Dr. Hanif Ullah
Cited by
Cited by
5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases
MC Hanif Ullah, Nithya Gopalakrishnan Nair, Adrian Moore, Chris Nugent, Paul ...
IEEE Access 7 (2019), 37251-37268, 2019
Unmanned aerial vehicles for disaster management
C Luo, W Miao, H Ullah, S McClean, G Parr, G Min
Geological disaster monitoring based on sensor networks, 83-107, 2019
Security considerations and recommendations in computer-based testing
SM Al-Saleem, H Ullah
The Scientific World Journal 2014, 2014
Bio-chaotic stream cipher-based iris image encryption
AS Alghamdi, H Ullah, M Mahmud, MK Khan
2009 International Conference on Computational Science and Engineering 2 …, 2009
An optimal UAV deployment algorithm for bridging communication
H Ullah, S McClean, P Nixon, G Parr, C Luo
2017 15th International conference on ITS telecommunications (ITST), 1-7, 2017
Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols
GPCL Hanif Ullah, Mamun Abu-Tair, Sally McClean, Paddy Nixon
EURASIP Journal on Wireless Communications and Networking, 20, 2020
An unmanned aerial vehicle based wireless network for bridging communication
H Ullah, M Abu-Tair, S McClean, P Nixon, G Parr, C Luo
2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017
A comparative analysis and evaluation of different agile software development methodologies
SM Al-Saleem, H Ullah
International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015
Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario
M Saedi, A Moore, P Perry, M Shojafar, H Ullah, J Synnott, R Brown, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-7, 2020
A secure iris image encryption technique using bio-chaotic algorithm
AS Alghamdi, H Ullah
International Journal of Computer and Network Security 2 (4), 78-84, 2010
Satellite image encryption for C4I System
AS Alghamdi, H Ullah, MU Khan, I Ahmad, K Alnafajan
International Journal of the Physical Sciences 6 (17), 4255-4263, 2011
Evaluating Chaos-based vs. Conventional Encryption Techniques for C4I System
AS Alghamdi, SUA HU
International Conference on Computer Communications and Networks (ICCCN 2011), 2011
Evaluating Encryption Techniques for C4I System.
AS Alghamdi, H Ullah, I Ahmad
CAINE, 196-201, 2010
Most known vulnerabilities in Saudi Arabian web servers
KS Alghathbar, M Mahmud, H Ullah
2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 1-5, 2008
A review of security considerations and palm based authentication scheme for computer based testing
SM Al-Saleem, H Ullah
2014 9th International Conference on Computer Science & Education, 291-293, 2014
Comparative analysis and evaluation of software vulnerabilities testing techniques
K Alnafjan, T Hussain, H Ullah, Z ul haq Paracha
International Journal of Computer and Information Engineering 7 (6), 687-692, 2013
Comparative Analysis and evaluation of Software Security Testing Techniques
TH Khalid Alnafjan, GF Khan, H Ullah, AS Alghamdi
International Archive of sciences journal, 2012
IoT security using Blockchain
H Ullah, M Abu-Tair, A Ali, K Rabbani, J Daniel, J Rafferty, Z Lin, ...
Essentials of Blockchain Technology, 169-188, 2019
Analysis and evaluation of web-based testing tools
SM Alsaleem, H Ullah
2015 International Conference and Workshop on Computing and Communication …, 2015
A comparative analysis of XP, RUP and DSDM Techniques
H Ullah, T Hussain, GF Khan, K Alnafjan
Science Series Data Report 4 (5), 2012
The system can't perform the operation now. Try again later.
Articles 1–20