Sufian Hameed
Orcid: 0000-0003-4683-1988
According to our database1,
Sufian Hameed
authored at least 32 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
2023
Smart contract-based security architecture for collaborative services in municipal smart cities.
J. Syst. Archit., February, 2023
Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks.
Eng. Appl. Artif. Intell., 2023
Comput. Commun., 2023
Enhancing Cryptocurrency Price Forecasting Accuracy: A Feature Selection and Weighting Approach With Bi-Directional LSTM and Trend-Preserving Model Bias Correction.
IEEE Access, 2023
Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts.
IEEE Access, 2023
2022
IEEE Internet Things J., 2022
Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects.
IEEE Access, 2022
2020
Live Anomaly Detection based on Machine Learning Techniques SAD-F: Spark Based Anomaly Detection Framework.
CoRR, 2020
An Efficient Counter-Based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT).
IEEE Access, 2020
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework.
IEEE Access, 2020
2019
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review.
J. Comput. Networks Commun., 2019
Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics Be the Game Changers?
IEEE Access, 2019
The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects.
IEEE Access, 2019
2018
Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review.
CoRR, 2018
2017
CoRR, 2017
CoRR, 2017
A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks.
CoRR, 2017
Proceedings of the 2017 International Conference on Networked Systems, 2017
2016
Protecting NFC data exchange against eavesdropping with encryption record type definition.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
2013
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013
2012
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation.
PhD thesis, 2012
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012
2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011