Munam Ali Shah

Orcid: 0000-0002-4037-3405

According to our database1, Munam Ali Shah authored at least 154 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SGO: Semantic Group Obfuscation for Location-Based Services in VANETS.
Sensors, February, 2024

Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses.
IEEE Access, 2024

2023
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Multi-branch sustainable convolutional neural network for disease classification.
Int. J. Imaging Syst. Technol., September, 2023

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling.
IEEE Access, 2023

An Empirical Study on Hybrid Scheduling Algorithms in Cloud Computing.
Proceedings of the 28th International Conference on Automation and Computing, 2023

2022
A Novel Privacy Paradigm for Improving Serial Data Privacy.
Sensors, 2022

Cross-Domain Security and Interoperability in Internet of Things.
IEEE Internet Things J., 2022

Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges.
Int. J. Commun. Syst., 2022

Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images.
CoRR, 2022

Achieving data privacy for decision support systems in times of massive data sharing.
Clust. Comput., 2022

Towards an effective model for lung disease classification: Using Dense Capsule Nets for early classification of lung diseases.
Appl. Soft Comput., 2022

A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022

Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms.
IEEE Access, 2022

Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems.
Proceedings of the 27th International Conference on Automation and Computing, 2022

Access Control using Blockchain: A Taxonomy and Review.
Proceedings of the ICISDM 2022: 2022 the 6th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2022

2021
Futuristic blockchain based scalable and cost-effective 5G vehicular network architecture.
Veh. Commun., 2021

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things.
ACM Trans. Internet Techn., 2021

Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021

Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021

Privacy-preserving multilevel obfuscation scheme for vehicular network.
Trans. Emerg. Telecommun. Technol., 2021

An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments.
Comput. Electr. Eng., 2021

URL filtering using big data analytics in 5G networks.
Comput. Electr. Eng., 2021

Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles.
IEEE Access, 2021

Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation.
IEEE Access, 2021

Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Evaluation of Cyber Security Threats in Banking Systems.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

The Price Scraping Bot Threat on E-commerce Store Using Custom XPATH Technique.
Proceedings of the 26th International Conference on Automation and Computing, 2021

Malware Persistence and Obfuscation: An Analysis on Concealed Strategies.
Proceedings of the 26th International Conference on Automation and Computing, 2021

A Comparative study on Securing Electronic Health Records (EHR) in Cloud Computing.
Proceedings of the 26th International Conference on Automation and Computing, 2021

Quantum Safe Cloud Computing Using Hash-based Digital Signatures.
Proceedings of the 26th International Conference on Automation and Computing, 2021

The ingenuity of malware substitution: Bypassing next-generation Antivirus.
Proceedings of the 26th International Conference on Automation and Computing, 2021

2020
Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

A novel amended dynamic round robin scheduling algorithm for timeshared systems.
Int. Arab J. Inf. Technol., 2020

Cascading handcrafted features and Convolutional Neural Network for IoT-enabled brain tumor segmentation.
Comput. Commun., 2020

5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning.
IEEE Access, 2020

Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles.
IEEE Access, 2020

A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments.
IEEE Access, 2020

VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles.
IEEE Access, 2020

Towards Energy Efficient Smart Grids Using Bio-Inspired Scheduling Techniques.
IEEE Access, 2020

2019
A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments.
Sensors, 2019

Resource allocation in SDN based 5G cellular networks.
Peer-to-Peer Netw. Appl., 2019

A reliability aware protocol for cooperative communication in cognitive radio networks.
Int. J. Autom. Comput., 2019

iCAFE: Intelligent Congestion Avoidance and Fast Emergency services.
Future Gener. Comput. Syst., 2019

Perception layer security in Internet of Things.
Future Gener. Comput. Syst., 2019

CCN: A novel energy efficient greedy routing protocol for green computing.
Concurr. Comput. Pract. Exp., 2019

Holistic approach for coupling privacy with safety in VANETs.
Comput. Networks, 2019

Human Bond Communications: Architectures, Challenges, and Possibilities.
IEEE Commun. Mag., 2019

A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing.
IEEE Access, 2019

Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach.
IEEE Access, 2019

Delay-Aware Accident Detection and Response System Using Fog Computing.
IEEE Access, 2019

Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019

On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine.
Proceedings of the Services - SERVICES 2019, 2019

A Survey on secure routing strategies in VANETs.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Barriers of Requirement Change Management Process in the Context of Global Software Development.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Network of ECUs Software Update in Future vehicles.
Proceedings of the 25th International Conference on Automation and Computing, 2019

DDoS in IoT: A Roadmap Towards Security & Countermeasures.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Hierarchical Topic Modeling for Urdu Text Articles.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Analyzing Quality of Software Requirements; A Comparison Study on NLP Tools.
Proceedings of the 25th International Conference on Automation and Computing, 2019

A Novel Model for HD video calling in 5G Networks.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Evaluation of the Impact of Traffic Congestion Based on SUMO.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Coronary Artery Bypass Grafting (CABG) Anatomy with E-Learning Environment.
Proceedings of the 25th International Conference on Automation and Computing, 2019

An Aspect of Internet of Things Security: Analysis of Digital Fingerprinting of Generic Twitter Sessions by Using Forensic Tool.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Smart Cities: Methods, Encounters & Hunt for Future - Survey.
Proceedings of the 25th International Conference on Automation and Computing, 2019

LAOD: Link Aware on Demand Routing in Flying Ad-Hoc Networks.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
ESOT: a new privacy model for preserving location privacy in Internet of Things.
Telecommun. Syst., 2018

Smart Road Traffic Accidents Reduction Strategy Based on Intelligent Transportation Systems (TARS).
Sensors, 2018

NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2018

Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks.
Future Gener. Comput. Syst., 2018

Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond.
IEEE Access, 2018

Counter Measuring Conceivable Security Threats on Smart Healthcare Devices.
IEEE Access, 2018

Leveraging Named Data Networking for Fragmented Networks in Smart Metropolitan Cities.
IEEE Access, 2018

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System.
IEEE Access, 2018

Exploiting Big Data Analytics for Smart Urban Planning.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Evaluating Bio-Inspired Optimization Techniques for Utility Price Estimation in Fog Computing.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

A Review of Smartphone's Text Entry for Visually Impaired.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Detection of Parkinson Disease in Brain MRI using Convolutional Neural Network.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Prediction of Diabetes Using Machine Learning Algorithms in Healthcare.
Proceedings of the 24th International Conference on Automation and Computing, 2018

A VANET based Smart Car Parking System to Minimize Searching Time, Fuel Consumption and CO2 Emission.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Statistical Topic Modeling for Urdu Text Articles.
Proceedings of the 24th International Conference on Automation and Computing, 2018

EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Performance Analysis of Snort using Network Function Virtualization.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Intelligent Transport System: An Important Aspect of Emergency Management in Smart Cities.
Proceedings of the 24th International Conference on Automation and Computing, 2018

NDN Based Communication for Fragmented Network: The Case of Smart Metropolitan (MAN).
Proceedings of the 24th International Conference on Automation and Computing, 2018

Software Cost and Effort Estimation using a New Optimization Algorithm Inspired by Strawberry Plant.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Comparison of Machine Learning Algorithms in Data classification.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Integrated Architecture of Data Warehouse with Business Intelligence Technologies.
Proceedings of the 24th International Conference on Automation and Computing, 2018

AWS Support in Open Source Mano Monitoring Module.
Proceedings of the 24th International Conference on Automation and Computing, 2018

An Architecture for Fog Computing Enabled Emergency Response and Disaster Management System (ERDMS).
Proceedings of the 24th International Conference on Automation and Computing, 2018

Survey on Causes of Motion Sickness in Virtual Reality.
Proceedings of the 24th International Conference on Automation and Computing, 2018

A methodology to characterize and compute correlation between traffic congestion and health issues via social media.
Proceedings of the 24th International Conference on Automation and Computing, 2018

A Novel Authentication and Security Protocol for Wireless Adhoc Networks.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Adaptive Transmission Power - Geographical and Energy Aware Routing Algorithm for Wireless Sensor Networks.
Proceedings of the 24th International Conference on Automation and Computing, 2018

A Novel Framework for Plagiarism Detection: A Case Study for Urdu Language.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Internet of Things - Security threats and challenges in M2M Devices.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Impact of Membership and Non-membership Features on Classification Decision: An Empirical Study for Appraisal of Feature Selection Methods.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Full Disk Encryption: A Comparison on Data Management Attributes.
Proceedings of the 2nd International Conference on Information System and Data Mining, 2018

Complex Adaptive Systems: A Data Modelling and Engineering Perspective.
Proceedings of the 2nd International Conference on Information System and Data Mining, 2018

2017
Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond.
IEEE Access, 2017

A Novel Delay Constraint Location Privacy Scheme in VANETs.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

E-Lithe: A Lightweight Secure DTLS for IoT.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

A survey on resource allocation in software defined networks (SDN).
Proceedings of the 23rd International Conference on Automation and Computing, 2017

IoT based ransomware growth rate evaluation and detection using command and control blacklisting.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

A new cross layer MAC protocol for data forwarding in underwater acoustic sensor networks.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Review of model-free gait recognition in biometrie systems.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

A smart parking system to minimize searching time, fuel consumption and CO2 emission.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Authentication analysis using input gestures in touch-based mobile devices.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Smart city: A roadmap towards implementation.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Data mining techniques and applications - A decade review.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Inter-process communication, MPI and MPICH in microkernel environment: A comparative analysis.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Enhanced user preference based intelligent scheduling algorithm (E-UPISA).
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Real-time opinion mining of Twitter data using spring XD and Hadoop.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

A survey of internet of things, enabling technologies and protocols.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Software defined networks: An analysis on robust security practices.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Information-centric networking: A review on futuristic networks.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

OptiSEC: In search of an optimal sensor cloud architecture.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Iris recognition system in smartphones using light version (LV) recognition algorithm.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

IoT based smart home: Security challenges, security requirements and solutions.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

A review: Security challenges in cognitive radio networks.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

An IoT based robust healthcare model for continuous health monitoring.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Fog computing: Security issues, solutions and robust practices.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

2016
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices.
Int. J. Autom. Comput., 2016

Erratum to: A survey on MAC protocols for complex self-organizing cognitive radio networks.
Complex Adapt. Syst. Model., 2016

A survey on MAC protocols for complex self-organizing cognitive radio networks.
Complex Adapt. Syst. Model., 2016

Online Signature Verification: A Survey on Authentication in Smartphones.
Proceedings of the Advances in Ubiquitous Networking 2 - Proceedings of the UNet'16, Casablanca, Morocco, May 30, 2016

Fingerprint authentication and security risks in smart devices.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Secure login protocols: An analysis on modern attacks and solutions.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

A novel model for preserving Location Privacy in Internet of Things.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

The framework for efficient passphrase-based multifactor authentication in cloud computing.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Performance evaluation of IoT network infrastructure.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

ScreenStealer: Addressing Screenshot attacks on Android devices.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Survey on security threats of smartphones in Internet of Things.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Car Number Plate Recognition (CNPR) system using multiple template matching.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

Use of Symmetric Multiprocessor Architecture to achieve high performance computing.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

An enhanced botnet detection technique for mobile devices using log analysis.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

2015
Energy efficiency in big data complex systems: a comprehensive survey of modern energy saving techniques.
Complex Adapt. Syst. Model., 2015

Self organization based energy management techniques in mobile complex networks: a review.
Complex Adapt. Syst. Model., 2015

Organization Based Intelligent Process Scheduling Algorithm (OIPSA).
Proceedings of the 21st International Conference on Automation and Computing, 2015

Energy efficiency in smartphones: A survey on modern tools and techniques.
Proceedings of the 21st International Conference on Automation and Computing, 2015

2014
Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2014

Enhanced micro-TCB approach for smartphone security.
Proceedings of the 20th International Conference on Automation and Computing, 2014

2013
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks.
Int. J. Autom. Comput., 2013

Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

Cognitive radio networks for Internet of Things: Applications, challenges and future.
Proceedings of the 2013 19th International Conference on Automation and Computing, 2013

2012
Efficient Deployment of Relay Stations in IEEE802.16m for Cost Effective Performance.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

2011
Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET.
Proceedings of the 2011 Frontiers of Information Technology, 2011


  Loading...