default search action
Shabana Mehfuz
Person information
- affiliation: Jamia Millia Islamia New Delhi, Department of Electrical Engineering, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Mehwash Weqar, Shabana Mehfuz, Dhawal Gupta, Shabana Urooj:
Adaptive Switching Based Data-Communication Model for Internet of Healthcare Things Networks. IEEE Access 12: 11530-11548 (2024) - [j20]Shahnawaz Ahmad, Shabana Mehfuz, Shabana Urooj, Najah Alsubaie:
Machine learning-based intelligent security framework for secure cloud key management. Clust. Comput. 27(5): 5953-5979 (2024) - [j19]Shahnawaz Ahmad, Mohd Arif, Javed Ahmad, Mohd. Nazim, Shabana Mehfuz:
Convergent encryption enabled secure data deduplication algorithm for cloud environment. Concurr. Comput. Pract. Exp. 36(21) (2024) - [j18]Shahnawaz Ahmad, Shabana Mehfuz:
Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur. Appl. 2: 100027 (2024) - [j17]Shahnawaz Ahmad, Justin Onyarin Ogala, Festus Ikpotokin, Mohd Arif, Javed Ahmad, Shabana Mehfuz:
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. SN Comput. Sci. 5(4): 408 (2024) - 2023
- [j16]Shahnawaz Ahmad, Shabana Mehfuz, Javed Beg:
An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr. Comput. Pract. Exp. 35(23) (2023) - [j15]Shahnawaz Ahmad, Iman Shakeel, Shabana Mehfuz, Javed Ahmad:
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions. Comput. Sci. Rev. 49: 100568 (2023) - [j14]Aakib Jawed Khan, Shabana Mehfuz:
Fuzzy User Access Trust Model for Cloud Access Control. Comput. Syst. Sci. Eng. 44(1): 113-128 (2023) - [j13]Farhana Mariyam, Shabana Mehfuz, Mohd. Sadiq:
RAGOSRA: Rough attributed goal oriented software requirements analysis method. J. Intell. Fuzzy Syst. 44(5): 7833-7843 (2023) - [j12]Justin Onyarin Ogala, Shahnawaz Ahmad, Iman Shakeel, Javed Ahmad, Shabana Mehfuz:
Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies. SN Comput. Sci. 4(5): 530 (2023) - [j11]Shahnawaz Ahmad, Shabana Mehfuz, Javed Beg:
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. J. Supercomput. 79(7): 7377-7413 (2023) - 2022
- [j10]Shahnawaz Ahmad, Shabana Mehfuz, Fateh Mebarek-oudina, Javed Beg:
RSM analysis based cloud access security broker: a systematic literature review. Clust. Comput. 25(5): 3733-3763 (2022) - 2021
- [j9]Sonam Lata, Shabana Mehfuz, Shabana Urooj:
Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies. IEEE Access 9: 161103-161128 (2021) - [j8]Naved Alam, Shabana Mehfuz:
Semi-distributed resource allocation and power quantization control algorithm for device-to-device network. Int. J. Commun. Syst. 34(9) (2021) - 2020
- [j7]Sonam Lata, Shabana Mehfuz, Shabana Urooj, Fadwa M. Alrowais:
Fuzzy Clustering Algorithm for Enhancing Reliability and Network Lifetime of Wireless Sensor Networks. IEEE Access 8: 66013-66024 (2020) - [j6]Sonam Lata, Shabana Mehfuz, Shabana Urooj, Asmaa Ali, Nidal Nasser:
Disjoint Spanning Tree Based Reliability Evaluation of Wireless Sensor Network. Sensors 20(11): 3071 (2020)
2010 – 2019
- 2016
- [j5]Sumit Kumar, Shabana Mehfuz:
Efficient Fuzzy Logic Based Probabilistic Broadcasting for Mobile Ad hoc Network. Int. J. Comput. Intell. Syst. 9(4): 666-675 (2016) - [j4]Rashmi Rai, Gadadhar Sahoo, Shabana Mehfuz:
Advancements and approaches towards moving from legacy application to cloud. Int. J. Commun. Networks Distributed Syst. 16(2): 114-139 (2016) - [j3]Sumit Kumar, Shabana Mehfuz:
Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J. Reliab. Intell. Environ. 2(2): 107-115 (2016) - 2014
- [j2]Shabana Mehfuz, Farah Rashid:
Ant colony system algorithm for optimal network reconfiguration. Int. J. Comput. Intell. Syst. 7(5): 973-978 (2014) - [j1]Shabana Mehfuz, Sumit Kumar:
Two dimensional particle swarm optimization algorithm for load flow analysis. Int. J. Comput. Intell. Syst. 7(6): 1074-1082 (2014) - 2013
- [i1]Rashmi Rai, G. Sahoo, Shabana Mehfuz:
Securing Software as a Service Model of Cloud Computing: Issues and Solutions. CoRR abs/1309.2426 (2013)
2000 – 2009
- 2007
- [c1]R. Radhakrishnan, Majid Jamil, Shabana Mehfuz, Moinuddin Moinuddin:
Security issues in IPv6. ICNS 2007: 110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint