Towards a methodology for validation of centrality measures in complex networks K Batool, MA Niazi PloS one 9 (4), e90283, 2014 | 138 | 2014 |
Modeling the internet of things: a hybrid modeling approach using complex networks and agent-based models K Batool, MA Niazi Complex Adaptive Systems Modeling 5, 1-19, 2017 | 82 | 2017 |
Prevalence of hepatitis B and c in university of the Punjab, Quaid-e-azam campus, Lahore A Tanveer, K Batool, AW Qureshi ARPN J Agri and Bio Sci 3, 30-32, 2008 | 25 | 2008 |
[Retracted] Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code H Ali, K Batool, M Yousaf, M Islam Satti, S Naseer, S Zahid, AA Gardezi, ... Security and Communication Networks 2022 (1), 7972230, 2022 | 15 | 2022 |
Towards modeling complex wireless sensor networks using agents and networks: a systematic approach K Batool, MA Niazi, S Sadik, ARR Shakil TENCON 2014-2014 IEEE Region 10 Conference, 1-6, 2014 | 11 | 2014 |
Self-organized power consumption approximation in the internet of things K Batool, MA Niazi 2015 IEEE International Conference on Consumer Electronics (ICCE), 313-314, 2015 | 10 | 2015 |
Comparison of named entity recognition models based on neural network in biomedical A Kishwar, K Batool 2021 International Bhurban Conference on Applied Sciences and Technologies …, 2021 | 5 | 2021 |
Detection of malicious servers for preventing client-side attacks K Bux, M Yousaf, AH Jalbani, K Batool Mehran University Research Journal Of Engineering & Technology 40 (1), 230-240, 2021 | 4 | 2021 |
A comparative analysis between General Data Protection Regulations and California Consumer Privacy Act SKH Naqvi, K Batool Journal of Computer Science, Information Technology and Telecommunication …, 2023 | 2 | 2023 |
Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code A Hasnat, K Batool, M Yousaf, MI Satti, S Naseer, S Zahid, AA Gardezi, ... Security and Communication Networks 2022, 2022 | 1 | 2022 |
Research Article Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code H Ali, K Batool, M Yousaf, MI Satti, S Naseer, S Zahid, AA Gardezi, ... | | 2022 |
Level of Awareness of Women Protection Laws among Public and Private University Teachers in Lahore (Pakistan). NA Abdullah, MA Malik, K Batool Journal of Educational Sciences & Research 8 (2), 2021 | | 2021 |
Exploratory and validated agent-based modeling levels case study: Internet of Things KBMA niazi Modeling and Simulation of Complex Communication Networks, 209 –238 (30), 2019 | | 2019 |
Hawk eye security-security IOT deveices from cyber attacks M Talha, M Malik, A Hamza, K Batool, M Akram MCS, 2018 | | 2018 |
Tamper-Evident Complex Genomic Networks K Batool, MA Niazi arXiv, 14, 2017 | | 2017 |
Detection of Privacy Threat by Peculiar Feature Extraction in Malwares to Combat Targeted Cyber Attacks FH Ahmad, K Batool, A Javed Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | | 2016 |
Detection of Privacy Threat by Peculiar Feature Extraction in Malwares to Combat Targeted Cyber Attacks AJ Farhan Habib Ahmad , Komal Batool Springer International Publishing 362 (Lecture Notes in Electrical …, 2015 | | 2015 |
ISSPIT 2017 Technical Program Committee MF Liew, N Adra, M Ishtiaq, T Alemu, AH Ali, R Ammar, KA Kumar, ... | | |