Raheel Hassan
Cited by
Cited by
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
An adaptive intrusion detection and prevention system for Internet of Things
ST Bakhsh, S Alghamdi, RA Alsemmeari, SR Hassan
International Journal of Distributed Sensor Networks 15 (11), 1550147719888109, 2019
Protecting grids from cross-domain attacks using security alert sharing mechanisms
RH Syed, M Syrame, J Bourgeois
Future Generation Computer Systems 29 (2), 536-547, 2013
A hybrid dual-mode trust management scheme for vehicular networks
IA Rai, RA Shaikh, SR Hassan
International Journal of Distributed Sensor Networks 16 (7), 1550147720939372, 2020
A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
SZ Nizamani, SR Hassan, RA Shaikh, EA Abozinadah, R Mehmood
IEEE Access 9, 51294-51312, 2021
Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus
R Asif, SR Hassan
Frontiers in Blockchain 6, 1151724, 2023
A text based authentication scheme for improving security of textual passwords
SZ Nizamani, TJ Khanzada, SR Hassan, MZ Jali
International Journal of Advanced Computer Science and Applications 8 (7), 2017
Fast attack detection using correlation and summarizing of security alerts in grid computing networks
RH Syed, J Pazardzievska, J Bourgeois
The Journal of Supercomputing 62, 804-827, 2012
Evaluation of video streaming performance over peer-to-peer network
SA Memon, SR Hassan, NA Memon
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
The advents of ubiquitous computing in the development of smart cities—A review on the internet of things (IoT)
J Ali, MH Zafar, C Hewage, SR Hassan, R Asif
Electronics 12 (4), 1032, 2023
TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
SZ Nizamani, SR Hassan, RA Shaikh
Arabian Journal for Science and Engineering 45 (4), 2763-2778, 2020
Managing Security of Grid Architecture with a Grid Security Operation Center.
J Bourgeois, SR Hassan
SECRYPT 9, 403-408, 2009
Enhanced textual password scheme for better security and memorability
H Bhanbhro, SR Hassan, SZ Nizamani, ST Bakhsh, MO Alassafi
International Journal of Advanced Computer Science and Applications 9 (7), 2018
Blood image analysis to detect malaria using filtering image edges and classificatio
M Memon, TJS Khanzada, S Memon, SR Hassan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (1), 194-201, 2019
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator
S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon
First International Conference on Modern Communication & Computing …, 2014
Integrating a blockchain-based governance framework for responsible AI
R Asif, SR Hassan, G Parr
Future Internet 15 (3), 97, 2023
Mathematical modeling and validation of retransmission-based mutant MQTT for improving quality of service in developing smart cities
J Ali, MH Zafar, C Hewage, R Hassan, R Asif
Sensors 22 (24), 9751, 2022
An evaluation model for recognition-based graphical password schemes.
SZ Nizamani, SR Hassan, RA Shaikh, ST Bakhsh
Journal of Information Assurance & Security 14 (3), 2019
The system can't perform the operation now. Try again later.
Articles 1–20