关注
Sabah Suhail
标题
引用次数
引用次数
年份
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
F Zafar, A Khan, S Suhail, I Ahmed, K Hameed, HM Khan, F Jabeen, ...
Journal of network and computer applications 94, 50-68, 2017
1162017
Trustworthy digital twins in the industrial internet of things with blockchain
S Suhail, R Hussain, R Jurdak, CS Hong
IEEE Internet Computing 26 (3), 58-67, 2021
1092021
Blockchain-based digital twins: research trends, issues, and future challenges
S Suhail, R Hussain, R Jurdak, A Oracevic, K Salah, CS Hong, ...
ACM Computing Surveys (CSUR) 54 (11s), 1-34, 2022
822022
A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints
M Kamran, S Suhail, M Farooq
IEEE Transactions on Knowledge and Data Engineering 25 (12), 2694-2707, 2013
762013
On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions
S Suhail, R Hussain, A Khan, CS Hong
IEEE Internet of Things Journal 8 (1), 1-17, 2020
652020
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space
S Suhail, R Hussain, A Khan, CS Hong
Computers in Industry 123, 103334, 2020
502020
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins
S Suhail, SUR Malik, R Jurdak, R Hussain, R Matulevičius, D Svetinovic
Computers in Industry 141, 103699, 2022
472022
Introducing secure provenance in IoT: Requirements and challenges
S Suhail, CS Hong, ZU Ahmad, F Zafar, A Khan
2016 International Workshop on Secure Internet of Things (SIoT), 39-46, 2016
442016
ENIGMA: An explainable digital twin security solution for cyber–physical systems
S Suhail, M Iqbal, R Hussain, R Jurdak
Computers in Industry 151, 103961, 2023
43*2023
Data trustworthiness in IoT
S Suhail, CS Hong, MA Lodhi, F Zafar, A Khan, F Bashir
2018 International Conference on Information Networking (ICOIN), 414-419, 2018
282018
Provenance-enabled packet path tracing in the RPL-based internet of things
S Suhail, R Hussain, M Abdellatif, SR Pandey, A Khan, CS Hong
Computer Networks 173, 107189, 2020
272020
τ-safety: A privacy model for sequential publication with arbitrary updates
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
272017
Buyer seller watermarking protocols issues and challenges–a survey
A Khan, F Jabeen, F Naz, S Suhail, M Ahmed, S Nawaz
Journal of Network and Computer Applications 75, 317-334, 2016
162016
Towards trusted and intelligent cyber-physical systems: A security-by-design approach
S Suhail, R Jurdak
arXiv preprint arXiv:2105.08886, 2021
10*2021
Detection of malicious node in rpl-based internet of things through provenance
S Suhail, SR Pandey, CS Hong
한국정보과학회 학술발표논문집, 1171-1173, 2018
42018
A secure provenance-aware model for internet of things
S Suhail, CS Hong
한국정보과학회 학술발표논문집, 1154-1156, 2016
42016
Watermarking of relational databases with emphasis on re-watermarking attack
S Suhail, M Kamran, F Arif
International Journal of Computer Science 9 (1), 2012
42012
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers
S Suhail, M Iqbal, R Jurdak
Communications of the ACM 67 (1), 39-42, 2023
32023
Detection of selective forwarding attack in RPL-based internet of things through provenance
S Suhail, SR Pandey, CS Hong
한국정보과학회 학술발표논문집, 965-967, 2018
32018
Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW)
S Suhail, CS Hong
한국정보과학회 학술발표논문집, 769-771, 2016
22016
系统目前无法执行此操作,请稍后再试。
文章 1–20