Neighbor Node Trust based Intrusion Detection System for WSN SM Sajjad, SH Bouk, M Yousaf Elsevier Procedia Computer Science 63, 183-188, 2015 | 96 | 2015 |
Security Analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT) SM Sajjad, M Yousaf IEEE Information Assurance and Cyber Security (CIACS), 2014 Conference on, 9-14, 2014 | 67 | 2014 |
Evaluation of IEEE 802.11n for Multimedia Application in VANET MS Akbar, MS Khan, KA Khaliq, A Qayyum, M Yousaf Elsevier Procedia Computer Science 32, 953-958, 2014 | 41 | 2014 |
eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers SM Sajjad, M Yousaf, H Afzal, MR Mufti Ieee Access 8, 164200-164213, 2020 | 38 | 2020 |
Temper Proof Data Distribution for Universal Verifiability and Accuracy in Electoral Process using Blockchain SH Shaheen, M Yousaf, M Jalil IEEE 13th International Conference on Emerging Technologies (ICET), 1-6, 2017 | 36 | 2017 |
Performance Evaluation of Transport Layer Protocols for Video Traffic over WiMAX HMO Chughtai, SA Malik, M Yousaf IEEE 13th International Multitopic Conference, 2009, INMIC-2009, 1-6, 2009 | 27 | 2009 |
Cryptographic Strength Evaluation of Key Schedule Algorithms S Afzal, M Yousaf, H Afzal, N Alharbe, MR Mufti Security and Communication Networks Journal 2020, 2020 | 25 | 2020 |
Generation of AES-like S-boxes by replacing Affine Matrix U Waqas, S Afzal, MA Mir, M Yousaf Frontiers of Information Technology (FIT), 2014 12th International …, 2014 | 24 | 2014 |
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network Z Ashraf, A Sohail, S Latif, A Hameed, M Yousaf International Arab Journal of Information Technology 20 (1), 78-91, 2023 | 22 | 2023 |
On End-to-End Mobility Management in 4G Heterogeneous Wireless Networks M Yousaf, A Qayyum IEEE International Networking and Communications Conference, 2008. INCC 2008 …, 2008 | 21 | 2008 |
GA-based Geometrically Optimized Topology Robustness to Improve Ambient Intelligence of Future Internet of Things SA Changazi, AD Bakhshi, M Yousaf, MH Islam, SM Mohsin, SS Band, ... Elsevier Computer Communications Journal 193, 109-117, 2022 | 18 | 2022 |
Detection and Blockchain-Based Collaborative Mitigation of Internet of Things Botnets SM Sajjad, MR Mufti, M Yousaf, W Aslam, R Alshahrani, N Nemri, H Afzal, ... Wireless Communications and Mobile Computing 2022, DOI: 10.1155/2022/1194899, 2022 | 18 | 2022 |
A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment T Zeb, M Yousaf, H Afzal, MR Mufti IEEE China Communications Journal 15 (8), 126-140, 2018 | 18 | 2018 |
A Cross-Layer User-Centric Vertical Handover Decision Approach based on MIH Local Triggers M Rehan, M Yousaf, A Qayyum, S Malik Springer Wireless and Mobile Networking, 359-369, 2009 | 18 | 2009 |
Robust and lightweight symmetric key exchange algorithm for next-generation IoE Z Ashraf, A Sohail, M Yousaf Elsevier Internet of Things Journal 22 (https://doi.org/10.1016/j.iot.2023 …, 2023 | 17 | 2023 |
Statistical Analysis of Key Schedule Algorithms of Different Block Ciphers S Afzal, U Waqas, MA Mir, M Yousaf Science International 27 (3), 2015 | 17 | 2015 |
Performance Comparison of End-to-End Mobility Management Protocols for TCP PA Shah, M Yousaf, A Qayyum, HB Hasbullah Elsevier Journal of Network and Computer Applications 35 (6), 1657-1673, 2012 | 17 | 2012 |
Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code A Hasnat, K Batool, M Yousaf, MI Satti, S Naseer, S Zahid, AA Gardezi, ... Security and Communication Networks 2022, 2022 | 16 | 2022 |
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets SM Sajjad, M Yousaf 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 16 | 2018 |
Source specific centralized secure multicast scheme based on IPSec SH Shaheen, M Yousaf 2015 Conference on Information Assurance and Cyber Security (CIACS), 30-35, 2015 | 16 | 2015 |