A comprehensive study of flooding attack consequences and countermeasures in session initiation protocol (sip) I Hussain, S Djahel, Z Zhang, F Naït‐Abdesselam Security and Communication Networks 8 (18), 4436-4451, 2015 | 36 | 2015 |
A novel energy-efficient clustering algorithm for more sustainable wireless sensor networks enabled smart cities applications Z Yousif, I Hussain, S Djahel, Y Hadjadj-Aoul Journal of sensor and actuator networks 10 (3), 50, 2021 | 25 | 2021 |
Strategy based proxy to secure user agent from flooding attack in SIP I Hussain, F Naït-Abdesselam 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 20 | 2011 |
A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) MM Naeem, I Hussain, MMS Missen Computer Networks 175, 107250, 2020 | 19 | 2020 |
Enhancing IEEE 802.15. 4 for low-latency, bandwidth, and energy critical WSN applications P Kumar, M Gunes, I Hussain 2008 4th International Conference on Emerging Technologies, 146-151, 2008 | 18 | 2008 |
A lightweight countermeasure to cope with flooding attacks against session initiation protocol I Hussain, S Djahel, D Geneiatakis, F Naït-Abdesselam 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-5, 2013 | 10 | 2013 |
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon First International Conference on Modern Communication & Computing …, 2014 | 3 | 2014 |
A Technique for Safeguarding Legitimate Users from Media Access Control (MAC) Spoofing Attacks MM Naeem, I Hussain, MMS Missen Journal of Computing & Biomedical Informatics 6 (02), 160-171, 2024 | 2 | 2024 |
Analysis and detection of DDoS attacks targetting virtualized servers N Ahmed, I Hussain, Z Yousaf International Journal of Computer Science and Network Security 19 (1), 128-133, 2019 | 2 | 2019 |
Resolution of Left Atrial Appendage Thrombi with Anticoagulant Therapy in Candidates for Percutaneous Mitral Commissurotomy S SHEIKH, M Nazir, S Hameed, I Hussain, N Ahmed, A TARIQ Annals of King Edward Medical University 8 (3), 2002 | 1 | 2002 |
Laboratory Evaluation of Dibenz (b, t)-1, 4-0xazepine for the Protection of Nylon Tapes against Rodents Attack MJ Mendki, S Prakash, PK Gutch, RC Malhotra, KM Rao, J Singh, ... Defence Science Journal 50 (1), 59, 2000 | 1 | 2000 |
Evaluating Reactive Routing Protocols of VANETs using 2K Factorial Analysis Z Yousif, I Hussain, S Parveen, F Umer, N Naeem Indian Journal of Science and Technology 12, 20, 2019 | | 2019 |
Empirical Evaluation of Social and Traditional Search Tools for Adhoc Information Retrieval S Hussain, MMS Missen, N Akhtar, M Husnain, I Hussain, MA Nizamani International Journal of Advanced Computer Science and Applications 8 (2), 2017 | | 2017 |
COMPUTING ANGULAR CORRELATION FUNCTION USING MESSAGE PASSING INTERFACE FA Jokhio, UA Khan, IH Sadhayo ENGINEERING, SCIENCE & TECHNOLOGY, 38, 2015 | | 2015 |
PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION IH Sadhayo, FA Jokhio, UA Khan, P Kumar, NA Memon Feedback 13 (1), 2014 | | 2014 |
Solving flooding and SPIT based denial of service problems in voice over IP communications I Hussain Paris 5, 2013 | | 2013 |
Study of Secure Auto-Stabilizing Algorithms in Mobile Ad Hoc Networks I Hussain | | 2007 |
COMPLETE LOCAL BINARY PATTERN AND SPATIAL STRUCTURE OF LIVE FACES S Parveen, S Mumtazah, N Naeem, I Hussain, P Kumar | | |
ANALYSIS OF POWER OPTIMIZATION TECHNIQUES IN VISION BASED ENVIRONMENT MONITORING SYSTEMS UA Khan, FH Mangi, IH Sadhayo ENGINEERING, SCIENCE & TECHNOLOGY, 34, 0 | | |