A survey of peer-to-peer storage techniques for distributed file systems R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell International Conference on Information Technology: Coding and Computing …, 2005 | 264 | 2005 |
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise U Noor, Z Anwar, T Amjad, KKR Choo Future Generation Computer Systems 96, 227-242, 2019 | 166 | 2019 |
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges U Shaukat, E Ahmed, Z Anwar, F Xia Journal of Network and Computer Applications 62, 18-40, 2016 | 158 | 2016 |
Data-driven analytics for cyber-threat intelligence and information sharing S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu Computers & Security 67, 35-58, 2017 | 149 | 2017 |
Quantum computing for healthcare: A review R Ur Rasool, HF Ahmad, W Rafique, A Qayyum, J Qadir, Z Anwar Future Internet 15 (3), 94, 2023 | 114 | 2023 |
Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks RU Rasool, U Ashraf, K Ahmed, H Wang, W Rafique, Z Anwar IEEE Access 7, 34885-34899, 2019 | 110 | 2019 |
Semantic security against web application attacks A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth Information Sciences 254, 19-38, 2014 | 104 | 2014 |
IoTSAT: A formal framework for security analysis of the internet of things (IoT) M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman 2016 IEEE conference on communications and network security (CNS), 180-188, 2016 | 103 | 2016 |
Ontology for attack detection: An intelligent approach to web application security A Razzaq, Z Anwar, HF Ahmad, K Latif, F Munir computers & security 45, 124-146, 2014 | 96 | 2014 |
Digital forensics for eucalyptus F Anwar, Z Anwar 2011 Frontiers of Information Technology, 110-116, 2011 | 92 | 2011 |
RRW—A robust and reversible watermarking technique for relational data S Iftikhar, M Kamran, Z Anwar IEEE Transactions on knowledge and data engineering 27 (4), 1132-1145, 2014 | 91 | 2014 |
A systematic threat analysis and defense strategies for the metaverse and extended reality systems S Qamar, Z Anwar, M Afzal Computers & Security 128, 103127, 2023 | 81 | 2023 |
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things M Mohsin, MU Sardar, O Hasan, Z Anwar IEEE Access 5, 5494-5505, 2017 | 77 | 2017 |
EDoS Armor: A cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments M Masood, Z Anwar, SA Raza, MA Hur INMIC, 37-42, 2013 | 64 | 2013 |
A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories U Noor, Z Anwar, AW Malik, S Khan, S Saleem Future Generation Computer Systems 95, 467-487, 2019 | 61 | 2019 |
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations M Mohsin, Z Anwar, F Zaman, E Al-Shaer Computers & Security 70, 199-223, 2017 | 58 | 2017 |
Design and deployment of a trusted eucalyptus cloud I Khan, H Rehman, Z Anwar 2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011 | 54 | 2011 |
Multiple design patterns for voice over IP (VoIP) security Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell 2006 IEEE International Performance Computing and Communications Conference …, 2006 | 50 | 2006 |
Real-time 3d video compression for tele-immersive environments Z Yang, Y Cui, Z Anwar, R Bocchino, N Kiyanclar, K Nahrstedt, ... Multimedia Computing and Networking 2006 6071, 12-23, 2006 | 47 | 2006 |
Can a DDoS attack meltdown my data center? A simulation study and defense strategies Z Anwar, AW Malik IEEE Communications Letters 18 (7), 1175-1178, 2014 | 43 | 2014 |