Seguir
Dr. Muhammad Yousaf
Título
Citado por
Citado por
Ano
Neighbor Node Trust based Intrusion Detection System for WSN
SM Sajjad, SH Bouk, M Yousaf
Elsevier Procedia Computer Science 63, 183-188, 2015
952015
Security Analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
SM Sajjad, M Yousaf
IEEE Information Assurance and Cyber Security (CIACS), 2014 Conference on, 9-14, 2014
662014
Evaluation of IEEE 802.11n for Multimedia Application in VANET
MS Akbar, MS Khan, KA Khaliq, A Qayyum, M Yousaf
Elsevier Procedia Computer Science 32, 953-958, 2014
362014
Temper Proof Data Distribution for Universal Verifiability and Accuracy in Electoral Process using Blockchain
SH Shaheen, M Yousaf, M Jalil
IEEE 13th International Conference on Emerging Technologies (ICET), 1-6, 2017
332017
Performance Evaluation of Transport Layer Protocols for Video Traffic over WiMAX
HMO Chughtai, SA Malik, M Yousaf
IEEE 13th International Multitopic Conference, 2009, INMIC-2009, 1-6, 2009
262009
eMUD: Enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers
SM Sajjad, M Yousaf, H Afzal, MR Mufti
IEEE Access 8, 164200-164213, 2020
232020
Generation of AES-like S-boxes by replacing Affine Matrix
U Waqas, S Afzal, MA Mir, M Yousaf
Frontiers of Information Technology (FIT), 2014 12th International …, 2014
222014
Source specific centralized secure multicast scheme based on IPSec
SH Shaheen, M Yousaf
2015 Conference on Information Assurance and Cyber Security (CIACS), 30-35, 2015
212015
On End-to-End Mobility Management in 4G Heterogeneous Wireless Networks
M Yousaf, A Qayyum
IEEE International Networking and Communications Conference, 2008. INCC 2008 …, 2008
212008
Cryptographic Strength Evaluation of Key Schedule Algorithms
S Afzal, M Yousaf, H Afzal, N Alharbe, MR Mufti
Security and Communication Networks Journal 2020, 2020
192020
A Cross-Layer User-Centric Vertical Handover Decision Approach based on MIH Local Triggers
M Rehan, M Yousaf, A Qayyum, S Malik
Springer Wireless and Mobile Networking, 359-369, 2009
192009
A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment
T Zeb, M Yousaf, H Afzal, MR Mufti
IEEE China Communications Journal 15 (8), 126-140, 2018
162018
Performance Comparison of End-to-End Mobility Management Protocols for TCP
PA Shah, M Yousaf, A Qayyum, HB Hasbullah
Elsevier Journal of Network and Computer Applications 35 (6), 1657-1673, 2012
162012
Statistical Analysis of Key Schedule Algorithms of Different Block Ciphers
S Afzal, U Waqas, MA Mir, M Yousaf
Science International 27 (3), 2015
152015
Security Analysis of DTLS Structure and its Application to Secure Multicast Communication
SH Shaheen, M Yousaf
IEEE 12th International Conference on Frontiers of Information Technology …, 2014
142014
A Secure Architecture for Inter-Cloud Virtual Machine Migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
Springer International Conference on Security and Privacy in Communication …, 2014
142014
An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation
M Yousaf, A Qayyum, SA Malik
Springer Wireless Personal Communications 66 (1), 57-79, 2012
142012
GA-based Geometrically Optimized Topology Robustness to Improve Ambient Intelligence of Future Internet of Things
SA Changazi, AD Bakhshi, M Yousaf, MH Islam, SM Mohsin, SS Band, ...
Elsevier Computer Communications Journal 193, 109-117, 2022
132022
Performance Analysis of Radio Spectrum for Cognitive Radio Wireless Networks using Discrete Time Markov Chain
H Afzal, MR Mufti, I Awan, M Yousaf
Elsevier Journal of Systems and Software 151, 1-7, 2019
132019
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets
SM Sajjad, M Yousaf
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
132018
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20