Atif Ali

Orcid: 0000-0003-3055-6029

According to our database1, Atif Ali authored at least 12 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Smart Exact String Matching Algorithm Specifically for DNA Sequencing.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

The Hidden Ledger: Understanding Bitcoin's Pseudonymity in Dark Web Transactions.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

The Synergy of Artificial Intelligence and Cybersecurity.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2022
Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

The Threat of Deep Fake Technology to Trusted Identity Management.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

2021
A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study.
Inf. Technol. Control., 2021

2020
Role of Requirement Prioritization Technique to Improve the Quality of Highly-Configurable Systems.
IEEE Access, 2020

Threat Modeling Framework For Security Of Unified Storages In Private Data Centers.
Proceedings of the 22nd IEEE Conference on Business Informatics, 2020

2019
Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS).
Proceedings of the 2019 Wireless Telecommunications Symposium, 2019


  Loading...