A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata A Waqar, A Raza, H Abbas, MK Khan Journal of Network and Computer Applications 36 (1), 235-248, 2013 | 79 | 2013 |
Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system HI Kure, S Islam, M Ghazanfar, A Raza, M Pasha Neural Computing and Applications 34 (1), 493-514, 2022 | 37 | 2022 |
User privacy issues in eucalyptus: A private cloud computing environment A Waqar, A Raza, H Abbas 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 18 | 2011 |
An automated user transparent approach to log web URLs for forensic analysis MK Ahmed, M Hussain, A Raza 2009 Fifth International Conference on IT Security Incident Management and …, 2009 | 18 | 2009 |
Security characterization for evaluation of software architectures using ATAM A Raza, H Abbas, L Yngstrom, A Hemani 2009 International Conference on Information and Communication Technologies …, 2009 | 13 | 2009 |
A survey on network layer attacks and AODV defense in mobile ad hoc networks A Saeed, A Raza, H Abbas 2014 IEEE Eighth International Conference on Software Security and …, 2014 | 11 | 2014 |
From trust to truth: Advancements in mitigating the Blockchain Oracle problem A Hassan, I Makhdoom, W Iqbal, A Ahmad, A Raza Journal of Network and Computer Applications 217, 103672, 2023 | 7 | 2023 |
A unified framework for automated inspection of handheld safety critical devices in production assemblies MA Rehmat, M Shahbaz, A Raza, H Abbas Future Generation Computer Systems 88, 342-356, 2018 | 4 | 2018 |
Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks. GA Al-Mashaqbeh, JN Al-Karaki, M Al-Rousan, A Raza, H Abbas, ... Adhoc & Sensor Wireless Networks 41, 2018 | 4 | 2018 |
Securing Internet Information Services (IIS) configuration files S Khalid, H Abbas, M Pasha, A Raza 2012 International Conference for Internet Technology and Secured …, 2012 | 4 | 2012 |
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis I Ahmad, H Abbas, A Raza, KKR Choo, A Sajid, M Pasha, FA Khan Australian Journal of Forensic Sciences 50 (2), 183-208, 2018 | 3 | 2018 |
Analyzing packet forwarding Schemes for selfish behavior in MANETs A Raza, JN Al-Karaki, H Abbas Information Technology: New Generations: 13th International Conference on …, 2016 | 2 | 2016 |
Secure SMS based automatic device pairing approach for mobile phones S Aftab, A Khalid, A Raza, H Abbas Intelligent Computing Theories and Technology: 9th International Conference …, 2013 | 1 | 2013 |
A boundary node detection based solution for minimizing the effects of nodes distribution over key exchange in group based WSN R Latif, A Raza 2012 15th International Conference on Network-Based Information Systems, 194-199, 2012 | 1 | 2012 |
Security issues in Wireless Sensor Network Broadcast Authentication A Raza, AA Romman, MF Qureshi 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019 | | 2019 |
Security Evaluation of ESAM Architecture using ATAM A Raza, L Yngström, H Abbas, A Hemani | | 2008 |