M. Faisal Amjad

Orcid: 0000-0003-4912-6168

According to our database1, M. Faisal Amjad authored at least 41 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins.
J. Cloud Comput., December, 2024

2023
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy.
J. Ambient Intell. Humaniz. Comput., 2023

Security Assessment and Evaluation of VPNs: A Comprehensive Survey.
ACM Comput. Surv., 2023

CNN-HMM Model for Real Time DGA Categorization.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Vadsec-a Lightweight Protection Scheme for Secure Topology Discovery in SDN.
Proceedings of the 12th International Conference on Networks, Communication and Computing, 2023

2022
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN.
IEEE Internet Things J., 2022

Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons.
ACM Comput. Surv., 2022

2021
AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks.
Comput. Commun., 2021

A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP.
Neural Comput. Appl., 2020

Exploring nested ensemble learners using overproduction and choose approach for churn prediction in telecom industry.
Neural Comput. Appl., 2020

AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis.
Mob. Networks Appl., 2020

On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages.
Future Gener. Comput. Syst., 2020

Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach.
Telecommun. Syst., 2019

Fog computing in internet of things: Practical applications and future directions.
Peer-to-Peer Netw. Appl., 2019

Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint.
J. Medical Syst., 2019

Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations.
Future Gener. Comput. Syst., 2019

AndroKit: A toolkit for forensics analysis of web browsers on android platform.
Future Gener. Comput. Syst., 2019

A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques.
IEEE Access, 2019

Cuckoo's Malware Threat Scoring and Classification: Friend or Foe?
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.
J. Supercomput., 2018

Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients.
Comput. Secur., 2018

An evolutionary routing game for energy balance in Wireless Sensor Networks.
Comput. Networks, 2018

A Multi-Classifier Framework for Open Source Malware Forensics.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

2017
Algebraic Side Channel Attack on Trivium and Grain Ciphers.
IEEE Access, 2017

Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks.
Wirel. Networks, 2016

Evolutionary non-cooperative spectrum sharing game: long-term coexistence for collocated cognitive radio networks.
Wirel. Commun. Mob. Comput., 2016

Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks.
Comput. Networks, 2016

ADP: An adaptive feedback approach for energy-efficient wireless sensor networks.
Proceedings of the 2016 International Conference on Computing, 2016

An Evolutionary Game for Efficient Routing in Wireless Sensor Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Transparent cross-layer solutions for throughput boost in Cognitive Radio Networks.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Optimal roadside units placement in urban areas for vehicular networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

2009
Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009


  Loading...