A SURVEY ON AUTO-CONFIGURATION MECHANISMS FOR MOBILE AD-HOC NETWORKS (MANETS) S Khalid, A Mahboob Journal of Engineering & Applied Sciences, 2013 | 85* | 2013 |
Efficient hardware implementations and hardware performance evaluation of SHA-3 finalists K Latif, MM Rao, A Aziz, A Mahboob The Third SHA-3 Candidate Conference, 2012 | 42 | 2012 |
Classification of attacks on wireless sensor networks: A survey MN Riaz, A Buriro, A Mahboob International Journal of Wireless and Microwave Technologies 8 (6), 15-39, 2018 | 34 | 2018 |
Airsign: A gesture-based smartwatch user authentication A Buriro, R Van Acker, B Crispo, A Mahboob 2018 International Carnahan Conference on Security Technology (ICCST), 1-5, 2018 | 29 | 2018 |
SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme A Buriro, B Crispo, M Eskandri, S Gupta, A Mahboob, R Van Acker Emerging Technologies for Authorization and Authentication: First …, 2018 | 29 | 2018 |
Implementation and comparison of text-based image retrieval schemes SAJ Zaidi, A Buriro, M Riaz, A Mahboob, MN Riaz International Journal of Advanced Computer Science and Applications 10 (1), 2019 | 22 | 2019 |
Intrusion avoidance for SCADA security in industrial plants A Mahboob, J Zubairi 2010 International Symposium on Collaborative Technologies and Systems, 447-452, 2010 | 21 | 2010 |
Single-equipment with multiple-application for an automated robot-car control system S Ullah, Z Mumtaz, S Liu, M Abubaqr, A Mahboob, HA Madni Sensors 19 (3), 662, 2019 | 17 | 2019 |
A novel EM concentrator with open-concentrator region based on multi-folded transformation optics HA Madni, K Hussain, WX Jiang, S Liu, A Aziz, S Iqbal, A Mahboob, ... Scientific reports 8 (1), 9641, 2018 | 15 | 2018 |
Optimal utilization of available reconfigurable hardware resources K Latif, A Aziz, A Mahboob Computers & Electrical Engineering 37 (6), 1043-1057, 2011 | 14 | 2011 |
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Information Science Reference, 2011 | 14* | 2011 |
Novel arithmetic architecture for high performance implementation of SHA-3 finalist KECCAK on FPGA platforms K Latif, MM Rao, A Mahboob, A Aziz Reconfigurable Computing: Architectures, Tools and Applications: 8th …, 2012 | 12 | 2012 |
Lookup table based multiplication technique for GF (2m) with cryptographic significance A Mahboob, N Ikram IEE Proceedings-Communications 152 (6), 965-974, 2005 | 12 | 2005 |
Transport Layer Security (TLS)–A Network Security Protocol for E-commerce A Mahboob, N Ikram Technocrat PNEC Research Journal, 2004 | 11 | 2004 |
The effect of software development project team structure on the process of knowledge sharing: An empirical study MN Riaz, A Buriro, A Mahboob 2019 2nd International Conference on Computing, Mathematics and Engineering …, 2019 | 10 | 2019 |
Social success factors affecting implementation of agile software development methodologies in software industry of pakistan: an empirical study MN Riaz, A Mahboob, A Buriro International Journal of Advanced Computer Science and Applications 9 (7), 2018 | 10 | 2018 |
Securing SCADA Systems with Open Source Software A Mahboob, JA Zubairi High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 …, 2013 | 10 | 2013 |
High throughput hardware implementation of secure hash algorithm (sha-3) finalist: Blake K Latif, A Mahboob, A Aziz 2011 Frontiers of Information Technology, 189-194, 2011 | 9 | 2011 |
An automated robot-car control system with hand-gestures and mobile application using arduino S Ullah, Z Mumtaz, S Liu, M Abubaqr, A Mahboob, HA Madni preprints, 2019 | 8 | 2019 |
Application of Cyber Security in Emerging C4ISR Systems AA Malik, A Mahboob, A Khan, J Zubairi Crisis Management: Concepts, Methodologies, Tools, and Applications, 1705-1738, 2011 | 8 | 2011 |