Dr. Munam Ali Shah
Dr. Munam Ali Shah
COMSATS University Islamabad, Pakistan
Verified email at comsats.edu.pk - Homepage
TitleCited byYear
Effective ways to use Internet of Things in the field of medical and smart health care
K Ullah, MA Shah, S Zhang
2016 International Conference on Intelligent Systems Engineering (ICISE …, 2016
732016
Green IoT: An investigation on energy saving practices for 2020 and beyond
R Arshad, S Zahoor, MA Shah, A Wahid, H Yu
IEEE Access 5, 15667-15681, 2017
602017
Smart cities: A survey on security concerns
S Ijaz, MA Shah, A Khan, M Ahmed
International Journal of Advanced Computer Science and Applications 7 (2 …, 2016
602016
Load balancing algorithms in cloud computing: A survey of modern techniques
S Aslam, MA Shah
2015 National software engineering conference (NSEC), 30-35, 2015
602015
Cognitive radio networks for Internet of Things: Applications, challenges and future
MA Shah, S Zhang, C Maple
2013 19th International Conference on Automation and Computing, 1-6, 2013
512013
Android malware detection & protection: a survey
S Arshad, MA Shah, A Khan, M Ahmed
International Journal of Advanced Computer Science and Applications 7 (2 …, 2016
452016
SAMADroid: a novel 3-level hybrid malware detection model for android operating system
S Arshad, MA Shah, A Wahid, A Mehmood, H Song, H Yu
IEEE Access 6, 4321-4339, 2018
352018
Software Defined Network (SDN) Based Internet of Things (IoT) A Road Ahead
SK Tayyaba, MA Shah, OA Khan, AW Ahmed
Proceedings of the International Conference on Future Networks and …, 2017
272017
DDH-MAC: a novel dynamic de-centralized hybrid mac protocol for cognitive radio networks
MA Shah, GA Safdar, C Maple
2011 RoEduNet International Conference 10th Edition: Networking in Education …, 2011
242011
Big data analytics for mitigating broadcast storm in vehicular content centric networks
A Wahid, MA Shah, FF Qureshi, H Maryam, R Iqbal, V Chang
Future Generation Computer Systems 86, 1301-1320, 2018
212018
IoT based smart home: Security challenges, security requirements and solutions
W Ali, G Dustgeer, M Awais, MA Shah
2017 23rd International Conference on Automation and Computing (ICAC), 1-6, 2017
212017
IoT security: A layered approach for attacks & defenses
MM Ahemd, MA Shah, A Wahid
2017 International Conference on Communication Technologies (ComTech), 104-110, 2017
202017
A survey on security for smartphone device
SFA Zaidi, MA Shah, M Kamran, Q Javaid, S Zhang
International journal of advanced computer science and applications 7 (4 …, 2016
202016
Constraints in the IoT: the world in 2020 and beyond
A Haroon, MA Shah, Y Asim, W Naeem, M Kamran, Q Javaid
Constraints 7 (11), 252-271, 2016
202016
An analysis on decentralized adaptive MAC protocols for cognitive radio networks
MA Shah, S Zhang, C Maple
International Journal of Automation and Computing 10 (1), 46-52, 2013
202013
IoT based ransomware growth rate evaluation and detection using command and control blacklisting
A Zahra, MA Shah
2017 23rd International Conference on Automation and Computing (ICAC), 1-6, 2017
172017
Energy efficient computing: a comparison of Raspberry PI with modern devices
W Anwaar, MA Shah
Energy 4 (2), 410-413, 2015
172015
Cryptography: A comparative analysis for modern techniques
F Maqsood, M Ahmed, MM Ali, MA Shah
International Journal of Advanced Computer Science and Applications 8 (6 …, 2017
162017
A survey on smartphones systems for emergency management (SPSEM)
H Maryam, MA Shah, Q Javaid, M Kamran
International Journal of Advanced Computer Science and Applications 7 (6 …, 2016
162016
Software-defined networks (SDNs) and Internet of Things (IoTs): A qualitative prediction for 2020
SK Tayyaba, MA Shah, NSA Khan, Y Asim, W Naeem, M Kamran
network 7 (11), 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20