An anomaly mitigation framework for iot using fog computing MA Lawal, RA Shaikh, SR Hassan Electronics 9 (10), 1565, 2020 | 59 | 2020 |
A DDoS attack mitigation framework for IoT networks using fog computing MA Lawal, RA Shaikh, SR Hassan Procedia Computer Science 182, 13-20, 2021 | 38 | 2021 |
Security analysis of network anomalies mitigation schemes in IoT networks MA Lawal, RA Shaikh, SR Hassan IEEE Access 8, 43355-43374, 2020 | 38 | 2020 |
An adaptive intrusion detection and prevention system for Internet of Things ST Bakhsh, S Alghamdi, RA Alsemmeari, SR Hassan International Journal of Distributed Sensor Networks 15 (11), 1550147719888109, 2019 | 29 | 2019 |
Protecting grids from cross-domain attacks using security alert sharing mechanisms RH Syed, M Syrame, J Bourgeois Future Generation Computer Systems 29 (2), 536-547, 2013 | 17 | 2013 |
A hybrid dual-mode trust management scheme for vehicular networks IA Rai, RA Shaikh, SR Hassan International Journal of Distributed Sensor Networks 16 (7), 1550147720939372, 2020 | 13 | 2020 |
A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability SZ Nizamani, SR Hassan, RA Shaikh, EA Abozinadah, R Mehmood IEEE Access 9, 51294-51312, 2021 | 10 | 2021 |
A text based authentication scheme for improving security of textual passwords SZ Nizamani, TJ Khanzada, SR Hassan, MZ Jali International Journal of Advanced Computer Science and Applications 8 (7), 2017 | 9 | 2017 |
Fast attack detection using correlation and summarizing of security alerts in grid computing networks RH Syed, J Pazardzievska, J Bourgeois The Journal of Supercomputing 62, 804-827, 2012 | 9 | 2012 |
Evaluation of video streaming performance over peer-to-peer network SA Memon, SR Hassan, NA Memon 2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014 | 7 | 2014 |
Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus R Asif, SR Hassan Frontiers in Blockchain 6, 1151724, 2023 | 6 | 2023 |
TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes SZ Nizamani, SR Hassan, RA Shaikh Arabian Journal for Science and Engineering 45 (4), 2763-2778, 2020 | 6 | 2020 |
Managing Security of Grid Architecture with a Grid Security Operation Center. J Bourgeois, SR Hassan SECRYPT 9, 403-408, 2009 | 6 | 2009 |
The advents of ubiquitous computing in the development of smart cities—A review on the internet of things (IoT) J Ali, MH Zafar, C Hewage, SR Hassan, R Asif Electronics 12 (4), 1032, 2023 | 5 | 2023 |
Enhanced textual password scheme for better security and memorability H Bhanbhro, SR Hassan, SZ Nizamani, ST Bakhsh, MO Alassafi International Journal of Advanced Computer Science and Applications 9 (7), 2018 | 5 | 2018 |
Blood image analysis to detect malaria using filtering image edges and classificatio M Memon, TJS Khanzada, S Memon, SR Hassan TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (1), 194-201, 2019 | 4 | 2019 |
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon First International Conference on Modern Communication & Computing …, 2014 | 4 | 2014 |
Integrating a blockchain-based governance framework for responsible AI R Asif, SR Hassan, G Parr Future Internet 15 (3), 97, 2023 | 3 | 2023 |
Mathematical modeling and validation of retransmission-based mutant MQTT for improving quality of service in developing smart cities J Ali, MH Zafar, C Hewage, R Hassan, R Asif Sensors 22 (24), 9751, 2022 | 3 | 2022 |
An evaluation model for recognition-based graphical password schemes. SZ Nizamani, SR Hassan, RA Shaikh, ST Bakhsh Journal of Information Assurance & Security 14 (3), 2019 | 3 | 2019 |