Dr. Muhammad Yousaf
Dr. Muhammad Yousaf
Verified email at riphah.edu.pk - Homepage
Title
Cited by
Cited by
Year
Neighbor Node Trust based Intrusion Detection System for WSN
SM Sajjad, SH Bouk, M Yousaf
Procedia Computer Science 63, 183-188, 2015
512015
Security Analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
SM Sajjad, M Yousaf
Information Assurance and Cyber Security (CIACS), 2014 Conference on, 9-14, 2014
352014
Evaluation of IEEE 802.11n for Multimedia Application in VANET
MS Akbar, MS Khan, KA Khaliq, A Qayyum, M Yousaf
Procedia Computer Science 32, 953-958, 2014
292014
Performance Evaluation of Transport Layer Protocols for Video Traffic over WiMAX
HMO Chughtai, SA Malik, M Yousaf
Multitopic Conference, 2009. INMIC 2009. IEEE 13th International, 1-6, 2009
222009
On End-to-End Mobility Management in 4G Heterogeneous Wireless Networks
M Yousaf, A Qayyum
Networking and Communications Conference, 2008. INCC 2008. IEEE …, 2008
202008
A Cross-Layer User-Centric Vertical Handover Decision Approach based on MIH Local Triggers
M Rehan, M Yousaf, A Qayyum, S Malik
Wireless and Mobile Networking, 359-369, 2009
162009
Temper proof data distribution for universal verifiability and accuracy in electoral process using blockchain
SH Shaheen, M Yousaf, M Jalil
2017 13th International Conference on Emerging Technologies (ICET), 1-6, 2017
142017
Performance Comparison of End-to-End Mobility Management Protocols for TCP
PA Shah, M Yousaf, A Qayyum, HB Hasbullah
Journal of Network and Computer Applications 35 (6), 1657-1673, 2012
132012
An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation
M Yousaf, A Qayyum, SA Malik
Wireless Personal Communications 66 (1), 57-79, 2012
132012
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
M Yousaf, S Bhatti, M Rehan, A Qayyum, SA Malik
International Conference on Intelligent Computing, 413-422, 2009
122009
Security Analysis of DTLS Structure and its Application to Secure Multicast Communication
SH Shaheen, M Yousaf
Frontiers of Information Technology (FIT), 2014 12th International …, 2014
92014
A secure architecture for inter-cloud virtual machine migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2014
92014
Optimized Routing Information Exchange in Hybrid IPv4-IPv6 Network using OSPFv3 & EIGRPv6
Z Ashraf, M Yousaf
International Journal of Advanced Computer Science and Applications 8 (4 …, 2017
82017
Generation of AES-like S-boxes by replacing Affine Matrix
U Waqas, S Afzal, MA Mir, M Yousaf
Frontiers of Information Technology (FIT), 2014 12th International …, 2014
72014
Statistical Analysis of Key Schedule Algorithms of Different Block Ciphers
S Afzal, U Waqas, MA Mir, M Yousaf
Science International 27 (3), 2015
62015
End-to-end Mobility Management Solutions for TCP: An Analysis
PA Shah, M Yousaf
Computer and Information Technology, 2008. ICCIT 2008. 11th International …, 2008
62008
Security Analysis of Internet of Things Adaptation Layer
SM Sajjad, M Yousaf
Science International 28 (4), 2016
52016
ISP Independent Architecture (IIA) for IPv6 Packet Traversing and Inter-Connectivity over Hybrid (IPv4/IPv6) Internet
T Saraj, M Yousaf, S Akbar, A Qayyum, M Tufail
Procedia Computer Science 32, 973-978, 2014
52014
Effectiveness of Multi-homing and Parallel Transmission during and after the Vertical Handover
PA Shah, M Yousaf, A Qayyum, HB Hasbullah
Computer & Information Science (ICCIS), 2012 International Conference on 2 …, 2012
52012
Secure Inter-VLAN IPv6 Routing: Implementation & Evaluation
Z Ashraf, M Yousaf
Science International 28 (3), 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20