Mukhtar Hussain
Orcid: 0000-0001-7987-7750
According to our database1,
Mukhtar Hussain
authored at least 24 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Wirel. Commun., April, 2024
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024
2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023
Sensors, February, 2023
2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022
2021
Low-Rank Estimation for Image Denoising Using Fractional-Order Gradient-Based Similarity Measure.
Circuits Syst. Signal Process., 2021
IEEE Access, 2021
2019
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019
2016
Security enhancement for video transmission via noise aggregation in immersive systems.
Multim. Tools Appl., 2016
Security protection over wireless fading channels by exploiting frequency selectivity.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016
2014
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment.
Wirel. Pers. Commun., 2014
2012
Modeling interaction using trust and recommendation in ubiquitous computing enivornment.
EURASIP J. Wirel. Commun. Netw., 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2009
A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques
CoRR, 2009
A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats
CoRR, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks.
Proceedings of the Advances in Information Security and Assurance, 2009
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the NBiS 2009, 2009
Proceedings of the IMF 2009, 2009
A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
1990
J. Intell. Robotic Syst., 1990