Kashif Kifayat
Orcid: 0000-0001-5088-0825
According to our database1,
Kashif Kifayat
authored at least 48 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Utilizing CPG-3D, graph theory anchored approach to recognize human action recognition.
Multim. Tools Appl., May, 2024
Digital twin framework for smart greenhouse management using next-gen mobile networks and machine learning.
Future Gener. Comput. Syst., 2024
IEEE Access, 2024
2023
Image forgery detection by transforming local descriptors into deep-derived features.
Appl. Soft Comput., November, 2023
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks.
Comput. Commun., September, 2023
Neural Comput. Appl., July, 2023
Signal Image Video Process., June, 2023
2022
J. Intell. Fuzzy Syst., 2022
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions.
IEEE Access, 2022
2021
Telecommun. Syst., 2021
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning.
Trans. Emerg. Telecommun. Technol., 2021
2020
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment.
J. Parallel Distributed Comput., 2020
Key feature identification for recognition of activities performed by a smart-home resident.
J. Ambient Intell. Humaniz. Comput., 2020
2019
KSII Trans. Internet Inf. Syst., 2019
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet.
IET Networks, 2019
Robust spatial fuzzy GMM based MRI segmentation and carotid artery plaque detection in ultrasound images.
Comput. Methods Programs Biomed., 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
2018
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel.
J. Inf. Secur. Appl., 2018
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017
Enforcing Access Control Models in System Applications by Using Aspect-Oriented Programming: A Literature Review.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017
2016
J. Sens. Actuator Networks, 2016
Risk assessment and attack graph generation for collaborative infrastructures: a survey.
Int. J. Crit. Comput. Based Syst., 2016
Proceedings of the Smart Grid Inspired Future Technologies, 2016
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016
2015
Int. J. Crit. Infrastructures, 2015
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014
2013
Secur. Commun. Networks, 2013
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
2009
A framework for physical health improvement using Wireless Sensor Networks and gaming.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
2008
2007
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007