Mukhtar Hussain

Orcid: 0000-0001-7987-7750

According to our database1, Mukhtar Hussain authored at least 24 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Federated Zero Trust Architecture using Artificial Intelligence.
IEEE Wirel. Commun., April, 2024

Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024

2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023

Correlation-Based Anomaly Detection in Industrial Control Systems.
Sensors, February, 2023

2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022

2021
Low-Rank Estimation for Image Denoising Using Fractional-Order Gradient-Based Similarity Measure.
Circuits Syst. Signal Process., 2021

Mixed Noise Removal Using Adaptive Median Based Non-Local Rank Minimization.
IEEE Access, 2021

2019
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

2016
Security enhancement for video transmission via noise aggregation in immersive systems.
Multim. Tools Appl., 2016

Security protection over wireless fading channels by exploiting frequency selectivity.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

2014
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment.
Wirel. Pers. Commun., 2014

2012
Modeling interaction using trust and recommendation in ubiquitous computing enivornment.
EURASIP J. Wirel. Commun. Netw., 2012

An adaptive framework for trust based security in pervasive computing environment.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

On Trust Management for Multimedia P2P Applications in Autonomic Networking.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2009
A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques
CoRR, 2009

A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats
CoRR, 2009

Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs).
Proceedings of the Advances in Information Security and Assurance, 2009

A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the Advances in Information Security and Assurance, 2009

Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks.
Proceedings of the NBiS 2009, 2009

An Automated User Transparent Approach to log Web URLs for Forensic Analysis.
Proceedings of the IMF 2009, 2009

A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

1990
Parallel processing in knowledge-based diagnostic systems.
J. Intell. Robotic Syst., 1990


  Loading...