Tahir Ahmad
Orcid: 0000-0001-8105-6791
According to our database1,
Tahir Ahmad
authored at least 51 papers
between 1994 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Softw. Evol. Process., January, 2025
2024
Neonpool: Reimagining cryptocurrency transaction pools for lightweight clients and IoT devices.
CoRR, 2024
2023
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks.
Sensors, August, 2023
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks.
Comput., June, 2023
Sensors, January, 2023
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol.
Sensors, 2023
The effect of knowledge sharing and systems thinking on organizational sustainability: the mediating role of creativity.
J. Knowl. Manag., 2023
2022
Symmetry, 2022
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.
Sensors, 2022
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system.
Int. J. Inf. Sec., 2022
Clust. Comput., 2022
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Intelligenza Artificiale, 2021
Decomposing the Krohn-Rhodes Form of Electroencephalography (EEG) Signals Using Jordan-Chevalley Decomposition Technique.
Axioms, 2021
About a Process-Technology Fit for Process Improvements in an Ambidextrous Environment.
Proceedings of the Business Process Management Workshops, 2021
2020
A Review on Some Arithmetic Concepts of Z-Number and Its Application to Real-World Problems.
Int. J. Inf. Technol. Decis. Mak., 2020
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
2019
Revised convexity, normality and stability properties of the dynamical feedback fuzzy state space model (FFSSM) of insulin-glucose regulatory system in humans.
Soft Comput., 2019
J. Electronic Imaging, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Reviewing the historical link between Business Process Management and IT: making the case towards digital innovation.
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019
2018
Math. Model. Anal., 2018
Proceedings of the Soft Computing in Data Science - 4th International Conference, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
2017
A Reply to a Note on the Paper "A Simplified Novel Technique for Solving Fully Fuzzy Linear Programming Problems".
J. Optim. Theory Appl., 2017
Proceedings of the Soft Computing in Data Science - Third International Conference, 2017
2016
Edge Detection of Flat Electroencephalography Image via Classical and Fuzzy Approach.
Proceedings of the Soft Computing in Data Science - Second International Conference, 2016
Proceedings of the Soft Computing in Data Science - Second International Conference, 2016
Proceedings of the Soft Computing in Data Science - Second International Conference, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
2015
Cloud Computing Adoption Issues and Applications in Developing Countries: A Qualitative Approach.
Int. Arab. J. e Technol., 2015
Proceedings of the Traffic Monitoring and Analysis - 7th International Workshop, 2015
Contrast Comparison of Flat Electroencephalography Image: Classical, Fuzzy, and Intuitionistic Fuzzy Set.
Proceedings of the Soft Computing in Data Science - First International Conference, 2015
Proceedings of the Soft Computing in Data Science - First International Conference, 2015
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
2014
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs.
J. Netw. Comput. Appl., 2014
Ranking DMUs by Calculating the Interval Efficiency with a Common Set of Weights in DEA.
J. Appl. Math., 2014
2013
J. Optim. Theory Appl., 2013
2012
2008
Fuzzy Number in Determining the Optimal Solution of Multiple Input Multiple Output (MIMO) System.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008
2002
Determination of Parameters for Multivariable Control Systems using Fuzzy Algorithmic Approach.
Proceedings of the FSDK'02, 2002
1994
Proceedings of the Mobile Computing [Mobidata Workshop on Mobile and Wireless Information Systems, Rutgers University, NJ, USA, October 31, 1994