Faheem Ullah

Orcid: 0009-0001-1670-8690

According to our database1, Faheem Ullah authored at least 39 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
6D object pose estimation based on dense convolutional object center voting with improved accuracy and efficiency.
Vis. Comput., August, 2024

Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

Evaluation of distributed data processing frameworks in hybrid clouds.
J. Netw. Comput. Appl., 2024

Systematic review of deep learning solutions for malware detection and forensic analysis in IoT.
J. King Saud Univ. Comput. Inf. Sci., 2024

An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources.
Intell. Decis. Technol., 2024

A Survey on Immersive Cyber Situational Awareness Systems.
CoRR, 2024

Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures.
CoRR, 2024

Microservice Vulnerability Analysis: A Literature Review With Empirical Insights.
IEEE Access, 2024

Ensemble Learning Techniques for the Detection of IoT Botnets.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024

2023
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Defending SDN against packet injection attacks using deep learning.
Comput. Networks, October, 2023

Resource Utilization of Distributed Databases in Edge-Cloud Environment.
IEEE Internet Things J., June, 2023

An adaptive semi-supervised deep learning-based framework for the detection of Android malware.
J. Intell. Fuzzy Syst., 2023

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures.
ACM Comput. Surv., 2023

Guidance Models for Designing Big Data Cyber Security Analytics Systems.
Proceedings of the Software Architecture - 17th European Conference, 2023

An Exploratory Study of Vulnerabilities in Big Data Systems.
Proceedings of the IEEE International Conference on Big Data, 2023

Co-Tuning of Cloud Infrastructure and Distributed Data Processing Platforms.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
On the scalability of Big Data Cyber Security Analytics systems.
J. Netw. Comput. Appl., 2022

Design and evaluation of adaptive system for big data cyber security analytics.
Expert Syst. Appl., 2022

Machine Learning for Detecting Data Exfiltration: A Review.
ACM Comput. Surv., 2022

Design and Implementation of Fragmented Clouds for Evaluation of Distributed Databases.
CoRR, 2022

A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment.
CoRR, 2022

Scalable Containerized Pipeline for Real-time Big Data Analytics.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
An efficient algorithm for numerical solution of fractional integro-differential equations via Haar wavelet.
J. Comput. Appl. Math., 2021

Evaluation of Distributed Databases in Hybrid Clouds and Edge Computing: Energy, Bandwidth, and Storage Consumption.
CoRR, 2021

A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks.
IEEE Access, 2021

Automated Security Assessment for the Internet of Things.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

2020
Machine Learning for Detecting Data Exfiltration.
CoRR, 2020

2019
Architectural Tactics for Big Data Cybersecurity Analytics Systems: A Review.
J. Syst. Softw., 2019

Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

An Architecture-Driven Adaptation Approach for Big Data Cyber Security Analytics.
Proceedings of the IEEE International Conference on Software Architecture, 2019

QuickAdapt: Scalable Adaptation for Big Data Cyber Security Analytics.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
Data exfiltration: A review of external attack vectors and countermeasures.
J. Netw. Comput. Appl., 2018

Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review.
CoRR, 2018

2017
Security Support in Continuous Deployment Pipeline.
Proceedings of the ENASE 2017, 2017

2016
Finding the needle in a haystack: Chasing rarely occurring bugs in concurrent software.
PhD thesis, 2016

Detecting Anomalies in Concurrent Programs Based on Dynamic Control Flow Changes.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

2015
Profiling for detecting performance anomalies in concurrent software.
Proceedings of the 2nd International Workshop on Software Engineering for Parallel Systems, 2015

2010
YETI on the Cloud.
Proceedings of the Third International Conference on Software Testing, 2010


  Loading...