关注
Ali Sajjad
Ali Sajjad
BT Applied Research
在 bt.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
1232005
A cloud-edge based data security architecture for sharing and analysing cyber threat information
DW Chadwick, W Fan, G Costantino, R De Lemos, F Di Cerbo, I Herwono, ...
Future generation computer systems 102, 710-722, 2020
1112020
Effect of planting density on phenology, growth and yield of maize (Zea mays L.)
M Shafi, J Bakht, S Ali, H Khan, MA Khan, M Sharif
Pak. J. Bot 44 (2), 691-696, 2012
982012
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
U Zia, M McCartney, B Scotney, J Martinez, M AbuTair, J Memon, A Sajjad
International Journal of Information Security 21 (4), 917-935, 2022
882022
Method and system for secure communication with shared cloud services
F El-Moussa, A Sajjad
US Patent 10,594,659, 2020
712020
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
592008
Phytochemical and biological investigation of chloroform and ethylacetate fractions of Euphorbia heterophylla leaf (Euphorbiaceae)
A Falodun, S Ali, IM Quadir, IMI Choudhary
J. Med. Plants Res 2 (12), 365-369, 2008
522008
Security-as-a-service in multi-cloud and federated cloud environments
PS Pawar, A Sajjad, T Dimitrakos, DW Chadwick
Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015 …, 2015
462015
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
462005
The factors affecting employee turnover in an organization: The case of Overseas Pakistanis foundation
SA Khan
African Journal of Business Management 8 (1), 25, 2014
322014
Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study
M Abu-Tair, S Djahel, P Perry, B Scotney, U Zia, JM Carracedo, A Sajjad
Sensors 20 (21), 6131, 2020
312020
Automagi-an autonomic middleware for enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, SM Han, YK Lee, S Lee
Joint International Conference on Autonomic and Autonomous Systems and …, 2005
312005
Privacy-preserving COVID-19 contact tracing using blockchain
S Tahir, H Tahir, A Sajjad, M Rajarajan, F Khan
Journal of Communications and Networks 23 (5), 360-373, 2021
252021
Data protection as a service in the multi-cloud environment
M Colombo, R Asal, QH Hieu, FA El-Moussa, A Sajjad, T Dimitrakos
2019 IEEE 12th International Conference on Cloud Computing (CLOUD), 81-85, 2019
242019
Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment
S Tahir, S Ruj, A Sajjad, M Rajarajan
Computer Communications 133, 102-114, 2019
242019
A parallelized disjunctive query based searchable encryption scheme for big data
S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad
Future Generation Computer Systems 109, 583-592, 2020
212020
A novel pseudo-random number generator for IoT based on a coupled map lattice system using the generalised symmetric map
U Zia, M McCartney, B Scotney, J Martinez, A Sajjad
SN Applied Sciences 4, 1-17, 2022
182022
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
182009
Secure virtualized data volumes
T Dimitrakos, A Sajjad
US Patent 10,505,721, 2019
172019
A component-based architecture for an autonomic middleware enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
172005
系统目前无法执行此操作,请稍后再试。
文章 1–20