Electricity theft detection using supervised learning techniques on smart meter data ZA Khan, M Adil, N Javaid, MN Saqib, M Shafiq, JG Choi Sustainability 12 (19), 8023, 2020 | 121 | 2020 |
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ... International Journal of Communication Systems 32 (16), e4139, 2019 | 120 | 2019 |
AdDroid: rule-based machine learning framework for android malware analysis A Mehtab, WB Shahid, T Yaqoob, MF Amjad, H Abbas, H Afzal, MN Saqib Mobile Networks and Applications 25, 180-192, 2020 | 56 | 2020 |
Energy Consumption Model for Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks NA • Kamran Latif, Nadeem Javaid, Malik Najmus Saqib, Zahoor Ali Khan International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 2016 | 42 | 2016 |
Anonymous and formally verified dual signature based online e-voting protocol Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, et al. Cluster Computing, 1-14, 2018 | 23* | 2018 |
An approach to secure mobile agents in automatic meter reading NS Malik, F Kupzog, M Sonntag 2010 International Conference on Cyberworlds, 187-193, 2010 | 15 | 2010 |
Energy Hole Minimization with Field Division for Energy Efficient Routing in WSNs. K Latif, N Javaid, MN Saqib, ZA Khan, U Qasim, B Mahmood, M Ilahi Int. J. Distributed Sens. Networks 11, 953134:1-953134:13, 2015 | 11 | 2015 |
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks FZ Asad Ullah Khan, Maimoona Bint E. Sajid,1 Abdul Rauf, Malik Najmus Saqib Wireless Communications and Mobile Computing 2022, 15, 2022 | 9* | 2022 |
Energy hole minimization technique for energy efficient routing in under water sensor networks K Latif, MN Saqib, SH Bouk, N Javaid Communication Technologies, Information Security and Sustainable Development …, 2014 | 7 | 2014 |
Optimizing Security Computation Cost for Mobile Agent Platforms NS Malik, A Treytl 2007 5th IEEE International Conference on Industrial Informatics 1, 143-148, 2007 | 7 | 2007 |
Modeling enhancements in routing protocols under mobility and scalability constraints in VANETs N Javaid, M Akbar, ZA Khan, TA Alghamdi, MN Saqib, MI Khan International Journal of Distributed Sensor Networks 10 (7), 261823, 2014 | 5 | 2014 |
Modeling Enhancements in Routing Protocols under Mobility and Scalability Constraints in VANETs MIK N. Javaid, M. Akbar, Z. A. Khan, T. A. Alghamdi, M. N. Saqib International Journal of Distributed Sensor Networks 10 (7), 2014 | 5 | 2014 |
A secure migration process for mobile agents NS Malik, D Ko, HH Cheng Software: Practice and Experience 41 (1), 87-101, 2011 | 5 | 2011 |
Reactive GTS allocation protocol for sporadic events using the IEEE 802.15. 4 M Azeem, MI Khan, Y Faheem, MI Tamimy, NS Malik, A Khan, M Ahmed Mathematical Problems in Engineering 2014, 2014 | 4 | 2014 |
Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security ZA Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, Abid Khan, Adeel Anjum ... Journal of Medical Imaging and Health Informatics, 2017 | 3 | 2017 |
Weber's Law-based Regularization for Blind Image Deblurring MN Saqib, H Dawood, A Alghamdi, H Dawood Engineering, Technology & Applied Science Research 14 (1), 12937-12943, 2024 | 2 | 2024 |
Implementation and Comparative Analysis of the Fault Attacks on AES. S Raza, NS Malik, A Shakeel, MI Khan Int. Arab J. Inf. Technol. 10 (6), 625-634, 2013 | 2 | 2013 |
Security Optimization for Agent platforms and reducing turnaround time for Mobile Agents NS Malik, A Treytl IFAC Proceedings Volumes 40 (22), 191-196, 2007 | 2 | 2007 |
Friedrich Kupzog Institute of Computer Technology Vienna University of Technology Vienna NS Malik Austria malik, kupzog@ ict. tuwien. ac.” Domain based Security for Mobile Agents, 0 | 2 | |
Malicious URL Detection Using Streaming Feature Selection R AlTalhi, MN Saqib, U Saeed, A Alghamdi The 5th International Conference on Future Networks & Distributed Systems …, 2021 | 1 | 2021 |