Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ... International Journal of Communication Systems 32 (16), e4139, 2019 | 32 | 2019 |
Energy Consumption Model for Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks NA • Kamran Latif, Nadeem Javaid, Malik Najmus Saqib, Zahoor Ali Khan International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 2016 | 28 | 2016 |
Energy hole minimization with field division for energy efficient routing in WSNs K Latif, N Javaid, MN Saqib, ZA Khan, U Qasim, B Mahmood, M Ilahi International Journal of Distributed Sensor Networks 11 (10), 953134, 2015 | 10 | 2015 |
AdDroid: rule-based machine learning framework for android malware analysis A Mehtab, WB Shahid, T Yaqoob, MF Amjad, H Abbas, H Afzal, MN Saqib Mobile Networks and Applications 25 (1), 180-192, 2020 | 8 | 2020 |
Energy hole minimization technique for energy efficient routing in under water sensor networks K Latif, MN Saqib, SH Bouk, N Javaid International Multi Topic Conference, 134-148, 2013 | 8 | 2013 |
An approach to secure mobile agents in automatic meter reading NS Malik, F Kupzog, M Sonntag 2010 International Conference on Cyberworlds, 187-193, 2010 | 8 | 2010 |
Anonymous and formally verified dual signature based online e-voting protocol Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, et al. Cluster Computing, 1-14, 2018 | 6* | 2018 |
Optimizing Security Computation Cost for Mobile Agent Platforms NS Malik, A Treytl 2007 5th IEEE International Conference on Industrial Informatics 1, 143-148, 2007 | 6 | 2007 |
A secure migration process for mobile agents NS Malik, D Ko, HH Cheng Software: Practice and Experience 41 (1), 87-101, 2011 | 5 | 2011 |
Reactive GTS allocation protocol for sporadic events using the IEEE 802.15. 4 M Azeem, MI Khan, Y Faheem, MI Tamimy, NS Malik, A Khan, M Ahmed Mathematical Problems in Engineering 2014, 2014 | 4 | 2014 |
Modeling enhancements in routing protocols under mobility and scalability constraints in VANETs N Javaid, M Akbar, ZA Khan, TA Alghamdi, MN Saqib, MI Khan International Journal of Distributed Sensor Networks 10 (7), 261823, 2014 | 4 | 2014 |
Modeling Enhancements in Routing Protocols under Mobility and Scalability Constraints in VANETs MIK N. Javaid, M. Akbar, Z. A. Khan, T. A. Alghamdi, M. N. Saqib International Journal of Distributed Sensor Networks 10 (7), 2014 | 4 | 2014 |
Implementation and Comparative Analysis of the Fault Attacks on AES. S Raza, NS Malik, A Shakeel, MI Khan Int. Arab J. Inf. Technol. 10 (6), 625-634, 2013 | 2 | 2013 |
Security Optimization for Agent platforms and reducing turnaround time for Mobile Agents NS Malik, A Treytl IFAC Proceedings Volumes 40 (22), 191-196, 2007 | 2 | 2007 |
Friedrich Kupzog Institute of Computer Technology Vienna University of Technology Vienna NS Malik Austria malik, kupzog@ ict. tuwien. ac.” Domain based Security for Mobile Agents, 0 | 2 | |
A Survey of Layered Approach to Threats and Countermeasures DS Bujud, AS AlGhamdi, MN Saqib Proceedings of the International Conference on Security and Management (SAM …, 2019 | | 2019 |
Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security ZA Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, Abid Khan, Adeel Anjum ... Journal of Medical Imaging and Health Informatics, 2017 | | 2017 |
Optimizing Turnaround Time for Mobile Agents in Centralized Key Server Scheme NS Malik, S Ziauddin International Conference on Future Computer and Communication, 3rd (ICFCC 2011), 2011 | | 2011 |
A Secure Migration Protocol for Mobile Agent Systems NS Malik, D Ko, HH Cheng ASME 2009 International Design Engineering Technical Conferences and …, 2009 | | 2009 |
Domain based security for mobile agents NS Malik, F Kupzog, M Sonntag 2008 6th IEEE International Conference on Industrial Informatics, 575-580, 2008 | | 2008 |