A Comprehensive analysis of XML and JSON web technologies ZU Haq, GF Khan, T Hussain New Developments in Circuits, Systems, Signal Processing, Communications and …, 2013 | 37 | 2013 |
Enhancing c4i security using threat modeling AS Alghamdi, T Hussain, GF Khan 2010 12th International Conference on Computer Modelling and Simulation, 131-136, 2010 | 16 | 2010 |
A risk-based IoT decision-making framework based on literature review with human activity recognition case studies T Hussain, C Nugent, A Moore, J Liu, A Beard Sensors 21 (13), 4504, 2021 | 12 | 2021 |
Big data for C4I systems: goals, applications, challenges and tools AS Alghamdi, I Ahmad, T Hussain Fifth International Conference on the Innovative Computing Technology …, 2015 | 10 | 2015 |
Designing framework for the interoperability of C4I systems T Hussain, RM Mehmood, A ul Haq, KA Alnafjan, AS Alghamdi 2014 International Conference on Computational Science and Computational …, 2014 | 8 | 2014 |
An Attack Impact and Host Importance based Approach to Intrusion Response Action Selection T Hussain, C Nugent, J Liu, A Beard, L Chen, A Moore Proceedings of the 4th International Conference on Information Technology …, 2022 | 2 | 2022 |
Comparative analysis and evaluation of software vulnerabilities testing techniques K Alnafjan, T Hussain, H Ullah, ZUH Paracha Proceedings of World Academy of Science, Engineering and Technology, 40, 2013 | 2 | 2013 |
Proposed methodology to enhance C4I systems security on architectural level AS Alghamdi, T Hussain, GF Khan, K Alnafjan, A Haseeb Scientific Research and Essays 6 (29), 6095-6103, 2011 | 2 | 2011 |
Towards software engineering process for C4I systems T Hussain, KN Al-Mutib, AS Alghamdi 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 2 | 2011 |
From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion Response T Hussain, A Beard, L Chen, C Nugent, J Liu, A Moore 2022 6th International Conference on Cryptography, Security and Privacy (CSP …, 2022 | 1 | 2022 |
A Situation Calculus based approach to Cognitive Modelling for Responding to IoT Cyberattacks PK Chouhan, L Chen, T Hussain, A Beard 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021 | 1 | 2021 |
Behavior based Comparative analysis of XML and JSON web technologies K Alnafjan, GF Khan, T Hussain, H Ullah, AS Alghamdi | 1 | 2015 |
A comparative analysis of XP, RUP and DSDM Techniques H Ullah, T Hussain, GF Khan, K Alnafjan Science Series Data Report 4 (5), 2012 | 1 | 2012 |
USING AHP TO COMPARE AND EVALUATE SOFTWARE SECURITY TESTING TECHNIQUES K Alnafjan, T Hussain, GF Khan, H Ullah, AS Alghamdi Acta Press, 0 | 1 | |
An Analysis of the Impact of Uncertainty on the Internet of Things: A Smart Home Case Study T Hussain, C Nugent, A Moore, J Liu 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | | 2019 |
ANALYZING THE BENEFITS OF CLOUD COMPUTING IN THE CONTEXT OF C41 C41 SYSTEMS T Hussain, F Amin, K Alnafjan, MA Alghamdi | | 2015 |
C4I Security Enhancement using Modeling and Fuzzy Rule based Expert System HUASA Khalid Alnafjan, Tazar Hussain, Gul Faraz Khan Information Journal Japan 16 (12(B)), 8843-8852, 2013 | | 2013 |
Evaluating and Selecting the Best Encryption Approach for the Security of C4I Systems THASA Hanif Ullah Information Journal Japan 16 (12(B)), 8823-8832, 2013 | | 2013 |
Evaluating Software Security Risks Using Fuzzy Rule Based Expert System ASA Khalid Alnafjan, Tazar Hussain, Gul Faraz Khan,Hanif Ullah 20th ISCA International Conference on Software Engineering and Data …, 2012 | | 2012 |
Modeling Software Engineering Challenges of C4I Systems using Assurance Cases. T Hussain, AS Alghamdi, A Alelaiwi, A Haseeb SEDE, 45-48, 2011 | | 2011 |