Follow
Dr. Hanif Ullah
Title
Cited by
Cited by
Year
5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases
MC Hanif Ullah, Nithya Gopalakrishnan Nair, Adrian Moore, Chris Nugent, Paul ...
IEEE Access 7 (2019), 37251-37268, 2019
3352019
Unmanned aerial vehicles for disaster management
C Luo, W Miao, H Ullah, S McClean, G Parr, G Min
Geological disaster monitoring based on sensor networks, 83-107, 2019
1012019
Security considerations and recommendations in computer-based testing
SM Al-Saleem, H Ullah
The Scientific World Journal 2014, 2014
432014
Bio-chaotic stream cipher-based iris image encryption
AS Alghamdi, H Ullah, M Mahmud, MK Khan
2009 International Conference on Computational Science and Engineering 2 …, 2009
262009
An optimal UAV deployment algorithm for bridging communication
H Ullah, S McClean, P Nixon, G Parr, C Luo
2017 15th International conference on ITS telecommunications (ITST), 1-7, 2017
172017
Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols
GPCL Hanif Ullah, Mamun Abu-Tair, Sally McClean, Paddy Nixon
EURASIP Journal on Wireless Communications and Networking, 20, 2020
14*2020
An unmanned aerial vehicle based wireless network for bridging communication
H Ullah, M Abu-Tair, S McClean, P Nixon, G Parr, C Luo
2017 14th International Symposium on Pervasive Systems, Algorithms and …, 2017
142017
A comparative analysis and evaluation of different agile software development methodologies
SM Al-Saleem, H Ullah
International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015
142015
Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario
M Saedi, A Moore, P Perry, M Shojafar, H Ullah, J Synnott, R Brown, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-7, 2020
132020
A secure iris image encryption technique using bio-chaotic algorithm
AS Alghamdi, H Ullah
International Journal of Computer and Network Security 2 (4), 78-84, 2010
132010
Satellite image encryption for C4I System
AS Alghamdi, H Ullah, MU Khan, I Ahmad, K Alnafajan
International Journal of the Physical Sciences 6 (17), 4255-4263, 2011
92011
Evaluating Chaos-based vs. Conventional Encryption Techniques for C4I System
AS Alghamdi, SUA HU
International Conference on Computer Communications and Networks (ICCCN 2011), 2011
52011
Evaluating Encryption Techniques for C4I System.
AS Alghamdi, H Ullah, I Ahmad
CAINE, 196-201, 2010
52010
Most known vulnerabilities in Saudi Arabian web servers
KS Alghathbar, M Mahmud, H Ullah
2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 1-5, 2008
32008
A review of security considerations and palm based authentication scheme for computer based testing
SM Al-Saleem, H Ullah
2014 9th International Conference on Computer Science & Education, 291-293, 2014
22014
Comparative analysis and evaluation of software vulnerabilities testing techniques
K Alnafjan, T Hussain, H Ullah, Z ul haq Paracha
International Journal of Computer and Information Engineering 7 (6), 687-692, 2013
22013
Comparative Analysis and evaluation of Software Security Testing Techniques
TH Khalid Alnafjan, GF Khan, H Ullah, AS Alghamdi
International Archive of sciences journal, 2012
22012
IoT security using Blockchain
H Ullah, M Abu-Tair, A Ali, K Rabbani, J Daniel, J Rafferty, Z Lin, ...
Essentials of Blockchain Technology, 169-188, 2019
12019
Analysis and evaluation of web-based testing tools
SM Alsaleem, H Ullah
2015 International Conference and Workshop on Computing and Communication …, 2015
12015
A comparative analysis of XP, RUP and DSDM Techniques
H Ullah, T Hussain, GF Khan, K Alnafjan
Science Series Data Report 4 (5), 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20