Behavior of attacker and some new possible attacks in vehicular ad hoc network (VANET) IA Sumra, I Ahmad, H Hasbullah 2011 3rd international congress on ultra modern telecommunications and …, 2011 | 197 | 2011 |
Denial of service (DOS) attack and its possible solutions in VANET H Hasbullah, I Ahmed Soomro, J Ab Manan World Academy of Science, Engineering and Technology (WASET) 65, 411-415, 2010 | 150 | 2010 |
Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey IA Sumra, HB Hasbullah, JB AbManan Vehicular Ad-hoc Networks for Smart Cities: First International Workshop …, 2014 | 121 | 2014 |
Timing attack in vehicular network IA Sumra, JL Ab Manan, H Hasbullah Proceedings of the 15th WSEAS International Conference on Computers, World …, 2011 | 51 | 2011 |
Trust and trusted computing in VANET IA Sumra, H Hasbullah, J Lail, M Rehman Computer Science Journal 1 (1), 2011 | 43 | 2011 |
Security issues and challenges in MANET-VANET-FANET: A survey I Sumra, P Sellappan, A Abdullah, A Ahmad EAI Endorsed Transactions on Energy Web 5 (17), 2018 | 39 | 2018 |
VANET security research and development ecosystem IA Sumra, H Hasbullah 2011 National Postgraduate Conference, 1-4, 2011 | 26 | 2011 |
Classification of attacks in vehicular ad hoc network (vanet) IA Sumra, HB Hasbullah, I Ahmad, DM Alghazzawi International Information Institute (Tokyo). Information 16 (5), 2995, 2013 | 24 | 2013 |
Comparative study of security hardware modules (EDR, TPD and TPM) in VANET IA Sumra, I Ahmad, H Hasbullah, JL bin Ab Manan | 21 | 2011 |
User requirements model for vehicular ad hoc network applications IA Soomro, H Hasbullah 2010 International Symposium on Information Technology 2, 800-804, 2010 | 21 | 2010 |
Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks A Munir, IA Sumra, R Naveed, MA Javed Journal of Computing & Biomedical Informatics 7 (01), 377-388, 2024 | 20 | 2024 |
Effects of attackers and attacks on availability requirement in vehicular network: a survey IA Sumra, HB Hasbullah 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 20 | 2014 |
Applications of wireless body area network (wban): A survey A Asif, IA Sumra Engineering Science and Technoogy. International. Research Journal, 64-71, 2017 | 17 | 2017 |
Forming vehicular web of trust in VANET IA Sumra, H Hasbullah, I Ahmad 2011 Saudi International Electronics, Communications and Photonics …, 2011 | 17 | 2011 |
Trust levels in peer-to-peer (P2P) vehicular network IA Sumra, H Hasbullah, J Ab Manan, M Iftikhar, I Ahmad, MY Aalsalem 2011 11th International Conference on ITS Telecommunications, 708-714, 2011 | 15 | 2011 |
Using TPM to ensure security, trust and privacy (STP) in VANET IA Sumra, HB Hasbullah 2015 5th national symposium on information technology: towards new smart …, 2015 | 14 | 2015 |
A Comprehensive survey on e-learning system in cloud computing environment G Bibi, IS Ahmed Eng. Sci. Technol. Int. Res. J 1 (1), 43-50, 2017 | 13 | 2017 |
New card based scheme to ensure security and trust in vehicular communications IA Sumra, H Hasbullah, I Ahmad 2011 Saudi International Electronics, Communications and Photonics …, 2011 | 10 | 2011 |
Jamalul-lail bin Ab Manan,“ IA Sumra, I Ahmad, H Hasbullah Classes of Attacks in VANET “, Saudi International Electronics …, 2011 | 10 | 2011 |
A review of security machanism in internet of things (iot) F Khursheeed, M Sami-Ud-Din, IA Sumra, M Safder 2020 3rd International Conference on Advancements in Computational Sciences …, 2020 | 9 | 2020 |