Follow
Syed Muhammad Sajjad | PhD | CEI | CEH | CHFI
Title
Cited by
Cited by
Year
Neighbor node trust based intrusion detection system for WSN
SM Sajjad, SH Bouk, M Yousaf
Procedia Computer Science 63, 183-188, 2015
962015
Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT)
SM Sajjad, M Yousaf
2014 Conference on Information Assurance and Cyber Security (CIACS), 9-14, 2014
672014
eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers
SM Sajjad, M Yousaf, H Afzal, MR Mufti
IEEE Access 8, 164200-164213, 2020
362020
Detection and blockchain‐based collaborative mitigation of internet of things botnets
SM Sajjad, MR Mufti, M Yousaf, W Aslam, R Alshahrani, N Nemri, H Afzal, ...
Wireless Communications and Mobile Computing 2022 (1), 1194899, 2022
202022
UCAM: usage, communication and access monitoring based detection system for IoT botnets
SM Sajjad, M Yousaf
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
172018
BoDMitM: Botnet detection and mitigation system for home router base on MUD
HJ Hadi, SM Sajjad, K un Nisa
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
162019
SECURITY ANALYSIS OF INTERNET OF THINGS ADAPTATION LAYER.
SM Sajjad, M Yousaf
Science International 28 (4), 2016
92016
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms
F Fiaz, SM Sajjad, Z Iqbal, M Yousaf, Z Muhammad
Future Internet 16 (5), 176, 2024
82024
Light Weight Secure Authentication for Accessing IoT Application Resources
Z Abbas, SM Sajjad, HJ Hadi
2019 22nd International Multitopic Conference (INMIC), 1-5, 2019
42019
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems
MS Javed, SM Sajjad, D Mehmood, K Mansoor, Z Iqbal, M Kazim, ...
Information 15 (8), 495, 2024
32024
Advancing Reversible LSB Steganography: Addressing Imperfections and Embracing Pioneering Techniques for Enhanced Security
KF Rafat, SM Sajjad
IEEE Access, 2024
12024
NeTMids: Neighbor Node Trust Management Based Anomaly Intrusion Detection System for Wireless Sensor Networks
SM Sajjad, M Yousaf
International Journal of Computer Science and Information Security (IJCSIS …, 2016
12016
Deepfake Detection Using Deep Learning: A Unified Forensic Approach to Detect AI-Generated Images and Videos with Fusion of Eye, Nose, and Mouth Landmarks
S Sohail, SM Sajjad, A Zafar, Z Iqbal, Z Muhammad, M Kazim
2025
Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work
SM Zohaib, SM Sajjad, Z Iqbal, M Yousaf, M Haseeb, Z Muhammad
Information 15 (11), 734, 2024
2024
Smart and sustainable threat intelligence
D Shoukat, MT Khan, SM Sajjad, A Akhunzada
Innovation and Technological Advances for Sustainability, 268-278, 2024
2024
A Comprehensive Survey of IoT Threats Assessment and Mitigation Strategies
SM Qureshi, SM Sajjad, F Fiaz, K Batool, M Kaleem, SK Hussain, ...
Journal of Computing & Biomedical Informatics 8 (01), 2024
2024
Safeguarding Democracy Online
KF Rafat, SM Sajjad
2024 IEEE International Conference on Advanced Systems and Emergent …, 2024
2024
Zero Trust VPN (ZT-VPN): A Cybersecurity Framework for Modern Enterprises to Enhance IT Security and Privacy in Remote Work Environments
SM Zohaib, SM Sajjad, Z Iqbal, M Yousaf, M Haseeb, Z Muhammad
2024
Automatic Alert Generation against Pre-defined Rules-set for Perimetric Security of Sensitive Premises using YOLOv3
M Asif, A Ilyas, SM Sajjad, A Masood
2019 15th International Conference on Emerging Technologies (ICET), 1-6, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–19