Follow
Shahzad Saleem
Shahzad Saleem
Assistant Professor, University of Jeddah, KSA
Verified email at uj.edu.sa
Title
Cited by
Cited by
Year
A supervised machine learning based approach for automatically extracting high-level threat intelligence from unstructured sources
Y Ghazi, Z Anwar, R Mumtaz, S Saleem, A Tahir
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
672018
A machine learning framework for investigating data breaches based on semantic analysis of adversary’s attack patterns in threat intelligence repositories
U Noor, Z Anwar, AW Malik, S Khan, S Saleem
Future Generation Computer Systems 95, 467-487, 2019
602019
QCM2R: A QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks
W Rehan, S Fischer, M Rehan, Y Mawad, S Saleem
Journal of Network and Computer Applications 156, 102552, 2020
422020
Evaluation of some tools for extracting e-evidence from mobile devices
AK Kubi, S Saleem, O Popov
2011 5th International Conference on Application of Information and …, 2011
392011
Protecting digital evidence integrity and preserving chain of custody
MSMB Shah, S Saleem, R Zulqarnain
Journal of Digital Forensics, Security and Law 12 (2), 12, 2017
362017
Extended abstract digital forensics model with preservation and protection as umbrella principles
S Saleem, O Popov, I Bagilli
Procedia Computer Science 35, 812-821, 2014
352014
A survey on wireless wearable body area networks: A perspective of technology and economy
DS Bhatti, S Saleem, A Imran, Z Iqbal, A Alzahrani, HJ Kim, KI Kim
Sensors 22 (20), 7722, 2022
332022
Forensic analysis of three social media apps in windows 10
A Majeed, H Zia, R Imran, S Saleem
2015 12th International Conference on High-capacity Optical Networks and …, 2015
302015
Enhanced adaptive data hiding method using LSB and pixel value differencing
M Hussain, Q Riaz, S Saleem, A Ghafoor, KH Jung
Multimedia Tools and Applications 80, 20381-20401, 2021
292021
PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable
SKJ Rizvi, W Aslam, M Shahzad, S Saleem, MM Fraz
Complex & Intelligent Systems, 1-13, 2022
262022
Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app
A Afzal, M Hussain, S Saleem, MK Shahzad, ATS Ho, KH Jung
Applied Sciences 11 (17), 7789, 2021
232021
Securing insulin pump system using deep learning and gesture recognition
U Ahmad, H Song, A Bilal, S Saleem, A Ullah
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
232018
Forensics study of IMO call and chat app
MAK Sudozai, S Saleem, WJ Buchanan, N Habib, H Zia
Digital investigation 25, 5-23, 2018
232018
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis
S Saleem, O Popov, I Baggili
Digital Investigation 16, S55-S64, 2016
232016
Evaluating and comparing tools for mobile device forensics using quantitative analysis
S Saleem, O Popov, OK Appiah-Kubi
Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013
222013
Evaluation of security methods for ensuring the integrity of digital evidence
S Saleem, O Popov, R Dahman
2011 International Conference on Innovations in Information Technology, 220-225, 2011
222011
VPN Traffic Detection in SSL‐Protected Channel
M Zain ul Abideen, S Saleem, M Ejaz
Security and Communication Networks 2019 (1), 7924690, 2019
202019
Weighted hybrid features for person re-identification
S Mumtaz, N Mubariz, S Saleem, MM Fraz
2017 Seventh International Conference on Image Processing Theory, Tools and …, 2017
192017
Testing framework for mobile device forensics tools
M Anobah, S Saleem, O Popov
Journal of Digital Forensics, Security and Law 9 (2), 18, 2014
192014
Protecting the integrity of digital evidence and basic human rights during the process of digital forensics
S Saleem
Department of Computer and Systems Sciences, Stockholm University, 2015
142015
The system can't perform the operation now. Try again later.
Articles 1–20