default search action
Faheem Ullah
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Raveen Kanishka Jayalath, Hussain Ahmad, Diksha Goel, Muhammad Shuja Syed, Faheem Ullah:
Microservice Vulnerability Analysis: A Literature Review With Empirical Insights. IEEE Access 12: 155168-155204 (2024) - [j17]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Faheem Ullah, Sirajuddin Qureshi, Musa Osman:
An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intell. Decis. Technol. 18(1): 33-55 (2024) - [j16]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Faheem Ullah, Sirajuddin Qureshi, Xiangjun Ma, Muhammad Salman Pathan:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - [j15]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Ahsan Nazir, Ahsan Wajahat, Faheem Ullah, Abdul Wadud:
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102164 (2024) - [j14]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of distributed data processing frameworks in hybrid clouds. J. Netw. Comput. Appl. 224: 103837 (2024) - [j13]Faheem Ullah, Wu Wei, Zhun Fan, Qiuda Yu:
6D object pose estimation based on dense convolutional object center voting with improved accuracy and efficiency. Vis. Comput. 40(8): 5421-5434 (2024) - [c13]Ahsan Nazir, Jingsha He, Nafei Zhu, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Ahsan Wajahat:
Ensemble Learning Techniques for the Detection of IoT Botnets. CSAIDE 2024: 80-85 - [i15]Majid Abdulsatar, Hussain Ahmad, Diksha Goel, Faheem Ullah:
Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures. CoRR abs/2403.15169 (2024) - [i14]Raveen Kanishka Jayalath, Hussain Ahmad, Diksha Goel, Muhammad Shuja Syed, Faheem Ullah:
Microservice Vulnerability Analysis: A Literature Review with Empirical Insights. CoRR abs/2408.03960 (2024) - [i13]Hussain Ahmad, Faheem Ullah, Rehan Jafri:
A Survey on Immersive Cyber Situational Awareness Systems. CoRR abs/2408.07456 (2024) - 2023
- [j12]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Muhammad Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. Comput. Networks 234: 109935 (2023) - [j11]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ACM Comput. Surv. 55(9): 192:1-192:38 (2023) - [j10]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Resource Utilization of Distributed Databases in Edge-Cloud Environment. IEEE Internet Things J. 10(11): 9423-9437 (2023) - [j9]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j8]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101820 (2023) - [c12]Isuru Dharmadasa, Faheem Ullah:
Co-Tuning of Cloud Infrastructure and Distributed Data Processing Platforms. IEEE Big Data 2023: 207-214 - [c11]Nikolas Tyllis, Faheem Ullah, Muhammad Uzair:
An Exploratory Study of Vulnerabilities in Big Data Systems. IEEE Big Data 2023: 1360-1367 - [c10]Faheem Ullah, Muhammad Ali Babar:
Guidance Models for Designing Big Data Cyber Security Analytics Systems. ECSA 2023: 70-80 - [i12]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. CoRR abs/2301.08428 (2023) - [i11]Isuru Dharmadasa, Faheem Ullah:
Co-Tuning of Cloud Infrastructure and Distributed Data Processing Platforms. CoRR abs/2309.00269 (2023) - 2022
- [j7]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. ACM Comput. Surv. 54(3): 50:1-50:47 (2022) - [j6]Faheem Ullah, Muhammad Ali Babar, Aldeida Aleti:
Design and evaluation of adaptive system for big data cyber security analytics. Expert Syst. Appl. 207: 117948 (2022) - [j5]Faheem Ullah, Muhammad Ali Babar:
On the scalability of Big Data Cyber Security Analytics systems. J. Netw. Comput. Appl. 198: 103294 (2022) - [c9]Rana Aurangzaib, Waheed Iqbal, Muhammad Abdullah, Faisal Bukhari, Faheem Ullah, Abdelkarim Erradi:
Scalable Containerized Pipeline for Real-time Big Data Analytics. CloudCom 2022: 25-32 - [i10]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds. CoRR abs/2201.01948 (2022) - [i9]Faheem Ullah, Imaduddin Mohammed, Muhammad Ali Babar:
A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment. CoRR abs/2201.01972 (2022) - [i8]Yaser Mansouri, Faheem Ullah, Shagun Dhingra, Muhammad Ali Babar:
Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases. CoRR abs/2209.09487 (2022) - 2021
- [j4]Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Akhtar, Faheem Ullah, Ahsan Nazir, Ahsan Wajahat:
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks. IEEE Access 9: 73938-73947 (2021) - [j3]Rohul Amin, Kamal Shah, Muhammad Asif, Imran Khan, Faheem Ullah:
An efficient algorithm for numerical solution of fractional integro-differential equations via Haar wavelet. J. Comput. Appl. Math. 381: 113028 (2021) - [c8]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. PRDC 2021: 47-56 - [i7]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. CoRR abs/2104.11906 (2021) - [i6]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. CoRR abs/2109.04029 (2021) - [i5]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption. CoRR abs/2109.07260 (2021) - [i4]Faheem Ullah, Muhammad Ali Babar:
On the Scalability of Big Data Cyber Security Analytics Systems. CoRR abs/2112.00853 (2021) - 2020
- [i3]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration. CoRR abs/2012.09344 (2020)
2010 – 2019
- 2019
- [j2]Faheem Ullah, Muhammad Ali Babar:
Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review. J. Syst. Softw. 151: 81-118 (2019) - [c7]Faheem Ullah, Muhammad Ali Babar:
QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics. ICECCS 2019: 81-86 - [c6]Faheem Ullah, Muhammad Ali Babar:
An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics. ICSA 2019: 41-50 - [c5]Faheem Ullah, Muhammad Ali Babar:
Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation. PDCAT 2019: 146-153 - 2018
- [j1]Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, Muhammad Ali Babar, Awais Rashid:
Data exfiltration: A review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 101: 18-54 (2018) - [i2]Faheem Ullah, Muhammad Ali Babar:
Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review. CoRR abs/1802.03178 (2018) - 2017
- [c4]Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar:
Security Support in Continuous Deployment Pipeline. ENASE 2017: 57-68 - [i1]Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi, Muhammad Ali Babar:
Security Support in Continuous Deployment Pipeline. CoRR abs/1703.04277 (2017) - 2016
- [b1]Faheem Ullah:
Finding the needle in a haystack: Chasing rarely occurring bugs in concurrent software. ETH Zurich, Zürich, Switzerland, 2016 - [c3]Faheem Ullah, Thomas R. Gross:
Detecting Anomalies in Concurrent Programs Based on Dynamic Control Flow Changes. IPDPS Workshops 2016: 308-317 - 2015
- [c2]Faheem Ullah, Thomas R. Gross:
Profiling for detecting performance anomalies in concurrent software. SEPS@SPLASH 2015: 11-20 - 2010
- [c1]Manuel Oriol, Faheem Ullah:
YETI on the Cloud. ICST Workshops 2010: 434-437
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint