5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases MC Hanif Ullah, Nithya Gopalakrishnan Nair, Adrian Moore, Chris Nugent, Paul ... IEEE Access 7 (2019), 37251-37268, 2019 | 260 | 2019 |
Unmanned aerial vehicles for disaster management C Luo, W Miao, H Ullah, S McClean, G Parr, G Min Geological disaster monitoring based on sensor networks, 83-107, 2019 | 75 | 2019 |
Security considerations and recommendations in computer-based testing SM Al-Saleem, H Ullah The Scientific World Journal 2014, 2014 | 38 | 2014 |
Bio-chaotic stream cipher-based iris image encryption AS Alghamdi, H Ullah, M Mahmud, MK Khan 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 25 | 2009 |
A secure iris image encryption technique using bio-chaotic algorithm AS Alghamdi, H Ullah International Journal of Computer and Network Security 2 (4), 78-84, 2010 | 13 | 2010 |
An optimal UAV deployment algorithm for bridging communication H Ullah, S McClean, P Nixon, G Parr, C Luo 2017 15th International conference on ITS telecommunications (ITST), 1-7, 2017 | 12 | 2017 |
A comparative analysis and evaluation of different agile software development methodologies SM Al-Saleem, H Ullah International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015 | 12 | 2015 |
Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols GPCL Hanif Ullah, Mamun Abu-Tair, Sally McClean, Paddy Nixon EURASIP Journal on Wireless Communications and Networking, 20, 2020 | 11* | 2020 |
An unmanned aerial vehicle based wireless network for bridging communication H Ullah, M Abu-Tair, S McClean, P Nixon, G Parr, C Luo 2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017 | 10 | 2017 |
Satellite image encryption for C4I System AS Alghamdi, H Ullah, MU Khan, I Ahmad, K Alnafajan International Journal of the Physical Sciences 6 (17), 4255-4263, 2011 | 8 | 2011 |
Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario M Saedi, A Moore, P Perry, M Shojafar, H Ullah, J Synnott, R Brown, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-7, 2020 | 5 | 2020 |
Evaluating Chaos-based vs. Conventional Encryption Techniques for C4I System AS Alghamdi, SUA HU International Conference on Computer Communications and Networks (ICCCN 2011), 2011 | 5 | 2011 |
Evaluating Encryption Techniques for C4I System. AS Alghamdi, H Ullah, I Ahmad CAINE, 196-201, 2010 | 5 | 2010 |
Most known vulnerabilities in Saudi Arabian web servers KS Alghathbar, M Mahmud, H Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 1-5, 2008 | 3 | 2008 |
Comparative Analysis and Evaluation of Software Vulnerabilities Testing Techniques K Alnafjan, T Hussain, H Ullah, Z ul haq Paracha International Journal of Computer and Information Engineering 7 (6), 687-692, 2013 | 2 | 2013 |
Comparative Analysis and evaluation of Software Security Testing Techniques TH Khalid Alnafjan, GF Khan, H Ullah, AS Alghamdi International Archive of sciences journal, 2012 | 2 | 2012 |
IoT security using Blockchain H Ullah, M Abu-Tair, A Ali, K Rabbani, J Daniel, J Rafferty, Z Lin, ... Essentials of Blockchain Technology, 169-188, 2019 | 1 | 2019 |
Analysis and evaluation of web-based testing tools SM Alsaleem, H Ullah 2015 International Conference and Workshop on Computing and Communication …, 2015 | 1 | 2015 |
A review of security considerations and palm based authentication scheme for computer based testing SM Al-Saleem, H Ullah 2014 9th International Conference on Computer Science & Education, 291-293, 2014 | 1 | 2014 |
Behavior based Comparative analysis of XML and JSON web technologies K Alnafjan, GF Khan, T Hussain, H Ullah, AS Alghamdi Wulfenia Journal, Klagenfurt, Austria 19 (11), 194-205, 2012 | 1 | 2012 |