Follow
Muhammad ibrar
Muhammad ibrar
New Mexico Highlands University
Verified email at live.nmhu.edu
Title
Cited by
Cited by
Year
Enhancing grid resilience: Leveraging power from flexible load in modern power systems
B Shaker, K Ullah, Z Ullah, M Ahsan, M Ibrar, MA Javed
2023 18th International Conference on Emerging Technologies (ICET), 246-251, 2023
172023
ML-based Meta-Model Usability Evaluation of Mobile Medical Apps.
K Hamid, M Ibrar, AM Delshadi, M Hussain, MW Iqbal, A Hameed, M Noor
International Journal of Advanced Computer Science & Applications 15 (1), 2024
122024
Meta-Analysis and Investigation of Usability Attributes for Evaluating Operating Systems
MW Iqbal, K Hamid, M Ibrar, A Delshadi
Migration Letters 21 (5), 1363-1380, 2024
62024
Empowered corrosion-resistant products through HCP crystal network: a topological assistance
K Hamid, N Ayub, MA Delshadi, M Ibrar, NZA Rahim, Y Mahmood, ...
Indonesian Journal of Electrical Engineering and Computer Science 34 (3 …, 2024
32024
Ransomware Attacks: Tools and Techniques for Detection
K Khaliq, NZ Ab Rahim, K Hamid, M Ibrar, U Ahmad, MU Ullah
2024 2nd International Conference on Cyber Resilience (ICCR), 1-5, 2024
32024
Behavior and Characteristics of Ransomware-A Survey
NA Malik, AM Delshadi, M Ibrar, K Hamid, M Aamir, F Ahmed, G Ahmad
2024 2nd International Conference on Cyber Resilience (ICCR), 01-05, 2024
12024
Line Congestion Management in Modern Power Systems: A Case Study of Pakistan
K Ullah, Z Ullah, B Shaker, M Ibrar, M Ahsan, S Saeed, H Wadood
International Transactions on Electrical Energy Systems 2024 (1), 6893428, 2024
12024
Empowerments of Anti-Cancer Medicinal Structures by Modern Topological Invariants
K Hamid, Z Aslam, AM Delshadi, MI Ibrar, Y Mahmood, MW Iqbal
Journal of Medicinal and Chemical Sciences 7 (668-683), 2024
12024
Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis
M Ibrar, S Riaz, Y Khan, A Asif, K Hamid, MW Iqbal, M Asim
International Journal for Electronic Crime Investigation 8 (4), 2024
2024
Enhancing Computer Security through Formal Verification of Cryptographic Protocols Using Model Checking and Partial Order Techniques
M Saeed, M Ibrar, D Mahmood, A Delshadi
The Asian Bulletin of Big Data Management 4 (02), Science 4 (2)-238, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–10