Noor Zaman, PhD
Cited by
Cited by
A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)
ZA Almusaylim, N Zaman
Wireless Networks 25 (6), 3193-3204, 2019
Proposing secure and lightweight authentication scheme for IoT based E-health applications
M Almulhim, N Zaman
2018 20th International Conference on advanced communication technology …, 2018
Energy efficient routing protocol for wireless sensor network
N Zaman, TJ Low, T Alghamdi
16th International Conference on Advanced Communication Technology, 808-814, 2014
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb, S Mahmood
Arabian Journal for Science and Engineering, 1-19, 2020
CTHS based energy efficient thermal aware image ALU design on FPGA
T Kumar, B Pandey, SHA Mussavi, N Zaman
Wireless Personal Communications 85 (3), 671-696, 2015
Studies of structural changes produced by high doses of gamma rays in some plastic track detectors
RA Akber, K Nadeem, CA Majid, A Hussain, N Zaman, MA Chaudhary, ...
Nuclear Instruments and Methods 173 (1), 217-221, 1980
Ransomware, threat and detection techniques: A review
S Kok, A Abdullah, N Jhanjhi, M Supramaniam
Int. J. Computer Science and Network Security 19 (2), 136, 2019
Comprehensive Review: Privacy Protection of User in Location‑Aware Services of Mobile Cloud Computing
ZA Almusaylim, NZ Jhanjhi
Wireless Personal Communications, Springer 111, 541-564, 2020
Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management
AA Noor Zaman, Khaled Rageb
IGI USA, 2012
Emerging smart logistics and transportation using IoT and blockchain
M Humayun, NZ Jhanjhi, B Hamid, G Ahmed
IEEE Internet of Things Magazine 3 (2), 58-62, 2020
Proposing a Secure RPL based Internet of Things Routing Protocol: A Review
ZA Almusaylim, A Alhumam, NZ Jhanjhi
Ad Hoc Networks 101, 102096, 2020
Smart traffic monitoring system using unmanned aerial vehicles (UAVs)
NA Khan, NZ Jhanjhi, SN Brohi, RSA Usmani, A Nayyar
Computer Communications 157, 434-443, 2020
A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications
M Almulhim, N Islam, N Zaman
International Journal of Computer Science and Network Security 19 (1), 107-120, 2019
Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic
NA Khan, SN Brohi, N Zaman
IEEE TechRxiv, 2020
Phishing website detection: An improved accuracy through feature selection and ensemble learning
AA Ubing, SKB Jasmi, A Abdullah, NZ Jhanjhi, M Supramaniam
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
Hidden link prediction in criminal networks using the deep reinforcement learning technique
M Lim, A Abdullah, NZ Jhanjhi, M Supramaniam
Computers 8 (1), 8, 2019
Designing of energy efficient routing protocol for Wireless Sensor Network (WSN) Using Location Aware (LA) Algorithm
DM Zafar, N Zaman, KA Raouf, S Mohammad
Journal of Information & Communication Technology JICT 3 (2), 56-70, 2009
Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication
A Diro, H Reda, N Chilamkurti, A Mahmood, N Zaman, Y Nam
IEEE Access 8, 60539-60551, 2020
Emerging use of UAV’s: secure communication protocol issues and challenges
NA Khan, NZ Jhanjhi, SN Brohi, A Nayyar
Drones in Smart-Cities, 37-55, 2020
SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET
K Hussain, SJ Hussain, NZ Jhanjhi, M Humayun
2019 International Conference on Computer and Information Sciences (ICCIS), 1-4, 2019
The system can't perform the operation now. Try again later.
Articles 1–20