Follow
tazar Hussain
tazar Hussain
Verified email at ulster.ac.uk
Title
Cited by
Cited by
Year
A Comprehensive analysis of XML and JSON web technologies
ZU Haq, GF Khan, T Hussain
New Developments in Circuits, Systems, Signal Processing, Communications and …, 2013
352013
Enhancing c4i security using threat modeling
AS Alghamdi, T Hussain, GF Khan
2010 12th International Conference on Computer Modelling and Simulation, 131-136, 2010
162010
M. and IQBAL, M., 2013. Lethal effects of secondary metabolites on plant tissue culture
I Ahmad, T Hussain, I Ashraf, M Nafees, R Maryam
American-Eurasian Journal of Agricultural & Environmental Sciences 13 (4 …, 0
14
A risk-based IoT decision-making framework based on literature review with human activity recognition case studies
T Hussain, C Nugent, A Moore, J Liu, A Beard
Sensors 21 (13), 4504, 2021
102021
Big data for C4I systems: goals, applications, challenges and tools
AS Alghamdi, I Ahmad, T Hussain
Fifth International Conference on the Innovative Computing Technology …, 2015
92015
Designing framework for the interoperability of C4I systems
T Hussain, RM Mehmood, A ul Haq, KA Alnafjan, AS Alghamdi
2014 International Conference on Computational Science and Computational …, 2014
82014
An Attack Impact and Host Importance based Approach to Intrusion Response Action Selection
T Hussain, C Nugent, J Liu, A Beard, L Chen, A Moore
Proceedings of the 4th International Conference on Information Technology …, 2022
22022
Comparative analysis and evaluation of software vulnerabilities testing techniques
K Alnafjan, T Hussain, H Ullah, Z ul haq Paracha
International Journal of Computer and Information Engineering 7 (6), 687-692, 2013
22013
Proposed methodology to enhance C4I systems security on architectural level
AS Alghamdi, T Hussain, GF Khan, K Alnafjan, A Haseeb
Scientific Research and Essays 6 (29), 6095-6103, 2011
22011
Towards software engineering process for C4I systems
T Hussain, KN Al-Mutib, AS Alghamdi
2011 IEEE 3rd International Conference on Communication Software and …, 2011
22011
From Machine Learning Based Intrusion Detection to Cost Sensitive Intrusion Response
T Hussain, A Beard, L Chen, C Nugent, J Liu, A Moore
2022 6th International Conference on Cryptography, Security and Privacy (CSP …, 2022
12022
A Situation Calculus based approach to Cognitive Modelling for Responding to IoT Cyberattacks
PK Chouhan, L Chen, T Hussain, A Beard
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2021
12021
Behavior based Comparative analysis of XML and JSON web technologies
K Alnafjan, GF Khan, T Hussain, H Ullah, AS Alghamdi
12015
A comparative analysis of XP, RUP and DSDM Techniques
H Ullah, T Hussain, GF Khan, K Alnafjan
Science Series Data Report 4 (5), 2012
12012
USING AHP TO COMPARE AND EVALUATE SOFTWARE SECURITY TESTING TECHNIQUES
K Alnafjan, T Hussain, GF Khan, H Ullah, AS Alghamdi
Acta Press, 0
1
An Analysis of the Impact of Uncertainty on the Internet of Things: A Smart Home Case Study
T Hussain, C Nugent, A Moore, J Liu
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
2019
ANALYZING THE BENEFITS OF CLOUD COMPUTING IN THE CONTEXT OF C41 C41 SYSTEMS
T Hussain, F Amin, K Alnafjan, MA Alghamdi
2015
C4I Security Enhancement using Modeling and Fuzzy Rule based Expert System
HUASA Khalid Alnafjan, Tazar Hussain, Gul Faraz Khan
Information Journal Japan 16 (12(B)), 8843-8852, 2013
2013
Evaluating and Selecting the Best Encryption Approach for the Security of C4I Systems
THASA Hanif Ullah
Information Journal Japan 16 (12(B)), 8823-8832, 2013
2013
Evaluating Software Security Risks Using Fuzzy Rule Based Expert System
ASA Khalid Alnafjan, Tazar Hussain, Gul Faraz Khan,Hanif Ullah
20th ISCA International Conference on Software Engineering and Data …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20