Zahid Anwar
Zahid Anwar
Fontbonne University USA; National University of Sciences and Technology, Pakistan
Verified email at fontbonne.edu - Homepage
TitleCited byYear
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing …, 2005
1782005
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges
U Shaukat, E Ahmed, Z Anwar, F Xia
Journal of Network and Computer Applications 62, 18-40, 2016
742016
Semantic security against web application attacks
A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
622014
Digital forensics for eucalyptus
F Anwar, Z Anwar
2011 Frontiers of Information Technology, 110-116, 2011
592011
Design and deployment of a trusted eucalyptus cloud
I Khan, H Rehman, Z Anwar
2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011
492011
Ontology for attack detection: An intelligent approach to web application security
A Razzaq, Z Anwar, HF Ahmad, K Latif, F Munir
computers & security 45, 124-146, 2014
472014
RRW—a robust and reversible watermarking technique for relational data
S Iftikhar, M Kamran, Z Anwar
IEEE Transactions on knowledge and data engineering 27 (4), 1132-1145, 2014
442014
Real-time 3d video compression for tele-immersive environments
Z Yang, Y Cui, Z Anwar, R Bocchino, N Kiyanclar, K Nahrstedt, ...
Multimedia Computing and Networking 2006 6071, 607102, 2006
402006
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference …, 2006
362006
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE Conference on Communications and Network Security (CNS), 180-188, 2016
332016
Edos armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments
M Masood, Z Anwar, SA Raza, MA Hur
INMIC, 37-42, 2013
322013
Leveraging social-network infrastructure to improve peer-to-peer overlay performance: Results from orkut
Z Anwar, W Yurcik, V Pandey, A Shankar, I Gupta, RH Campbell
Arxiv preprint cs/0509095, 2005
312005
Automatic security assessment of critical cyber-infrastructures
Z Anwar, R Shankesi, RH Campbell
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
292008
Data-driven analytics for cyber-threat intelligence and information sharing
S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu
Computers & Security 67, 35-58, 2017
272017
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things
M Mohsin, MU Sardar, O Hasan, Z Anwar
IEEE Access 5, 5494-5505, 2017
272017
Can a DDoS attack meltdown my data center? A simulation study and defense strategies
Z Anwar, AW Malik
IEEE Communications Letters 18 (7), 1175-1178, 2014
252014
SWAM: Stuxnet worm analysis in metasploit
R Masood, Z Anwar
2011 Frontiers of Information Technology, 142-147, 2011
202011
TRDBAC: Temporal reflective database access control
Z Rashid, A Basit, Z Anwar
2010 6th International Conference on Emerging Technologies (ICET), 337-342, 2010
182010
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations
M Mohsin, Z Anwar, F Zaman, E Al-Shaer
Computers & Security 70, 199-223, 2017
172017
CloudNetSim++: a GUI based framework for modeling and simulation of data centers in OMNeT++
AW Malik, K Bilal, SU Malik, Z Anwar, K Aziz, D Kliazovich, N Ghani, ...
IEEE Transactions on Services Computing 10 (4), 506-519, 2015
162015
The system can't perform the operation now. Try again later.
Articles 1–20