default search action
Sufian Hameed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Trung-Viet Nguyen, Lam-Son Lê, Syed Attique Shah, Sufian Hameed, Dirk Draheim:
PenChain: A Blockchain-Based Platform for Penalty-Aware Service Provisioning. IEEE Access 12: 1005-1030 (2024) - 2023
- [j14]Muhammad Rafi, Qublai Khan Ali Mirza, Muhammad Izaan Sohail, Maria Aliasghar, Arisha Aziz, Sufian Hameed:
Enhancing Cryptocurrency Price Forecasting Accuracy: A Feature Selection and Weighting Approach With Bi-Directional LSTM and Trend-Preserving Model Bias Correction. IEEE Access 11: 65700-65710 (2023) - [j13]Awais Ahmed, Rui Xi, Mengshu Hou, Syed Attique Shah, Sufian Hameed:
Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts. IEEE Access 11: 112891-112928 (2023) - [j12]Mizna Khalid, Sufian Hameed, Abdul Qadir, Syed Attique Shah, Dirk Draheim:
Towards SDN-based smart contract solution for IoT access control. Comput. Commun. 198: 1-31 (2023) - [j11]Jalal Bhayo, Syed Attique Shah, Sufian Hameed, Awais Ahmed, Jamal Nasir, Dirk Draheim:
Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 123(Part C): 106432 (2023) - [j10]Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, Abdul Kareem Khan, Adel Aneiba:
Smart contract-based security architecture for collaborative services in municipal smart cities. J. Syst. Archit. 135: 102802 (2023) - 2022
- [j9]Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, Ijaz Ahmad, Adel Aneiba, Dirk Draheim, Schahram Dustdar:
Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects. IEEE Access 10: 70850-70901 (2022) - [j8]Jalal Bhayo, Riaz Jafaq, Awais Ahmed, Sufian Hameed, Syed Attique Shah:
A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN. IEEE Internet Things J. 9(5): 3612-3630 (2022) - 2020
- [j7]Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza:
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework. IEEE Access 8: 219483-219502 (2020) - [j6]Jalal Bhayo, Sufian Hameed, Syed Attique Shah:
An Efficient Counter-Based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT). IEEE Access 8: 221612-221631 (2020) - [i7]Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza:
Live Anomaly Detection based on Machine Learning Techniques SAD-F: Spark Based Anomaly Detection Framework. CoRR abs/2001.08155 (2020)
2010 – 2019
- 2019
- [j5]Syed Attique Shah, Dursun Zafer Seker, Sufian Hameed, Dirk Draheim:
The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects. IEEE Access 7: 54595-54614 (2019) - [j4]Syed Attique Shah, Dursun Zafer Seker, M. Mazhar Rathore, Sufian Hameed, Sadok Ben Yahia, Dirk Draheim:
Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics Be the Game Changers? IEEE Access 7: 91885-91903 (2019) - [j3]Sufian Hameed, Faraz Idris Khan, Bilal Hameed:
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. J. Comput. Networks Commun. 2019: 9629381:1-9629381:14 (2019) - 2018
- [j2]Sufian Hameed, Usman Murad Ali:
HADEC: Hadoop-based live DDoS detection framework. EURASIP J. Inf. Secur. 2018: 11 (2018) - [j1]Sufian Hameed, Hassan Ahmed Khan:
SDN Based Collaborative Scheme for Mitigation of DDoS Attacks. Future Internet 10(3): 23 (2018) - [i6]Faraz Idris Khan, Sufian Hameed:
Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review. CoRR abs/1808.10529 (2018) - 2017
- [c10]Sufian Hameed, Hassan Ahmed Khan:
Leveraging SDN for collaborative DDoS mitigation. NetSys 2017: 1-6 - [i5]Bilal Karim Mughal, Sufian Hameed, Ghulam Muhammad Shaikh:
A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks. CoRR abs/1711.11005 (2017) - [i4]Sufian Hameed, Sameet Farooq:
The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies. CoRR abs/1711.11073 (2017) - [i3]Faraz Idris Khan, Sufian Hameed:
Software Defined Security Service Provisioning Framework for Internet of Things. CoRR abs/1711.11133 (2017) - [i2]Sufian Hameed, Lamak Qaizar, Shankar Khatri:
Efficacy of Object-Based Passwords for User Authentication. CoRR abs/1711.11303 (2017) - 2016
- [c9]Sufian Hameed, Usman Murad Ali:
Efficacy of Live DDoS Detection with Hadoop. NOMS 2016: 488-494 - [c8]Sufian Hameed, Usman Murad Jamali, Adnan Samad:
Protecting NFC data exchange against eavesdropping with encryption record type definition. NOMS 2016: 577-583 - 2015
- [c7]Sufian Hameed, Usman Murad Jamali, Adnan Samad:
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records. TrustCom/BigDataSE/ISPA (1) 2015: 368-375 - [i1]Sufian Hameed, Usman Murad Ali:
On the Efficacy of Live DDoS Detection with Hadoop. CoRR abs/1506.08953 (2015) - 2014
- [c6]Jawwad A. Shamsi, Sufian Hameed, Waleed Rahman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad:
Clicksafe: Providing Security against Clickjacking Attacks. HASE 2014: 206-210 - [c5]Sufian Hameed, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid:
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters. TrustCom 2014: 900-905 - 2013
- [c4]Sufian Hameed, Tobias Kloht, Xiaoming Fu:
Identity based email sender authentication for spam mitigation. ICDIM 2013: 14-19 - 2012
- [b1]Sufian Hameed:
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation. University of Göttingen, 2012 - [c3]Sufian Hameed, Alexander Wolf, Konglin Zhu, Xiaoming Fu:
Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application. GI-Jahrestagung 2012: 81-95 - [c2]Sufian Hameed, Tobias Kloht, Xiaoming Fu:
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation. SECRYPT 2012: 408-411 - 2011
- [c1]Sufian Hameed, Xiaoming Fu, Pan Hui, Nishanth Sastry:
LENS: Leveraging social networking and trust to prevent spam transmission. ICNP 2011: 13-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint