Neighbor node trust based intrusion detection system for WSN SM Sajjad, SH Bouk, M Yousaf Procedia Computer Science 63, 183-188, 2015 | 96 | 2015 |
Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT) SM Sajjad, M Yousaf 2014 Conference on Information Assurance and Cyber Security (CIACS), 9-14, 2014 | 67 | 2014 |
eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers SM Sajjad, M Yousaf, H Afzal, MR Mufti IEEE Access 8, 164200-164213, 2020 | 36 | 2020 |
Detection and blockchain‐based collaborative mitigation of internet of things botnets SM Sajjad, MR Mufti, M Yousaf, W Aslam, R Alshahrani, N Nemri, H Afzal, ... Wireless Communications and Mobile Computing 2022 (1), 1194899, 2022 | 20 | 2022 |
UCAM: usage, communication and access monitoring based detection system for IoT botnets SM Sajjad, M Yousaf 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 17 | 2018 |
BoDMitM: Botnet detection and mitigation system for home router base on MUD HJ Hadi, SM Sajjad, K un Nisa 2019 International Conference on Frontiers of Information Technology (FIT …, 2019 | 16 | 2019 |
SECURITY ANALYSIS OF INTERNET OF THINGS ADAPTATION LAYER. SM Sajjad, M Yousaf Science International 28 (4), 2016 | 9 | 2016 |
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms F Fiaz, SM Sajjad, Z Iqbal, M Yousaf, Z Muhammad Future Internet 16 (5), 176, 2024 | 8 | 2024 |
Light Weight Secure Authentication for Accessing IoT Application Resources Z Abbas, SM Sajjad, HJ Hadi 2019 22nd International Multitopic Conference (INMIC), 1-5, 2019 | 4 | 2019 |
Analyzing Tor Browser Artifacts for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems MS Javed, SM Sajjad, D Mehmood, K Mansoor, Z Iqbal, M Kazim, ... Information 15 (8), 495, 2024 | 3 | 2024 |
Advancing Reversible LSB Steganography: Addressing Imperfections and Embracing Pioneering Techniques for Enhanced Security KF Rafat, SM Sajjad IEEE Access, 2024 | 1 | 2024 |
NeTMids: Neighbor Node Trust Management Based Anomaly Intrusion Detection System for Wireless Sensor Networks SM Sajjad, M Yousaf International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 1 | 2016 |
Deepfake Detection Using Deep Learning: A Unified Forensic Approach to Detect AI-Generated Images and Videos with Fusion of Eye, Nose, and Mouth Landmarks S Sohail, SM Sajjad, A Zafar, Z Iqbal, Z Muhammad, M Kazim | | 2025 |
Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work SM Zohaib, SM Sajjad, Z Iqbal, M Yousaf, M Haseeb, Z Muhammad Information 15 (11), 734, 2024 | | 2024 |
Smart and sustainable threat intelligence D Shoukat, MT Khan, SM Sajjad, A Akhunzada Innovation and Technological Advances for Sustainability, 268-278, 2024 | | 2024 |
A Comprehensive Survey of IoT Threats Assessment and Mitigation Strategies SM Qureshi, SM Sajjad, F Fiaz, K Batool, M Kaleem, SK Hussain, ... Journal of Computing & Biomedical Informatics 8 (01), 2024 | | 2024 |
Safeguarding Democracy Online KF Rafat, SM Sajjad 2024 IEEE International Conference on Advanced Systems and Emergent …, 2024 | | 2024 |
Zero Trust VPN (ZT-VPN): A Cybersecurity Framework for Modern Enterprises to Enhance IT Security and Privacy in Remote Work Environments SM Zohaib, SM Sajjad, Z Iqbal, M Yousaf, M Haseeb, Z Muhammad | | 2024 |
Automatic Alert Generation against Pre-defined Rules-set for Perimetric Security of Sensitive Premises using YOLOv3 M Asif, A Ilyas, SM Sajjad, A Masood 2019 15th International Conference on Emerging Technologies (ICET), 1-6, 2019 | | 2019 |