A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks BK Mughal, S Hameed, GM Shaikh International Journal of Advanced Computer Science and Applications (IJACSA …, 2016 | 6 | 2016 |
A scalable key and trust management solution for IoT sensors using SDN and blockchain technology S Hameed, SA Shah, QS Saeed, S Siddiqui, I Ali, A Vedeshin, D Draheim IEEE Sensors Journal 21 (6), 8716-8733, 2021 | 58 | 2021 |
A Smart-Contract-Based Adaptive Security Governance Architecture for Smart City Service Interoperations S Siddiqui, S Hameed, SA Shah, J Arshad, Y Ahmed, D Draheim Available at SSRN 4682364, 0 | | |
A survey on management frameworks and open challenges in IoT F Kiani Wireless Communications and Mobile Computing 2018, 2018 | 27 | 2018 |
A Survey on Management Frameworks and Open Challenges in IoT (Retraction of Vol 2018, art no 9857026, 2018) F Kiani, S Hameed, F Idris WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019 | | 2019 |
A time-efficient approach toward DDoS attack detection in IoT network using SDN J Bhayo, R Jafaq, A Ahmed, S Hameed, SA Shah IEEE Internet of Things Journal 9 (5), 3612-3630, 2021 | 67 | 2021 |
An Adaptive Security Governance Architecture based on Smart Contracts for Syntactically Interoperable Services in Smart Cities S Siddiqui, S Hameed, SA Shah, D Draheim Authorea Preprints, 2023 | | 2023 |
An efficient counter-based DDoS attack detection framework leveraging software defined IoT (SD-IoT) J Bhayo, S Hameed, SA Shah IEEE Access 8, 221612-221631, 2020 | 63 | 2020 |
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks A Ahmed, S Hameed, M Rafi, QKA Mirza Cryptography and Security, arXiv, 2020 | | 2020 |
An intelligent and time-efficient DDoS identification framework for real-time enterprise networks: SAD-F: Spark based anomaly detection framework A Ahmed, S Hameed, M Rafi, QKA Mirza IEEE Access 8, 219483-219502, 2020 | 14 | 2020 |
Clicksafe: Providing security against clickjacking attacks JA Shamsi, S Hameed, W Rahman, F Zuberi, K Altaf, A Amjad 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering …, 2014 | 32 | 2014 |
Diffie Hellman Stand the Test of Time (Protocol’s Limitations, Applications and Functional Divergence) A Kumar, S Hameed International Journal of Computer Applications 975, 8887, 0 | | |
Efficacy of Live DDoS Detection with Hadoop S Hameed, U Ali IEEE/IFIP Network Operations and Management Symposium (NOMS), 488 - 494, 2016 | 45 | 2016 |
Efficacy of Object-Based Passwords for User Authentication S Hameed, L Qaizar, S Khatri International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017 | 1 | 2017 |
Enhancing cryptocurrency price forecasting accuracy: A feature selection and weighting approach with bi-directional LSTM and trend-preserving model bias correction M Rafi, QAK Mirza, MI Sohail, M Aliasghar, A Aziz, S Hameed IEEE Access 11, 65700-65710, 2023 | 5 | 2023 |
Evaluation of human altruism using a DTN-based mobile social network application S Hameed, A Wolf, K Zhu, X Fu Gesellschaft für Informatik eV, 2012 | 6 | 2012 |
Fighting spam using social GateKeepers S Hameed, X Fu, N Sastry, P Hui Networking Science 2, 28-41, 2013 | 8* | 2013 |
HADEC: Hadoop-based live DDoS detection framework S Hameed, U Ali EURASIP Journal on Information Security 2018, 1-19, 2018 | 65 | 2018 |
Harnessing big data analytics for healthcare: A comprehensive review of frameworks, implications, applications, and impacts A Ahmed, R Xi, M Hou, SA Shah, S Hameed IEEE Access, 2023 | 32 | 2023 |
Identity based email sender authentication for spam mitigation S Hameed, T Kloht, X Fu Eighth International Conference on Digital Information Management (ICDIM …, 2013 | 16* | 2013 |