Ayesha Altaf
Orcid: 0000-0001-6446-4945
According to our database1,
Ayesha Altaf
authored at least 18 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2024
J. Netw. Syst. Manag., October, 2024
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network.
IEEE Access, 2024
2023
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.
Sensors, October, 2023
Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective.
Syst., August, 2023
Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction.
Sensors, 2023
Sensors, 2023
DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents.
Sensors, 2023
Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems.
IEEE Internet Things J., 2023
IEEE Access, 2023
2021
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks.
J. Syst. Archit., 2021
Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings.
IEEE Internet Things J., 2021
Comput. Electr. Eng., 2021
2019
Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019
Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT).
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2009
Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005.
J. Digit. Content Technol. its Appl., 2009
2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography.
Proceedings of the Second International Conference on Emerging Security Information, 2008