Takip et
Ahsan Wajahat
Ahsan Wajahat
PhD Scholar School of Software Engineering Beijing University of Technology, China
emails.bjut.edu.cn üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
A Nazir, J He, N Zhu, A Wajahat, X Ma, F Ullah, S Qureshi, MS Pathan
Journal of King Saud University-Computer and Information Sciences, 101820, 2023
402023
A novel approach of unprivileged keylogger detection
A Wajahat, A Imran, J Latif, A Nazir, A Bilal
2019 2nd International Conference on Computing, Mathematics and Engineering …, 2019
382019
Interactively visualize and analyze social network Gephi
A Wajahat, A Nazir, F Akhtar, S Qureshi, F Razaque, A Shakeel
2020 3rd international conference on computing, mathematics and engineering …, 2020
322020
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration
A Nazir, J He, N Zhu, A Wajahat, F Ullah, S Qureshi, X Ma, MS Pathan
Journal of King Saud University-Computer and Information Sciences 36 (2), 101939, 2024
302024
Network Forensics: A Comprehensive Review of Tools and Techniques
S Qureshi, S Tunio, F Akhtar, A Wajahat, A Nazir, F Ullah
International Journal of Advanced Computer Science and Applications 12 (5), 2021
272021
A hybrid DL-based detection mechanism for cyber threats in secure networks
S Qureshi, J He, S Tunio, N Zhu, F Akhtar, F Ullah, A Nazir, A Wajahat
Ieee Access 9, 73938-73947, 2021
252021
A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem
A Nazir, J He, N Zhu, SS Qureshi, SU Qureshi, F Ullah, A Wajahat, ...
Ain Shams Engineering Journal 15 (7), 102777, 2024
222024
Securing Android IoT devices with GuardDroid transparent and lightweight malware detection
A Wajahat, J He, N Zhu, T Mahmood, A Nazir, F Ullah, S Qureshi, S Dev
Ain Shams Engineering Journal 15 (5), 102642, 2024
102024
Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
SU Qureshi, J He, S Tunio, N Zhu, A Nazir, A Wajahat, F Ullah, A Wadud
Journal of King Saud University-Computer and Information Sciences, 102164, 2024
92024
Evaluating energy efficiency of buildings using artificial neural networks and k-means clustering techniques
A Nazir, A Wajahat, F Akhtar, F Ullah, S Qureshi, SA Malik, A Shakeel
2020 3rd international conference on computing, mathematics and engineering …, 2020
82020
SDN-enabled Deep Learning based Detection Mechanism (DDM) to tackle DDoS attacks in IoTs
SS Qureshi, J He, S Qureshi, N Zhu, ZA Zardari, T Mahmood, A Wajahat
Journal of Intelligent & Fuzzy Systems 44 (6), 10675-10687, 2023
72023
An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
A Wajahat, J He, N Zhu, T Mahmood, A Nazir, MS Pathan, S Qureshi, ...
J. Intell. Fuzzy Syst. 45 (3), 5141-5157, 2023
62023
Analysis of challenges in modern network forensic framework
S Qureshi, J Li, F Akhtar, S Tunio, ZH Khand, A Wajahat
Security and Communication Networks 2021 (1), 8871230, 2021
62021
Effects of code cloning in mobile applications
MZ Azeem, A Imran, F Akhtar, A Wajahat, J Latif, SA Memon
2020 3rd International Conference on Computing, Mathematics and Engineering …, 2020
62020
An Adaptive Multi-Layer Architecture for IoT based IDPS for Attacks using Deep Learning Method
S Qureshi, J He, S Tunio, N Zhu, F Ullah, A Nazir, A Wajahat
International Journal of Network Security 24 (5), 815-827, 2022
52022
Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques.
A Wajahat, J He, N Zhu, T Mahmood, T Saba, AR Khan, FS Alamri
Computers, Materials & Continua 79 (1), 2024
42024
Performance Analysis of Open Source Solution" ntop" for Active and Passive Packet Analysis Relating to Application and Transport Layer
S Qureshi, G Das, S Tunio, F Ullah, A Nazir, A Wajahat
International Journal of Advanced Computer Science and Applications 10 (3), 2019
42019
Blockchain-enabled EHR access auditing: Enhancing healthcare data security
F Ullah, J He, N Zhu, A Wajahat, A Nazir, S Qureshi, MS Pathan, S Dev
Heliyon 10 (16), 2024
32024
Browser Forensics: Extracting Evidence from Browser Using Kali Linux and Parrot OS Forensics Tools
S Qureshi, J He, S Tunio, N Zhu, F Akhtar, F Ullah, A Nazir, A Wajahat
International Journal of Network Security 24 (3), 557-572, 2022
32022
A Study and Application Development on Monitoring Cardio-Vascular Attack using Internet of Thing (IoT)
F Akhtar, A Shakeel, A Nazir, A Wajahat, F Ullah, SU Qureshi
2020 3rd International Conference on Computing, Mathematics and Engineering …, 2020
32020
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20