Junaid Arshad
Orcid: 0000-0003-0424-9498
According to our database1,
Junaid Arshad
authored at least 70 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EURASIP J. Inf. Secur., December, 2024
TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs).
Clust. Comput., December, 2024
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT.
Internet Things, 2024
Comput. Electron. Agric., 2024
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph.
Big Data Min. Anal., 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
2023
Guest Editorial: Machine learning applied to quality and security in software systems.
IET Softw., August, 2023
TruCert: Blockchain-based trustworthy product certification within autonomous automotive supply chains.
Comput. Electr. Eng., August, 2023
IEEE Internet Things Mag., June, 2023
Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63].
Future Gener. Comput. Syst., June, 2023
Comput. Secur., June, 2023
Comput. Electr. Eng., April, 2023
Inf., February, 2023
Concurr. Comput. Pract. Exp., 2023
A Proxy-Layer Approach to Secure Smart Contract Deployment on Private EVM-Based PoA Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
DEEPSEL: A novel feature selection for early identification of malware in mobile applications.
Future Gener. Comput. Syst., 2022
An empirical investigation of performance challenges within context-aware content sharing for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Trans. Emerg. Telecommun. Technol., 2022
Distributed Ledger Technol. Res. Pract., 2022
Clust. Comput., 2022
Blockchain-based Supply Chain Traceability for COVID-19 personal protective equipment.
Comput. Ind. Eng., 2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
A bibliometric approach to quantitatively assess current research trends in 5G security.
Libr. Hi Tech, 2021
Analysis of security and privacy challenges for DNA-genomics applications and databases.
J. Biomed. Informatics, 2021
IEEE Internet Things J., 2021
Comput. Secur., 2021
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs.
Comput. Networks, 2021
IEEE Access, 2021
IEEE Access, 2021
IEEE Access, 2021
Design and Implementation of CryptoCargo: A Blockchain-Powered Smart Shipping Container for Vaccine Distribution.
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Comput. Electr. Eng., 2020
Appl. Soft Comput., 2020
Blockchain-Based Solution for COVID-19 Digital Medical Passports and Immunity Certificates.
IEEE Access, 2020
IEEE Access, 2020
2019
IET Networks, 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. Electr. Eng., 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Int. J. Electron. Gov. Res., 2018
CoRR, 2018
2016
J. Netw. Comput. Appl., 2016
Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry.
J. Cheminformatics, 2016
J. Grid Comput., 2016
A Model for Information and Action Flows Connecting Science Gateways to Distributed Computing Infrastructures.
Proceedings of the 8th International Workshop on Science Gateways, 2016
2014
Wind Power Prediction Using Genetic Programming Based Ensemble of Artificial Neural Networks (GPeANN).
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014
2013
Future Gener. Comput. Syst., 2013
2012
Int. J. Grid High Perform. Comput., 2012
2011
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011
An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds.
Int. J. Cloud Appl. Comput., 2011
A review of grid authentication and authorization technologies and support for federated access control.
ACM Comput. Surv., 2011
The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research.
Proceedings of the E-Technologies: Transformation in a Connected World, 2011
2010
Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences.
J. Supercomput., 2010
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.
Proceedings of the Advances in Computer Science and Information Technology, 2010
2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
2008
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
2006
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006