5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases MC Hanif Ullah, Nithya Gopalakrishnan Nair, Adrian Moore, Chris Nugent, Paul ... IEEE Access 7 (2019), 37251-37268, 2019 | 347 | 2019 |
Unmanned aerial vehicles for disaster management C Luo, W Miao, H Ullah, S McClean, G Parr, G Min Geological disaster monitoring based on sensor networks, 83-107, 2019 | 105 | 2019 |
Security considerations and recommendations in computer‐based testing SM Al-Saleem, H Ullah The Scientific World Journal 2014 (1), 562787, 2014 | 44 | 2014 |
Bio-chaotic stream cipher-based iris image encryption AS Alghamdi, H Ullah, M Mahmud, MK Khan 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 26 | 2009 |
An optimal UAV deployment algorithm for bridging communication H Ullah, S McClean, P Nixon, G Parr, C Luo 2017 15th International conference on ITS telecommunications (ITST), 1-7, 2017 | 17 | 2017 |
Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario M Saedi, A Moore, P Perry, M Shojafar, H Ullah, J Synnott, R Brown, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-7, 2020 | 16 | 2020 |
An unmanned aerial vehicle based wireless network for bridging communication H Ullah, M Abu-Tair, S McClean, P Nixon, G Parr, C Luo 2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017 | 14 | 2017 |
Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols GPCL Hanif Ullah, Mamun Abu-Tair, Sally McClean, Paddy Nixon EURASIP Journal on Wireless Communications and Networking, 20, 2020 | 13* | 2020 |
A secure iris image encryption technique using bio-chaotic algorithm AS Alghamdi, H Ullah International Journal of Computer and Network Security 2 (4), 78-84, 2010 | 13 | 2010 |
A comparative analysis and evaluation of different agile software development methodologies SM Al-Saleem, H Ullah International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015 | 12 | 2015 |
Satellite image encryption for C4I System AS Alghamdi, H Ullah, MU Khan, I Ahmad, K Alnafajan International Journal of the Physical Sciences 6 (17), 4255-4263, 2011 | 9 | 2011 |
Evaluating Chaos-based vs. Conventional Encryption Techniques for C4I System AS Alghamdi, SUA HU International Conference on Computer Communications and Networks (ICCCN 2011), 2011 | 5 | 2011 |
Evaluating Encryption Techniques for C4I System. AS Alghamdi, H Ullah, I Ahmad CAINE, 196-201, 2010 | 5 | 2010 |
Most known vulnerabilities in Saudi Arabian web servers KS Alghathbar, M Mahmud, H Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 1-5, 2008 | 3 | 2008 |
A review of security considerations and palm based authentication scheme for computer based testing SM Al-Saleem, H Ullah 2014 9th International Conference on Computer Science & Education, 291-293, 2014 | 2 | 2014 |
Comparative analysis and evaluation of software vulnerabilities testing techniques K Alnafjan, T Hussain, H Ullah, ZUH Paracha Proceedings of World Academy of Science, Engineering and Technology, 40, 2013 | 2 | 2013 |
Comparative Analysis and evaluation of Software Security Testing Techniques TH Khalid Alnafjan, GF Khan, H Ullah, AS Alghamdi International Archive of sciences journal, 2012 | 2 | 2012 |
IoT security using Blockchain H Ullah, M Abu-Tair, A Ali, K Rabbani, J Daniel, J Rafferty, Z Lin, ... Essentials of Blockchain Technology, 169-188, 2019 | 1 | 2019 |
Analysis and evaluation of web-based testing tools SM Alsaleem, H Ullah 2015 International Conference and Workshop on Computing and Communication …, 2015 | 1 | 2015 |
A comparative analysis of XP, RUP and DSDM Techniques H Ullah, T Hussain, GF Khan, K Alnafjan Science Series Data Report 4 (5), 2012 | 1 | 2012 |