Faheem Ullah

Orcid: 0000-0002-7678-1603

According to our database1, Faheem Ullah authored at least 34 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

Evaluation of distributed data processing frameworks in hybrid clouds.
J. Netw. Comput. Appl., 2024

An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024

Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures.
CoRR, 2024

2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Defending SDN against packet injection attacks using deep learning.
Comput. Networks, October, 2023

Resource Utilization of Distributed Databases in Edge-Cloud Environment.
IEEE Internet Things J., June, 2023

An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures.
ACM Comput. Surv., 2023

Guidance Models for Designing Big Data Cyber Security Analytics Systems.
Proceedings of the Software Architecture - 17th European Conference, 2023

An Exploratory Study of Vulnerabilities in Big Data Systems.
Proceedings of the IEEE International Conference on Big Data, 2023

Co-Tuning of Cloud Infrastructure and Distributed Data Processing Platforms.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
On the scalability of Big Data Cyber Security Analytics systems.
J. Netw. Comput. Appl., 2022

Design and evaluation of adaptive system for big data cyber security analytics.
Expert Syst. Appl., 2022

Machine Learning for Detecting Data Exfiltration: A Review.
ACM Comput. Surv., 2022

Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases.
CoRR, 2022

A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment.
CoRR, 2022

Scalable Containerized Pipeline for Real-time Big Data Analytics.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
An efficient algorithm for numerical solution of fractional integro-differential equations via Haar wavelet.
J. Comput. Appl. Math., 2021

Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption.
CoRR, 2021

A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks.
IEEE Access, 2021

Automated Security Assessment for the Internet of Things.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

2020
Machine Learning for Detecting Data Exfiltration.
CoRR, 2020

2019
Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review.
J. Syst. Softw., 2019

Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics.
Proceedings of the IEEE International Conference on Software Architecture, 2019

QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
Data exfiltration: A review of external attack vectors and countermeasures.
J. Netw. Comput. Appl., 2018

Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review.
CoRR, 2018

2017
Security Support in Continuous Deployment Pipeline.
Proceedings of the ENASE 2017, 2017

2016
Finding the needle in a haystack: Chasing rarely occurring bugs in concurrent software.
PhD thesis, 2016

Detecting Anomalies in Concurrent Programs Based on Dynamic Control Flow Changes.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

2015
Profiling for detecting performance anomalies in concurrent software.
Proceedings of the 2nd International Workshop on Software Engineering for Parallel Systems, 2015

2010
YETI on the Cloud.
Proceedings of the Third International Conference on Software Testing, 2010


  Loading...