Understanding Dijkstra's Algorithm A Javaid Available at SSRN 2340905, 2013 | 106 | 2013 |
Implementation of cloud computing for smes MA Javaid World Journal of Computer Application and Technology 2 (3), 66-72, 2014 | 9 | 2014 |
Brain-computer interface A Javaid Available at SSRN 2386900, 2013 | 9 | 2013 |
Benchmarks for Setting Up CERT A Javaid Available at SSRN 2389061, 2013 | 8 | 2013 |
Cyber security: Challenges ahead A Javaid Available at SSRN 3281086, 2016 | 7 | 2016 |
Top Threats to Cloud Computing Security A Javaid Available at SSRN 2325234, 2013 | 7 | 2013 |
5G Technologies: Fundamental Shift in Mobile Networking Philosophy A Javaid Available at SSRN 2387193, 2013 | 6 | 2013 |
Electronic Voting System Security A Javaid Available at SSRN 2393158, 2014 | 5 | 2014 |
A strategic model for adopting energy efficient cloud computing infrastructure for sustainable environment A Javaid Available at SSRN 2389084, 2015 | 4 | 2015 |
Research Methods and Statistics MA Javaid | 3 | 2017 |
PSYCHOLOGY OF HACKERS MA Javaid | 2 | 2021 |
Medical nanorobots: our new healthcare defense A Javaid Acad Lett 2021, 1629, 2021 | 2 | 2021 |
Wireless Sensor Networks: Software Architecture A Javaid Available at SSRN 2391872, 2014 | 2 | 2014 |
Cloud Computing Security and Privacy A Javaid Available at SSRN 2388377, 2015 | 1 | 2015 |
Proposed Pricing Model for Cloud Computing A Javaid Available at SSRN 2390809, 2014 | 1 | 2014 |
Incident Response Planning for Data Protection A Javaid Available at SSRN 2391677, 2013 | 1 | 2013 |