Semantic security against web application attacks A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth Information Sciences 254, 19-38, 2014 | 101 | 2014 |
Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications A Razzaq, A Hur, HF Ahmad, M Masood 2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013 | 79 | 2013 |
EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments M Masood, Z Anwar, SA Raza, MA Hur INMIC, 37-42, 2013 | 65 | 2013 |
Critical analysis on web application firewall solutions A Razzaq, A Hur, S Shahbaz, M Masood, HF Ahmad 2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013 | 53 | 2013 |
Ontology based application level intrusion detection system by using bayesian filter A Razzaq, HF Ahmed, A Hur, N Haider 2009 2nd International Conference on Computer, Control and Communication, 1-6, 2009 | 32 | 2009 |
A survey on state-of-the-art techniques for knowledge graphs construction and challenges ahead A Hur, N Janjua, M Ahmed 2021 IEEE Fourth International Conference on Artificial Intelligence and …, 2021 | 30 | 2021 |
Multi-layered defense against web application attacks A Razzaq, A Hur, N Haider, F Ahmad 2009 Sixth International Conference on Information Technology: New …, 2009 | 18 | 2009 |
Foundation of semantic rule engine to protect web application attacks A Razzaq, A Hur, M Masood, K Latif, HF Ahmad, H Takahashi 2011 Tenth International Symposium on Autonomous Decentralized Systems, 95-102, 2011 | 17 | 2011 |
Towards augmented proactive cyberthreat intelligence T Khan, M Alam, A Akhunzada, A Hur, M Asif, MK Khan Journal of Parallel and Distributed Computing 124, 47-59, 2019 | 13 | 2019 |
Formal reasoning of web application firewall rules through ontological modeling A Ahmad, Z Anwar, A Hur, HF Ahmad 2012 15th International Multitopic Conference (INMIC), 230-237, 2012 | 11 | 2012 |
Detect HTTP specification attacks using ontology RF Munir, N Ahmed, A Razzaq, A Hur, F Ahmad 2011 Frontiers of Information Technology, 75-78, 2011 | 7 | 2011 |
Strong key machanism generated by LFSR based Vigenère cipher A Razzaq, Y Mahmood, F Ahmed, A Hur Int. Arab Conf. Inf. Technol, 554-548, 2012 | 6 | 2012 |
H Farooq AHMAD a Muddassar MASOOD, 2013. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications A RAZZAQ, HUR Ali 2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013 | 2 | 2013 |
Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP A Hur, N Janjua, M Ahmed Expert Systems With Applications 239, 122269, 2024 | 1 | 2024 |
Semantic Architecture for Web applicationn Security A Razzaq, A Hur, HF Ahmad, M Masood International Journal of Computer Science Issues (IJCSI) 9 (2), 435, 2012 | | 2012 |