关注
Zahid Anwar
Zahid Anwar
在 ndsu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
2632005
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges
U Shaukat, E Ahmed, Z Anwar, F Xia
Journal of Network and Computer Applications 62, 18-40, 2016
1552016
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
U Noor, Z Anwar, T Amjad, KKR Choo
Future Generation Computer Systems 96, 227-242, 2019
1542019
Data-driven analytics for cyber-threat intelligence and information sharing
S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu
Computers & Security 67, 35-58, 2017
1392017
Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks
RU Rasool, U Ashraf, K Ahmed, H Wang, W Rafique, Z Anwar
IEEE Access 7, 34885-34899, 2019
1082019
Semantic security against web application attacks
A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
1022014
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE conference on communications and network security (CNS), 180-188, 2016
1002016
Ontology for attack detection: An intelligent approach to web application security
A Razzaq, Z Anwar, HF Ahmad, K Latif, F Munir
computers & security 45, 124-146, 2014
952014
Digital forensics for eucalyptus
F Anwar, Z Anwar
2011 Frontiers of Information Technology, 110-116, 2011
912011
RRW—A robust and reversible watermarking technique for relational data
S Iftikhar, M Kamran, Z Anwar
IEEE Transactions on knowledge and data engineering 27 (4), 1132-1145, 2014
902014
Quantum computing for healthcare: A review
R Ur Rasool, HF Ahmad, W Rafique, A Qayyum, J Qadir, Z Anwar
Future Internet 15 (3), 94, 2023
872023
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things
M Mohsin, MU Sardar, O Hasan, Z Anwar
IEEE Access 5, 5494-5505, 2017
772017
A systematic threat analysis and defense strategies for the metaverse and extended reality systems
S Qamar, Z Anwar, M Afzal
Computers & Security 128, 103127, 2023
682023
EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments
M Masood, Z Anwar, SA Raza, MA Hur
INMIC, 37-42, 2013
642013
A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories
U Noor, Z Anwar, AW Malik, S Khan, S Saleem
Future Generation Computer Systems 95, 467-487, 2019
602019
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations
M Mohsin, Z Anwar, F Zaman, E Al-Shaer
Computers & Security 70, 199-223, 2017
542017
Design and deployment of a trusted eucalyptus cloud
I Khan, H Rehman, Z Anwar
2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011
542011
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference …, 2006
492006
Real-time 3d video compression for tele-immersive environments
Z Yang, Y Cui, Z Anwar, R Bocchino, N Kiyanclar, K Nahrstedt, ...
Multimedia Computing and Networking 2006 6071, 12-23, 2006
452006
Can a DDoS attack meltdown my data center? A simulation study and defense strategies
Z Anwar, AW Malik
IEEE Communications Letters 18 (7), 1175-1178, 2014
432014
系统目前无法执行此操作,请稍后再试。
文章 1–20