Saqib Hakak
Orcid: 0000-0002-8718-0336
According to our database1,
Saqib Hakak
authored at least 47 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities.
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure.
Comput. Secur., 2024
BRAPTOR: An efficient method for instant asset-transfer and generic application in blockchain.
Comput. Electr. Eng., 2024
2023
NEAT: A Resilient Deep Representational Learning for Fault Detection Using Acoustic Signals in IIoT Environment.
IEEE Internet Things J., February, 2023
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping.
Comput. Sci. Inf. Syst., 2023
IEEE Access, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
2022
ACM Trans. Internet Techn., November, 2022
CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications.
IEEE J. Biomed. Health Informatics, 2022
Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles.
IEEE Trans. Green Commun. Netw., 2022
Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset.
Multim. Tools Appl., 2022
Int. Arab J. Inf. Technol., 2022
Digital Hadith authentication: Recent advances, open challenges, and future directions.
Trans. Emerg. Telecommun. Technol., 2022
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions.
Comput. Secur., 2022
Blockchain-based cyber physical systems: Comprehensive model for challenge assessment.
Comput. Electr. Eng., 2022
IEEE Access, 2022
CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems.
IEEE Access, 2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
2021
Senti-eSystem: A sentiment-based eSystem-using hybridized fuzzy and deep neural network for measuring customer satisfaction.
Softw. Pract. Exp., 2021
Blockchain-Based Attack Detection on Machine Learning Algorithms for IoT-Based e-Health Applications.
IEEE Internet Things Mag., 2021
Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges.
IEEE Internet Things J., 2021
Int. J. Ad Hoc Ubiquitous Comput., 2021
An ensemble machine learning approach through effective feature extraction to classify fake news.
Future Gener. Comput. Syst., 2021
Comput. Secur., 2021
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021
2020
Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges.
IEEE Netw., 2020
Multim. Tools Appl., 2020
Industrial Wastewater Management using Blockchain Technology: Architecture, Requirements, and Future Directions.
IEEE Internet Things Mag., 2020
Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements and Challenges.
CoRR, 2020
Blended Multi-Modal Deep ConvNet Features for Diabetic Retinopathy Severity Prediction.
CoRR, 2020
Comput. Commun., 2020
IEEE Access, 2020
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.
IEEE Access, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges.
Inf. Process. Manag., 2019
Cloud-assisted gamification for education and learning - Recent advances and challenges.
Comput. Electr. Eng., 2019
IEEE Access, 2019
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019
2018
Proceedings of International Joint Conference on Computational Intelligence, 2018
An Efficient Text Representation for Searching and Retrieving Classical Diacritical Arabic Text.
Proceedings of the Fourth International Conference On Arabic Computational Linguistics, 2018
2017
IEEE Access, 2017