Detection and classification of social media-based extremist affiliations using sentiment analysis techniques S Ahmad, MZ Asghar, FM Alotaibi, I Awan Human-centric Computing and Information Sciences 9, 1-23, 2019 | 207 | 2019 |
Recommendation based trust model with an effective defence scheme for MANETs AM Shabut, KP Dahal, SK Bista, IU Awan IEEE Transactions on mobile computing 14 (10), 2101-2115, 2014 | 190 | 2014 |
Botnet detection techniques: review, future trends, and issues A Karim, RB Salleh, M Shiraz, SAA Shah, I Awan, NB Anuar Journal of Zhejiang University SCIENCE C 15, 943-983, 2014 | 189 | 2014 |
Adaptive decentralized re-clustering protocol for wireless sensor networks F Bajaber, I Awan Journal of Computer and System Sciences 77 (2), 282-292, 2011 | 165 | 2011 |
Cyber-attack modeling analysis techniques: An overview H Al-Mohannadi, Q Mirza, A Namanya, I Awan, A Cullen, J Disso 2016 IEEE 4th international conference on future internet of things and …, 2016 | 137 | 2016 |
A second order sliding mode control design of a switched reluctance motor using super twisting algorithm M Rafiq, S Rehman, F Rehman, QR Butt, I Awan Simulation Modelling Practice and Theory 25, 106-117, 2012 | 98 | 2012 |
Performance evaluation study of intrusion detection systems A Alhomoud, R Munir, JP Disso, I Awan, A Al-Dhelaan Procedia Computer Science 5, 173-180, 2011 | 97 | 2011 |
Performance evaluation of dynamic probabilistic broadcasting for flooding in mobile ad hoc networks AM Hanashi, A Siddique, I Awan, M Woodward Simulation Modelling Practice and Theory 17 (2), 364-375, 2009 | 95 | 2009 |
Performance evaluation with different mobility models for dynamic probabilistic flooding in MANETs AM Hanashi, I Awan, M Woodward Mobile Information Systems 5 (1), 65-80, 2009 | 85 | 2009 |
Dynamic/static clustering protocol for wireless sensor network F Bajaber, I Awan 2008 Second UKSIM European Symposium on Computer Modeling and Simulation …, 2008 | 85 | 2008 |
The world of malware: An overview AP Namanya, A Cullen, IU Awan, JP Disso 2018 IEEE 6th international conference on future Internet of Things and …, 2018 | 84 | 2018 |
Entropy maximisation and open queueing networks with priorities and blocking D Kouvatsos, I Awan Performance Evaluation 51 (2-4), 191-227, 2003 | 84 | 2003 |
Multihop clustering algorithm for load balancing in wireless sensor networks N Israr, IU Awan | 83 | 2007 |
Failure prediction using machine learning in a virtualised HPC system and application B Mohammed, I Awan, H Ugail, M Younas Cluster Computing 22, 471-485, 2019 | 82 | 2019 |
Energy efficient clustering protocol to enhance lifetime of wireless sensor network F Bajaber, I Awan Journal of Ambient Intelligence and Humanized Computing 1, 239-248, 2010 | 80 | 2010 |
CloudIntell: An intelligent malware detection system QKA Mirza, I Awan, M Younas Future Generation Computer Systems 86, 1042-1053, 2018 | 78 | 2018 |
Analytical modeling for spectrum handoff decision in cognitive radio networks S Zahed, I Awan, A Cullen Simulation modelling practice and theory 38, 98-114, 2013 | 76 | 2013 |
MARS: multi-stage attack recognition system F Alserhani, M Akhlaq, IU Awan, AJ Cullen, P Mirchandani 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 71 | 2010 |
Analysis of grid service composition with BPEL4WS KM Chao, M Younas, N Griffiths, I Awan, R Anane, CF Tsai 18th International Conference on Advanced Information Networking and …, 2004 | 71 | 2004 |
Modelling qos in iot applications I Awan, M Younas, W Naveed 2014 17th International Conference on Network-Based Information Systems, 99-105, 2014 | 70 | 2014 |