Haider Abbas
Orcid: 0000-0002-2437-4870
According to our database1,
Haider Abbas
authored at least 151 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Secure semantic search using deep learning in a blockchain-assisted multi-user setting.
J. Cloud Comput., December, 2024
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins.
J. Cloud Comput., December, 2024
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks.
Int. J. Inf. Sec., August, 2024
IEEE Trans. Emerg. Top. Comput. Intell., April, 2024
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware.
IEEE Trans. Dependable Secur. Comput., 2024
Dielectrically Modulated Single Schottky Barrier and Electrostatically Doped Drain Based FET for Biosensing Applications.
IEEE Access, 2024
2023
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network.
IEEE Trans. Intell. Transp. Syst., September, 2023
DS-CNN: Dual-Stream Convolutional Neural Networks-Based Heart Sound Classification for Wearable Devices.
IEEE Trans. Consumer Electron., 2023
ACM Comput. Surv., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
2022
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022
Neural Comput. Appl., 2022
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling.
J. Netw. Comput. Appl., 2022
A deep learning assisted personalized deception system for countering web application attacks.
J. Inf. Secur. Appl., 2022
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN.
IEEE Internet Things J., 2022
A framework to predict early news popularity using deep temporal propagation patterns.
Expert Syst. Appl., 2022
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons.
ACM Comput. Surv., 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing.
IEEE Syst. J., 2021
A survey on common criteria (CC) evaluating schemes for security assessment of IT products.
PeerJ Comput. Sci., 2021
PeerJ Comput. Sci., 2021
Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication.
IEEE Netw., 2021
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks.
J. Syst. Archit., 2021
Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings.
IEEE Internet Things J., 2021
Int. J. Inf. Sec., 2021
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations.
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Applications of artificial intelligence in COVID-19 pandemic: A comprehensive review.
Expert Syst. Appl., 2021
AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks.
Comput. Commun., 2021
Comput. Electr. Eng., 2021
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
Guest Editorial Introduction to the Special Section on Cognitive Software Defined Networks and Applications.
IEEE Trans. Netw. Sci. Eng., 2020
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices.
IEEE J. Biomed. Health Informatics, 2020
Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
Telecommun. Syst., 2020
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.
IEEE Syst. J., 2020
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC.
IEEE Syst. J., 2020
Neural Comput. Appl., 2020
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP.
Neural Comput. Appl., 2020
Mob. Networks Appl., 2020
An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security.
IEEE Internet Things J., 2020
Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems.
Neurocomputing, 2020
Special issue: Cognitive Internet of Things assisted by cloud computing and big data.
Future Gener. Comput. Syst., 2020
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages.
Future Gener. Comput. Syst., 2020
SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks.
IEEE Commun. Surv. Tutorials, 2020
Comput. Commun., 2020
IEEE Access, 2020
IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems.
IEEE Access, 2020
Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users' Location Coordinates for Privacy Enhancement.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
2019
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach.
Telecommun. Syst., 2019
Peer-to-Peer Netw. Appl., 2019
A hybrid-adaptive neuro-fuzzy inference system for multi-objective regression test suites optimization.
Neural Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019
J. Medical Syst., 2019
J. Medical Syst., 2019
Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices - A Review.
IEEE Commun. Surv. Tutorials, 2019
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019
A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques.
IEEE Access, 2019
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy.
IEEE Access, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT).
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
Wirel. Commun. Mob. Comput., 2018
J. Supercomput., 2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multim. Tools Appl., 2018
CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing.
Mob. Networks Appl., 2018
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis.
J. Netw. Comput. Appl., 2018
A unified framework for automated inspection of handheld safety critical devices in production assemblies.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review.
Ad Hoc Sens. Wirel. Networks, 2018
Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2018
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
2017
IEEE Trans. Ind. Informatics, 2017
J. Medical Syst., 2017
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes.
J. Inf. Sci. Eng., 2017
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017
Inf. Sci., 2017
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Gener. Comput. Syst., 2017
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2017
2016
A framework for cloud forensics evidence collection and analysis using security information and event management.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
J. Medical Syst., 2016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Syst., 2016
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
J. Intell. Fuzzy Syst., 2016
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Ann. des Télécommunications, 2016
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges.
IEEE Access, 2016
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
Proceedings of the Workshop on Early Reliability Modeling for Aging and Variability in Silicon Systems, 2016
2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mob. Inf. Syst., 2015
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
Int. J. Distributed Sens. Networks, 2015
Clust. Comput., 2015
Proceedings of the 12th International Conference on Information Technology, 2015
Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure.
Proceedings of the 17th International Conference on E-health Networking, 2015
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015
2014
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: <i>A Systematic Literature Review</i>.
J. Medical Syst., 2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Netw. Comput. Appl., 2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the Intelligent Computing Theories and Technology, 2013
2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Inf. Manag. Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009
2002
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics: Bridging the Digital Divide, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002