identification in an Indoor Environment: An Experimental Study. CoRR abs/2307.15995 (2023) - [i16]Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. CoRR abs/2308.14693 (2023) - 2022
- [i15]Waqas Aman, Saif M. Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman:
Security of Underwater and Air-Water Wireless Communication. CoRR abs/2203.02667 (2022) - [i14]Hasan Mujtaba Buttar, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi:
Countering Active Attacks on RAFT-based IoT Blockchain Networks. CoRR abs/2204.00838 (2022) - [i13]Kawish Pervez, Waqas Aman, Muhammad Mahboob Ur Rahman, Muhammad Wasim Nawaz, Qammer H. Abbasi:
Hand-breathe: Non-Contact Monitoring of Breathing Abnormalities from Hand Palm. CoRR abs/2212.06089 (2022) - 2021
- [j8]Zainub Mumtaz, Mehreen Afzal, Waseem Iqbal, Waqas Aman, Naima Iltaf:
Enhanced Metamorphic Techniques-A Case Study Against Havex Malware. IEEE Access 9: 112069-112080 (2021) - [j7]Syed Waqas Haider Shah, Rongpeng Li, Muhammad Mahboob Ur Rahman, Adnan Noor Mian, Waqas Aman, Jon Crowcroft:
Statistical QoS guarantees of a device-to-device link assisted by a full-duplex relay. Trans. Emerg. Telecommun. Technol. 32(11) (2021) - [j6]Waqas Aman, Muhammad Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid A. Qaraqe, Muhammad Ali Imran, Qammer H. Abbasi:
On the effective capacity of IRS-assisted wireless communication. Phys. Commun. 47: 101339 (2021) - [j5]Waqas Aman, Muhammad Mahboob Ur Rahman, Hasan T. Abbas, Muhammad Arslan Khalid, Muhammad Ali Imran, Akram Alomainy, Qammer H. Abbasi:
Securing the Insecure: A First-Line-of-Defense for Body-Centric Nanoscale Communication Systems Operating in THz Band. Sensors 21(10): 3534 (2021) - 2020
- [j4]Waqas Aman, Muhammad Mahboob Ur Rahman, Zeeshan Haider, Junaid Qadir, Muhammad Wasim Nawaz, Guftaar Ahmad Sardar Sidhu:
Maximizing secrecy rate of an orthogonal frequency division multiplexing-based multihop underwater acoustic sensor network. Trans. Emerg. Telecommun. Technol. 31(11) (2020) - [c10]Waqas Aman, Zeeshan Haider, Syed Waqas Haider Shah, Muhammad Mahboob Ur Rahman, Octavia A. Dobre:
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack. ICC 2020: 1-7 - [c9]Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, Muhammad Ali Imran, Qammer H. Abbasi:
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach. UCET 2020: 1-5 - [i12]Waqas Aman, Zeeshan Haider, Syed Waqas Haider Shah, Muhammad Mahboob Ur Rahman, Octavia A. Dobre:
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack. CoRR abs/2002.05093 (2020) - [i11]Waqas Aman, Muhammad Mahboob Ur Rahman, Hasan T. Abbas, Muhammad Arslan Khalid, Muhammad Ali Imran, Akram Alomainy, Qammer H. Abbasi:
Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band. CoRR abs/2007.06818 (2020) - [i10]Waqas Aman, Muhammad Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid A. Qaraqe, Muhammad Ali Imran, Qammer H. Abbasi:
On the Effective Capacity of IRS assisted wireless communication. CoRR abs/2007.06825 (2020) - [i9]Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, Muhammad Ali Imran, Qammer H. Abbasi:
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach. CoRR abs/2009.00271 (2020)
2010 – 2019
- 2019
- [c8]Waqas Aman, Fazlullah Khan:
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications. GCCE 2019: 644-647 - [c7]Sidra Zafar, Waqas Aman, Muhammad Mahboob Ur Rahman, Akram Alomainy, Qammer H. Abbasi:
Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System. UCET 2019: 1-2 - [c6]Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz:
Shared Secret Key Generation via Carrier Frequency Offsets. VTC Spring 2019: 1-5 - [i8]Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz:
Shared Secret Key Generation via Carrier Frequency Offsets. CoRR abs/1902.10998 (2019) - [i7]Sidra Zafar, Waqas Aman, Muhammad Mahboob Ur Rahman, Akram Alomainy, Qammer H. Abbasi:
Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System. CoRR abs/1907.08041 (2019) - 2018
- [j3]Waqas Aman, Muhammad Mahboob Ur Rahman, Junaid Qadir, Haris Pervaiz, Qiang Ni:
Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks. IEEE Access 6: 44459-44472 (2018) - [j2]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali:
Enhancing physical layer security in AF relay-assisted multicarrier wireless transmission. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [i6]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali:
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission. CoRR abs/1801.03728 (2018) - [i5]Waqas Aman, Muhammad Mahboob Ur Rahman, Junaid Qadir:
Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks. CoRR abs/1805.12403 (2018) - [i4]Waqas Aman, Muhammad Mahboob Ur Rahman, Junaid Qadir:
Secure Routing in OFDM based Multi-Hop Underwater Acoustic Sensor Networks. CoRR abs/1807.01556 (2018) - 2017
- [c5]Ammar Mahmood, Waqas Aman, Muhammad Ozair Iqbal, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi:
Channel Impulse Response-Based Distributed Physical Layer Authentication. VTC Spring 2017: 1-5 - [i3]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Tayyaba Jabeen, Feifei Gao, Shi Jin:
Enhancing Physical Layer Security in Dual-Hop Multiuser Transmission. CoRR abs/1703.06483 (2017) - [i2]Ammar Mahmood, Waqas Aman, Muhammad Ozair Iqbal, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi:
Channel Impulse Response-based Distributed Physical Layer Authentication. CoRR abs/1703.08559 (2017) - 2016
- [b1]Waqas Aman:
Adaptive Security in the Internet of Things. Norwegian University of Science and Technology, Trondheim, Norway, 2016 - [c4]Tanveer Khan, Israr Ahmad, Waqas Aman, Irfan Azam, Zahoor Ali Khan, Umar Qasim, Sanam Avais, Nadeem Javaid:
Clustering Depth Based Routing for Underwater Wireless Sensor Networks. AINA 2016: 506-515 - [c3]Waqas Aman:
Assessing the Feasibility of Adaptive Security Models for the Internet of Things. HCI (20) 2016: 201-211 - [c2]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Tayyaba Jabeen, Feifei Gao, Shi Jin:
Enhancing physical layer security in dual-hop multiuser transmission. WCNC 2016: 1-6 - 2015
- [j1]Waqas Aman, Einar Snekkenes:
EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 7(3): 225-256 (2015) - [c1]Waqas Aman, Einar Snekkenes:
Managing security trade-offs in the Internet of Things using adaptive security. ICITST 2015: 362-368 - 2014
- [i1]Waqas Aman:
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools. CoRR abs/1410.2131 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint