An anomaly mitigation framework for iot using fog computing MA Lawal, RA Shaikh, SR Hassan Electronics 9 (10), 1565, 2020 | 77 | 2020 |
A DDoS attack mitigation framework for IoT networks using fog computing MA Lawal, RA Shaikh, SR Hassan Procedia Computer Science 182, 13-20, 2021 | 53 | 2021 |
Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus R Asif, SR Hassan Frontiers in Blockchain 6, 1151724, 2023 | 46 | 2023 |
Security analysis of network anomalies mitigation schemes in IoT networks MA Lawal, RA Shaikh, SR Hassan IEEE Access 8, 43355-43374, 2020 | 46 | 2020 |
An adaptive intrusion detection and prevention system for Internet of Things ST Bakhsh, S Alghamdi, RA Alsemmeari, SR Hassan International Journal of Distributed Sensor Networks 15 (11), 1550147719888109, 2019 | 39 | 2019 |
A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability SZ Nizamani, SR Hassan, RA Shaikh, EA Abozinadah, R Mehmood IEEE Access 9, 51294-51312, 2021 | 20 | 2021 |
A hybrid dual-mode trust management scheme for vehicular networks IA Rai, RA Shaikh, SR Hassan International Journal of Distributed Sensor Networks 16 (7), 1550147720939372, 2020 | 16 | 2020 |
Protecting grids from cross-domain attacks using security alert sharing mechanisms RH Syed, M Syrame, J Bourgeois Future Generation Computer Systems 29 (2), 536-547, 2013 | 16 | 2013 |
Integrating a blockchain-based governance framework for responsible AI R Asif, SR Hassan, G Parr Future Internet 15 (3), 97, 2023 | 12 | 2023 |
A text based authentication scheme for improving security of textual passwords SZ Nizamani, TJ Khanzada, SR Hassan, MZ Jali International Journal of Advanced Computer Science and Applications 8 (7), 2017 | 11 | 2017 |
The advents of ubiquitous computing in the development of smart cities—A review on the internet of things (IoT) J Ali, MH Zafar, C Hewage, SR Hassan, R Asif Electronics 12 (4), 1032, 2023 | 9 | 2023 |
Fast attack detection using correlation and summarizing of security alerts in grid computing networks RH Syed, J Pazardzievska, J Bourgeois The Journal of Supercomputing 62, 804-827, 2012 | 9 | 2012 |
Evaluation of video streaming performance over peer-to-peer network SA Memon, SR Hassan, NA Memon 2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014 | 8 | 2014 |
Exploring the confluence of IoT and metaverse: Future opportunities and challenges R Asif, SR Hassan IoT 4 (3), 412-429, 2023 | 7 | 2023 |
Optimal learning paradigm and clustering for effective radio resource management in 5G HetNets MU Iqbal, EA Ansari, S Akhtar, M Farooq-i-Azam, SR Hassan, R Asif IEEE Access 11, 41264-41280, 2023 | 6 | 2023 |
Mathematical modeling and validation of retransmission-based mutant MQTT for improving quality of service in developing smart cities J Ali, MH Zafar, C Hewage, R Hassan, R Asif Sensors 22 (24), 9751, 2022 | 6 | 2022 |
TQ-Model: A new evaluation model for knowledge-based authentication schemes SZ Nizamani, SR Hassan, RA Shaikh Arabian Journal for Science and Engineering 45 (4), 2763-2778, 2020 | 6 | 2020 |
Managing Security of Grid Architecture with a Grid Security Operation Center. J Bourgeois, SR Hassan SECRYPT 9, 403-408, 2009 | 6 | 2009 |
Integrating a blockchain-based governance framework for responsible AI. Future Internet, 15 (3), 97 R Asif, SR Hassan, G Parr | 5 | 2023 |
Enhanced textual password scheme for better security and memorability H Bhanbhro, SR Hassan, SZ Nizamani, ST Bakhsh, MO Alassafi International Journal of Advanced Computer Science and Applications 9 (7), 2018 | 5 | 2018 |