Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes F Zafar, A Khan, S Suhail, I Ahmed, K Hameed, HM Khan, F Jabeen, ... Journal of network and computer applications 94, 50-68, 2017 | 116 | 2017 |
Trustworthy digital twins in the industrial internet of things with blockchain S Suhail, R Hussain, R Jurdak, CS Hong IEEE Internet Computing 26 (3), 58-67, 2021 | 109 | 2021 |
Blockchain-based digital twins: research trends, issues, and future challenges S Suhail, R Hussain, R Jurdak, A Oracevic, K Salah, CS Hong, ... ACM Computing Surveys (CSUR) 54 (11s), 1-34, 2022 | 82 | 2022 |
A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints M Kamran, S Suhail, M Farooq IEEE Transactions on Knowledge and Data Engineering 25 (12), 2694-2707, 2013 | 76 | 2013 |
On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions S Suhail, R Hussain, A Khan, CS Hong IEEE Internet of Things Journal 8 (1), 1-17, 2020 | 65 | 2020 |
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space S Suhail, R Hussain, A Khan, CS Hong Computers in Industry 123, 103334, 2020 | 50 | 2020 |
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins S Suhail, SUR Malik, R Jurdak, R Hussain, R Matulevičius, D Svetinovic Computers in Industry 141, 103699, 2022 | 47 | 2022 |
Introducing secure provenance in IoT: Requirements and challenges S Suhail, CS Hong, ZU Ahmad, F Zafar, A Khan 2016 International Workshop on Secure Internet of Things (SIoT), 39-46, 2016 | 44 | 2016 |
ENIGMA: An explainable digital twin security solution for cyber–physical systems S Suhail, M Iqbal, R Hussain, R Jurdak Computers in Industry 151, 103961, 2023 | 43* | 2023 |
Data trustworthiness in IoT S Suhail, CS Hong, MA Lodhi, F Zafar, A Khan, F Bashir 2018 International Conference on Information Networking (ICOIN), 414-419, 2018 | 28 | 2018 |
Provenance-enabled packet path tracing in the RPL-based internet of things S Suhail, R Hussain, M Abdellatif, SR Pandey, A Khan, CS Hong Computer Networks 173, 107189, 2020 | 27 | 2020 |
τ-safety: A privacy model for sequential publication with arbitrary updates A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ... computers & security 66, 20-39, 2017 | 27 | 2017 |
Buyer seller watermarking protocols issues and challenges–a survey A Khan, F Jabeen, F Naz, S Suhail, M Ahmed, S Nawaz Journal of Network and Computer Applications 75, 317-334, 2016 | 16 | 2016 |
Towards trusted and intelligent cyber-physical systems: A security-by-design approach S Suhail, R Jurdak arXiv preprint arXiv:2105.08886, 2021 | 10* | 2021 |
Detection of malicious node in rpl-based internet of things through provenance S Suhail, SR Pandey, CS Hong 한국정보과학회 학술발표논문집, 1171-1173, 2018 | 4 | 2018 |
A secure provenance-aware model for internet of things S Suhail, CS Hong 한국정보과학회 학술발표논문집, 1154-1156, 2016 | 4 | 2016 |
Watermarking of relational databases with emphasis on re-watermarking attack S Suhail, M Kamran, F Arif International Journal of Computer Science 9 (1), 2012 | 4 | 2012 |
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers S Suhail, M Iqbal, R Jurdak Communications of the ACM 67 (1), 39-42, 2023 | 3 | 2023 |
Detection of selective forwarding attack in RPL-based internet of things through provenance S Suhail, SR Pandey, CS Hong 한국정보과학회 학술발표논문집, 965-967, 2018 | 3 | 2018 |
Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW) S Suhail, CS Hong 한국정보과학회 학술발표논문집, 769-771, 2016 | 2 | 2016 |