Security in pervasive computing: Current status and open issues M Haque, SI Ahamed International Journal of Network Security, 2006 | 79 | 2006 |
mHealth spectroscopy of blood hemoglobin with spectral super-resolution SM Park, MA Visbal-Onufrak, MM Haque, MC Were, V Naanyu, MK Hasan, ... Optica 7 (6), 563-573, 2020 | 69 | 2020 |
An omnipresent formal trust model (FTM) for pervasive computing environment MM Haque, SI Ahamed 31st annual international computer software and applications conference …, 2007 | 68 | 2007 |
Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments SI Ahamed, MM Haque, ME Hoque, F Rahman, N Talukder Journal of Systems and Software 83 (2), 253-270, 2010 | 64 | 2010 |
Identifying factors that nurses consider in the decision-making process related to patient care during the COVID-19 pandemic N Anton, T Hornbeck, S Modlin, MM Haque, M Crites, D Yu Plos one 16 (7), e0254077, 2021 | 54 | 2021 |
CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives S Noor, M Haque, R Hasan 7th IEEE International Conference on Cloud Computing (IEEE Cloud), 200-207, 2014 | 53 | 2014 |
Wellness assistant: A virtual wellness assistant using pervasive computing SI Ahamed, MM Haque, K Stamm, AJ Khan Proceedings of the 2007 ACM symposium on Applied computing, 782-787, 2007 | 50 | 2007 |
SmartHeLP: Smartphone-based hemoglobin level prediction using an artificial neural network MK Hasan, MM Haque, R Adib, JF Tumpa, A Begum, RR Love, YL Kim, ... AMIA Annual Symposium Proceedings 2018, 535, 2018 | 44 | 2018 |
Healthcare aide: towards a virtual assistant for doctors using pervasive middleware M Sharmin, S Ahmed, SI Ahamed, MM Haque, AJ Khan Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006 | 42 | 2006 |
Smartphone-based human hemoglobin level measurement analyzing pixel intensity of a fingertip video on different color spaces MK Hasan, M Haque, N Sakib, R Love, SI Ahamed Smart Health 5, 26-39, 2018 | 37 | 2018 |
Self-healing for autonomic pervasive computing S Ahmed, SI Ahamed, M Sharmin, MM Haque Proceedings of the 2007 ACM symposium on Applied computing, 110-111, 2007 | 34 | 2007 |
OTIT: Towards secure provenance modeling for location proofs R Khan, S Zawoad, MM Haque, R Hasan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 33 | 2014 |
WORAL: A witness oriented secure location provenance framework for mobile devices R Hasan, R Khan, S Zawoad, MM Haque IEEE Transactions on Emerging Topics in Computing 4 (1), 128-141, 2015 | 32 | 2015 |
How secure is the healthcare network from insider attacks? An audit guideline for vulnerability analysis R Hasan, S Zawoad, S Noor, MM Haque, D Burke 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 29 | 2016 |
Findings of e-ESAS: a mobile based symptom monitoring system for breast cancer patients in rural Bangladesh M Haque, F Kawsar, M Adibuzzaman, S Ahamed, R Love, R Dowla, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 28 | 2012 |
Secure techniques and methods for authenticating visually impaired mobile phone users MM Haque, S Zawoad, R Hasan 2013 IEEE International Conference on Technologies for Homeland Security …, 2013 | 27 | 2013 |
Informing developmental milestone achievement for children with autism: machine learning approach MM Haque, M Rabbani, DD Dipal, MII Zarif, A Iqbal, A Schwichtenberg, ... JMIR medical informatics 9 (6), e29242, 2021 | 26 | 2021 |
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty KZ Bijon, MM Haque, R Hasan 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 26 | 2014 |
Confronting autism in urban Bangladesh: unpacking infrastructural and cultural challenges U Ehsan, N Sakib, MM Haque, T Soron, D Saxena, SI Ahamed, ... EAI Endorsed Transactions on Pervasive Health and Technology 4 (14), e5-e5, 2018 | 24 | 2018 |
‘who, when, and where?’location proof assertion for mobile devices R Khan, S Zawoad, MM Haque, R Hasan Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 22 | 2014 |