Cluster head election schemes for WSN and MANET: a survey K Hussain, AH Abdullah, KM Awan, F Ahsan, A Hussain World Applied Sciences Journal 23 (5), 611-620, 2013 | 51 | 2013 |
Performance enhancement in wireless body area networks with secure communication SJ Hussain, M Irfan, NZ Jhanjhi, K Hussain, M Humayun Wireless Personal Communications 116 (1), 1-22, 2021 | 44 | 2021 |
Evaluation of halide-activated pack boriding of INCONEL 722 W Muhammad, K Hussain, A Tauoir, AU Hao, AQ Khan Metallurgical and Materials Transactions A 30 (3), 670-675, 1999 | 42 | 1999 |
Enhanced watershed image processing segmentation A Shahzad, M Sharif, M Raza, K Hussain Journal of Information & Communication Technology 2 (1), 01-09, 2008 | 36 | 2008 |
A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology RM Amir Latif, K Hussain, NZ Jhanjhi, A Nayyar, O Rizwan Multimedia tools and applications, 1-24, 2020 | 31 | 2020 |
Efficient cluster head selection algorithm for MANET K Hussain, AH Abdullah, S Iqbal, KM Awan, F Ahsan Journal of Computer Networks and communications 2013, 2013 | 31 | 2013 |
SYN flood attack detection based on bayes estimator (SFADBE) for MANET K Hussain, SJ Hussain, NZ Jhanjhi, M Humayun 2019 International Conference on Computer and Information Sciences (ICCIS), 1-4, 2019 | 30 | 2019 |
Method and system for item authentication and customization K Hussain, MT Dominguez, DE Failor, WG Ackerman US Patent 9,291,559, 2016 | 20 | 2016 |
An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO K Javed, U Saleem, K Hussain, M Sher JoC 1 (1), 107-112, 2010 | 17 | 2010 |
Energy-efficient intrusion detection system for wireless sensor network based on MUSK architecture S Khanum, M Usman, K Hussain, R Zafar, M Sher High Performance Computing and Applications, 212-217, 2010 | 17 | 2010 |
The survey of sentiment and opinion mining for behavior analysis of social media S Iqbal, A Zulqurnain, Y Wani, K Hussain arXiv preprint arXiv:1610.06085, 2015 | 15 | 2015 |
Using meta-data technique for component based black box testing F Naseer, S ur Rehman, K Hussain 2010 6th International Conference on Emerging Technologies (ICET), 276-281, 2010 | 15 | 2010 |
Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes K Hussain, NZ Jhanjhi, H Mati-ur-Rahman, J Hussain, MH Islam Journal of King Saud University-Computer and Information Sciences 33 (4 …, 2021 | 13 | 2021 |
An ontological framework for information extraction from diverse scientific sources G Zaman, H Mahdin, K Hussain, J Abawajy, SA Mostafa IEEE access 9, 42111-42124, 2021 | 12 | 2021 |
Information extraction from semi and unstructured data sources: A systematic literature review G Zaman, H Mahdin, K Hussain, A Rahman ICIC Exp. Lett. 14 (6), 593-603, 2020 | 11 | 2020 |
An Adaptive SYN Flooding attack Mitigation in DDOS Environment K Hussain, SJ Hussain, V Dillshad, M Nafees, MA Azeem International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 11 | 2016 |
Survey on survival approaches in wireless network against jamming attack F Ahsan, A Zahir, S Mohsin, K Hussain Journal of Theoretical and Applied Information Technology 30 (1), 55-67, 2011 | 11 | 2011 |
Rule based (forward chaining/data driven) expert system for node level congestion handling in opportunistic network A Sajid, K Hussain Mobile Networks and Applications 23 (3), 446-455, 2018 | 10 | 2018 |
Customized item cover K Hussain US Patent 7,747,670, 2010 | 9 | 2010 |
Performance of mustard varieties in relation to doses of sulfur N Khan, K Hussain Adv Plant Sci 12, 115-118, 1999 | 9 | 1999 |