Static and dynamic malware analysis using machine learning M Ijaz, MH Durad, M Ismail 2019 16th International bhurban conference on applied sciences and …, 2019 | 157 | 2019 |
Intrusion detection using deep sparse auto-encoder and self-taught learning, MHD Aqsa Saeed Qureshi, Asifullah Khan,Nauman Shamim Neural Computing and Applications, 1–13, 2019 | 82* | 2019 |
A survey of the recent trends in deep learning based malware detection UH Tayyab, FB Khan, MH Durad, A Khan, YS Lee Journal of Cybersecurity and Privacy 2 (4), 800-829, 2022 | 74 | 2022 |
Toward an optimal solution against denial of service attacks in software defined networks M Imran, MH Durad, FA Khan, A Derhab Future Generation Computer Systems 92, 444-453, 2019 | 72 | 2019 |
A detection and prevention system against collaborative attacks in mobile ad hoc networks FA Khan, M Imran, H Abbas, MH Durad Future Generation Computer Systems 68, 416-427, 2017 | 62 | 2017 |
Analysis of Detection Features for Wormhole Attacks in MANETs MHD Muhammad Imran, Farrukh Aslam Khan, Tauseef Jamal International Workshop on Cyber Security and Digital Investigation 56 …, 2015 | 62* | 2015 |
Effective Security Monitoring Using Efficient SIEM Architecture M Sheeraz, MA Paracha, MU Haque, MH Durad, SM Mohsin, SS Band, ... Human-centric Computing and Information Sciences 13 (17), 1, 2023 | 41 | 2023 |
DAISY: A detection and mitigation system against denial-of-service attacks in software-defined networks M Imran, MH Durad, FA Khan, H Abbas IEEE Systems Journal 14 (2), 1933-1944, 2019 | 32 | 2019 |
Reducing the effects of DoS attacks in software defined networks using parallel flow installation FAKAD Muhammad Imran, Muhammad Hanif Durad Human-centric Computing and Information Sciences 9 (1), 2019 | 32 | 2019 |
Effective network intrusion detection using stacking-based ensemble approach M Ali, M Haque, MH Durad, A Usman, SM Mohsin, H Mujlid, C Maple International Journal of Information Security 22 (6), 1781-1798, 2023 | 27 | 2023 |
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms A Rahman, G Mustafa, AQ Khan, M Abid, MH Durad International Journal of Critical Infrastructure Protection 39, 100568, 2022 | 21 | 2022 |
Two novel trust evaluation algorithms MH Durad, Y Cao, Z Liehuang 2006 International Conference on Communications, Circuits and Systems 3 …, 2006 | 20 | 2006 |
Web server attack detection using machine learning S Saleem, M Sheeraz, M Hanif, U Farooq 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-7, 2020 | 19 | 2020 |
Development of SCADA Simulator using Omnet++ Z Ahmad, MH Durad 2019 16th International Bhurban Conference on Applied Sciences and …, 2019 | 19 | 2019 |
Solving initial value ordinary differential equations by Monte Carlo method MN Akhtar, MH Durad, A Ahmed Proc. IAM 4, 149-174, 2015 | 19 | 2015 |
Performance analysis of parallel sorting algorithms using MPI MH Durad, MN Akhtar 2014 12th International conference on frontiers of information technology …, 2014 | 19 | 2014 |
A vision for the trust managed grid MHH Durad, Y Cao Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006 | 15 | 2006 |
Dragonfly cyber threats: A case study of malware attacks targeting power grids FB Khan, A Asad, H Durad, SM Mohsin, SN Kazmi Journal of Computing & Biomedical Informatics 4 (02), 172-185, 2023 | 14 | 2023 |
Automatic YARA rule generation M Khalid, M Ismail, M Hussain, MH Durad 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-5, 2020 | 13 | 2020 |
A simple security policy enforcement system for an institution using SDN controller F Hadi, M Imran, MH Durad, M Waris 2018 15th International Bhurban Conference on Applied Sciences and …, 2018 | 12 | 2018 |