Systematic and critical review of rsa based public key cryptographic schemes: Past and present status R Imam, QM Areeb, A Alturki, F Anwer IEEE Access 9, 155949-155976, 2021 | 59 | 2021 |
Helping Hearing-Impaired in Emergency Situations: A Deep Learning-Based Approach QM Areeb, M Nadeem, R Alroobaea, F Anwer IEEE Access 10, 8502-8517, 2022 | 33 | 2022 |
A systematic literature review of attribute based encryption in health services R Imam, K Kumar, SM Raza, R Sadaf, F Anwer, N Fatima, M Nadeem, ... Journal of King Saud University-Computer and Information Sciences 34 (9 …, 2022 | 17 | 2022 |
An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA) R Imam, F Anwer, M Nadeem International Journal of Information Technology 14 (5), 2645-2656, 2022 | 13 | 2022 |
Elliptic Curve Cryptography in Cloud Security: A Survey M Anas, R Imam, F Anwer 2022 12th International Conference on Cloud Computing, Data Science …, 2022 | 10 | 2022 |
Security Testing F Anwer, M Nazir, K Mustafa Trends in Software Testing, 35-66, 2017 | 10 | 2017 |
Automatic testing of inconsistency caused by improper error handling: a safety and security perspective F Anwer, M Nazir, K Mustafa Proceedings of the 2014 International Conference on Information and …, 2014 | 8 | 2014 |
An Ensemble Learning Approach for Effective Prediction of Diabetes Mellitus Using Hard Voting Classifier M Atif, F Anwer, F Talib Indian Journal of Science and Technology 15 (39), 1978-1986, 2022 | 6 | 2022 |
Safety and Security Framework for Exception Handling in Concurrent Programming F Anwer, M Nazir, K Mustafa 2013 Third International Conference on Advances in Computing and …, 2013 | 6 | 2013 |
Multi-criteria decision making-based waste management: A bibliometric analysis SS Sohail, Z Javed, M Nadeem, F Anwer, F Farhat, A Hussain, Y Himeur, ... Heliyon, 2023 | 5 | 2023 |
Analysis of machine learning classifiers for predicting diabetes mellitus in the preliminary stage M Atif, F Anwer, F Talib, R Alam, F Masood Int J Artif Intell 2252 (8938), 1303, 2023 | 5 | 2023 |
Testing program for security using symbolic execution and exception injection F Anwer, M Nazir, K Mustafa Indian J Sci Technol 9, 19, 2016 | 4 | 2016 |
A new modified Skew Tent Map and its application in pseudo-random number generator T Umar, M Nadeem, F Anwer Computer Standards & Interfaces 89, 103826, 2024 | 3 | 2024 |
Modified chaotic quadratic map with improved robust region T Umar, M Nadeem, F Anwer International Journal of Information Technology 16 (1), 131-136, 2024 | 3 | 2024 |
Testing Program Crash Based on Search Based Testing and Exception Injection F Anwer, M Nazir, K Mustafa Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | 3 | 2019 |
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes S Ali, F Anwer International Journal of Information Technology, 2024 | 2 | 2024 |
A Novel Cryptographic Technique for Cloud Environment Based on Feedback DNA N Sharfuddin, F Anwer, S Ali International Journal of Experimental Research and Review 32, 323-339, 2023 | 2 | 2023 |
A Critical Review on Search-Based Security Testing of Programs F Ahsan, F Anwer Computational Intelligence: Select Proceedings of InCITe 2022, 207-225, 2023 | 2 | 2023 |
An Empirical Study of Secure and Complex Variants of RSA Scheme R Imam, F Anwer Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021, 185-196, 2022 | 2 | 2022 |
Artificial Intelligence for Modelling the Wet Agglomeration Process of Fine Materials: A Survey M Nadeem, H Banka, R Venugopal, F Anwer SN Computer Science 3 (6), 467, 2022 | 1 | 2022 |