Cloud computing risk assessment: a systematic literature review R Latif, H Abbas, S Assar, Q Ali Future Information Technology: FutureTech 2013, 285-295, 2014 | 167 | 2014 |
Malicious insider attack detection in IoTs using data analytics AY Khan, R Latif, S Latif, S Tahir, G Batool, T Saba IEEE Access 8, 11743-11753, 2019 | 112 | 2019 |
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review A Ahmed, R Latif, S Latif, H Abbas, FA Khan Multimedia Tools and Applications 77, 21947-21965, 2018 | 93 | 2018 |
Behavioral based insider threat detection using deep learning R Nasir, M Afzal, R Latif, W Iqbal IEEE Access 9, 143266-143274, 2021 | 87 | 2021 |
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review R Latif, H Abbas, S Assar Journal of medical systems 38, 1-10, 2014 | 75 | 2014 |
Effects of amlodipine on serum testosterone, testicular weight and gonado-somatic index in adult rats R Latif, GM Lodhi, M Aslam J Ayub Med Coll Abbottabad 20 (4), 8-10, 2008 | 75 | 2008 |
Suspicious activity recognition using proposed deep L4-branched-ActionNet with entropy coded ant colony system optimization T Saba, A Rehman, R Latif, SM Fati, M Raza, M Sharif IEEE Access 9, 89181-89197, 2021 | 49 | 2021 |
RiceChain: Secure and traceable rice supply chain framework using blockchain technology BM Yakubu, R Latif, A Yakubu, MI Khan, AI Magashi PeerJ Computer Science 8, e801, 2022 | 41 | 2022 |
Effect of visfatin on testicular steroidogenesis in purified Leydig cells W Hameed, I Yousaf, R Latif, M Aslam Journal of Ayub Medical College Abbottabad 24 (3-4), 62-64, 2012 | 39 | 2012 |
A survey of blockchain technology: Architecture, applied domains, platforms, and security threats A Altaf, F Iqbal, R Latif, BM Yakubu, S Latif, H Samiullah Social Science Computer Review 41 (5), 1941-1962, 2023 | 36 | 2023 |
Analyzing LDA and NMF topic models for Urdu tweets via automatic labeling S Latif, F Shafait, R Latif IEEE Access 9, 127531-127547, 2021 | 36 | 2021 |
Hardware-based random number generation in wireless sensor networks (WSNs) R Latif, M Hussain Advances in Information Security and Assurance: Third International …, 2009 | 31 | 2009 |
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud‐Assisted Wireless Body Area Network R Latif, H Abbas, S Latif, A Masood Mobile Information Systems 2015 (1), 260594, 2015 | 30 | 2015 |
Enterprise architecture frameworks assessment: Capabilities, cyber security and resiliency review HF Al-Turkistani, S Aldobaian, R Latif 2021 1st International conference on artificial intelligence and data …, 2021 | 29 | 2021 |
Web scraping for data analytics: A BeautifulSoup implementation A Abodayeh, R Hejazi, W Najjar, L Shihadeh, R Latif 2023 Sixth International Conference of Women in Data Science at Prince …, 2023 | 22 | 2023 |
ConTrust: A novel context-dependent trust management model in social Internet of Things R Latif IEEE Access 10, 46526-46537, 2022 | 22 | 2022 |
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems H Abbas, R Latif, S Latif, A Masood Annals of Telecommunications 71, 477-487, 2016 | 19 | 2016 |
Analyzing feasibility for deploying very fast decision tree for DDoS attack detection in cloud-assisted WBAN R Latif, H Abbas, S Assar, S Latif Intelligent Computing Theory: 10th International Conference, ICIC 2014 …, 2014 | 19 | 2014 |
Machine learning for post‐traumatic stress disorder identification utilizing resting‐state functional magnetic resonance imaging T Saba, A Rehman, MN Shahzad, R Latif, SA Bahaj, J Alyami Microscopy Research and Technique 85 (6), 2083-2094, 2022 | 18 | 2022 |
A novel trust management model for edge computing R Latif, MU Ahmed, S Tahir, S Latif, W Iqbal, A Ahmad Complex & Intelligent Systems, 1-17, 2022 | 17 | 2022 |