![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 98 matches
- 2023
- Muhammad Shahzeb Ali, Ali Alqahtani, Ansar Munir Shah, Adel Rajab, Mahmood Ul Hassan
, Asadullah Shaikh
, Khairan Rajab, Basit Shahzad:
Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks. Comput. Syst. Sci. Eng. 44(1): 845-858 (2023) - Arslan Iftikhar, Mohamed A. Elmagzoub, Ansar Munir Shah, Hamad Abosaq Al Salem
, Mahmood ul Hassan, Jarallah Alqahtani, Asadullah Shaikh:
Efficient Energy and Delay Reduction Model for Wireless Sensor Networks. Comput. Syst. Sci. Eng. 46(1): 1153-1168 (2023) - Ansar Munir Shah, Mohammed Aljubayri, Muhammad Faheem Khan, Jarallah Alqahtani, Mahmood ul Hassan, Adel Sulaiman, Asadullah Shaikh:
ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN. Comput. Syst. Sci. Eng. 46(2): 2471-2488 (2023) - Zainab Noor, Sadaf Hina
, Faisal Hayat, Ghalib A. Shah:
An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet Things 23: 100843 (2023) - Shahzaib Zahid, Muhammad Shoaib Mazhar, Syed Ghazanfar Abbas, Zahid Hanif, Sadaf Hina
, Ghalib A. Shah:
Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls. Internet Things 22: 100766 (2023) - Muhammad Umair
, Muhammad Aamir Cheema, Bilal Afzal, Ghalib A. Shah:
Energy management of smart homes over fog-based IoT architecture. Sustain. Comput. Informatics Syst. 39: 100898 (2023) - 2022
- Fabiha Hashmat, Syed Ghazanfar Abbas
, Sadaf Hina
, Ghalib A. Shah, Taimur Bakhshi
, Waseem Abbas:
An automated context-aware IoT vulnerability assessment rule-set generator. Comput. Commun. 186: 133-152 (2022) - Ibrahim Nadir
, Haroon Mahmood, Ghalib Asadullah Shah:
A taxonomy of IoT firmware security and principal firmware analysis techniques. Int. J. Crit. Infrastructure Prot. 38: 100552 (2022) - Muhammad Husnain
, Khizar Hayat
, Enrico Cambiaso
, Ubaid U. Fayyaz
, Maurizio Mongelli
, Habiba Akram
, Syed Ghazanfar Abbas
, Ghalib A. Shah
:
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System. Sensors 22(2): 567 (2022) - 2021
- Faisal Hussain
, Syed Ghazanfar Abbas, Ivan Miguel Pires
, Sabeeha Tanveer
, Ubaid U. Fayyaz, Nuno M. Garcia
, Ghalib A. Shah, Farrukh Shahzad:
A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks. IEEE Access 9: 163412-163430 (2021) - Kausar Parveen, Ghalib A. Shah, Muhammad Aslam
, Amjad Farooq:
Monitoring of Unaccounted for Gas in Energy Domain Using Semantic Web Technologies. Comput. Syst. Sci. Eng. 36(1): 41-56 (2021) - Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah, Kashif Zafar
:
Generic signature development for IoT Botnet families. Digit. Investig. 38: 301224 (2021) - Ali Javed, Ali Asadullah Baig
, Kamal Djidjeli, Aamer Shahzad, Asad Hameed
:
Upwind skewed radial basis functions (USRBF) for solution of highly convective problems over meshfree nodes. Eng. Comput. 37(2): 1081-1097 (2021) - Ammar Arbaaeen
, Asadullah Shah
:
Ontology-Based Approach to Semantically Enhanced Question Answering for Closed Domain: A Review. Inf. 12(5): 200 (2021) - Ammar Arbaaeen
, Asadullah Shah
:
A Knowledge-Based Sense Disambiguation Method to Semantically Enhanced NL Question for Restricted Domain. Inf. 12(11): 452 (2021) - Nusratullah Khan, Muhammad Usman Akram, Asadullah Shah
, Norah Saleh Alghamdi
, Shoab Ahmed Khan:
Capturing the real customer experience based on the parameters in the call detail records. Multim. Tools Appl. 80(18): 28439-28461 (2021) - Syed Ghazanfar Abbas
, Ivan Vaccari
, Faisal Hussain
, Shahzaib Zahid
, Ubaid Ullah Fayyaz
, Ghalib A. Shah
, Taimur Bakhshi
, Enrico Cambiaso
:
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors 21(14): 4816 (2021) - Faisal Hussain
, Syed Ghazanfar Abbas
, Ghalib A. Shah, Ivan Miguel Pires
, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia
, Eftim Zdravevski
:
A Framework for Malicious Traffic Detection in IoT Healthcare Environment. Sensors 21(9): 3025 (2021) - Faisal Hussain
, Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah:
IoT DoS and DDoS Attack Dataset. IEEE DataPort, 2021 - Faisal Hussain
, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia, Eftim Zdravevski:
IoT Healthcare Security Dataset. IEEE DataPort, 2021 - Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Bashir Hussain, Ghalib A. Shah, Muhammad Husnain:
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case. CoRR abs/2101.02147 (2021) - 2020
- Kamran Khowaja
, Bilikis Banire, Dena Al-Thani
, Mohammed Tahri Sqalli, Aboubakr Aqle
, Asadullah Shah
, Siti Salwah Salim:
Augmented Reality for Learning of Children and Adolescents With Autism Spectrum Disorder (ASD): A Systematic Review. IEEE Access 8: 78779-78807 (2020) - Abdul Salam Shah
, Haidawati Nasir, Muhammad Fayaz
, Adidah Lajis
, Israr Ullah
, Asadullah Shah
:
Dynamic User Preference Parameters Selection and Energy Consumption Optimization for Smart Homes Using Deep Extreme Learning Machine and Bat Algorithm. IEEE Access 8: 204744-204762 (2020) - Muhammad Shuaib Qureshi, Muhammad Bilal Qureshi, Muhammad Fayaz, Wali Khan Mashwani
, Samir Brahim Belhaouari
, Saima Hassan, Asadullah Shah
:
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems. Int. J. Distributed Sens. Networks 16(8): 155014772093275 (2020) - Kamran Khowaja
, Siti Salwah Salim
, Adeleh Asemi
, Sumbul Ghulamani
, Asadullah Shah
:
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children with autism spectrum disorder (ASD). Univers. Access Inf. Soc. 19(2): 213-243 (2020) - Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Bashir Hussain, Ghalib A. Shah, Muhammad Husnain:
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case. BigDataSE 2020: 122-129 - Kamran Khowaja
, Dena Al-Thani
, Asma Osman Hassan
, Asadullah Shah
, Siti Salwah Salim
:
Mobile Augmented Reality App for Children with Autism Spectrum Disorder (ASD) to Learn Vocabulary (MARVoc): From the Requirement Gathering to Its Initial Evaluation. HCI (31) 2020: 424-437 - M. Aqeel Iqbal, Asadullah Shah:
A Novel RE Teams Selection Process For User-Centric Requirements Elicitation Frameworks Based On Big-Five Personality Assessment Model. ICIIS 2020: 522-527 - M. Aqeel Iqbal, Asadullah Shah
:
Process Hierarchy for GSD Based User-Centric Requirements Elicitation Frameworks. ICIIS 2020: 528-533 - Muhammad Umair
, Ghalib A. Shah:
Energy Management of Smart Homes. SMARTCOMP 2020: 247-249
skipping 68 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-25 00:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint