Data protection and privacy of the internet of healthcare things (IoHTs) J Shahid, R Ahmad, AK Kiani, T Ahmad, S Saeed, AM Almuhaideb Applied Sciences 12 (4), 1927, 2022 | 98 | 2022 |
Emerging Cybersecurity and Privacy Threats to Electric Vehicles and Their Impact on Human and Environmental Sustainability Z Muhammad, A Zahid, S Bilal, S Jahanzeb Energies 16 (3), 2023 | 32 | 2023 |
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions J Shahid, MK Hameed, IT Javed, KN Qureshi, M Ali, N Crespi Applied Sciences 12 (8), 23, 2022 | 31 | 2022 |
Cellular automata trust-based energy drainage attack detection and prevention in wireless sensor networks J Shahid, Z Muhammad, Z Iqbal, AS Almadhor, AR Javed Computer Communications, 2022 | 13 | 2022 |
SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning S Jahanzeb, M Zia, I Zafar, SK Muhammad, A Yousef, S Weisheng 2nd International Conference on Artificial Intelligence (ICAI) IEEE Explore …, 2022 | 5* | 2022 |
DOS attacks on WSN and their classifications with countermeasures-a survey J Shahid, S Saleem, MN Qureshi NUST Journal of Engineering Sciences 9 (2), 50-59, 2016 | 5 | 2016 |
Cellular automata trust-based energy drainage attack detection and prevention in wireless sensor networks S Jahanzeb, M Zia, I Zafar, A Ahmad S, RJ Abdul Elsevier Computer Communications, 2022 | | 2022 |
A Survey of Electric Vehicle Driver-Assisting Smartphone Applications: Vulnerabilities, Risks, and Defensive Strategies B Saleem, Z Muhammad, M Noman, M Haseeb, N Ullah, JZ Shahid Risks, and Defensive Strategies, 0 | | |