Zahid Anwar
Orcid: 0000-0002-4608-4305
According to our database1,
Zahid Anwar
authored at least 64 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic.
Veh. Commun., 2024
2023
A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles.
IEEE Internet Things J., May, 2023
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review.
Comput. Sci. Rev., May, 2023
A systematic threat analysis and defense strategies for the metaverse and extended reality systems.
Comput. Secur., May, 2023
Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities.
IEEE Internet Things J., 2023
Tackling Food Insecurity Using Remote Sensing and Machine Learning-Based Crop Yield Prediction.
IEEE Access, 2023
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023
2022
An analysis of zero-trust architecture and its cost-effectiveness for organizational security.
Comput. Secur., 2022
Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation.
Comput. J., 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks.
Int. J. Intell. Syst., 2021
2020
J. Netw. Comput. Appl., 2020
SCERM - A novel framework for automated management of cyber threat response activities.
Future Gener. Comput. Syst., 2020
Electron. Commer. Res. Appl., 2020
2019
A novel JSON based regular expression language for pattern matching in the internet of things.
J. Ambient Intell. Humaniz. Comput., 2019
A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories.
Future Gener. Comput. Syst., 2019
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.
Future Gener. Comput. Syst., 2019
Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks.
IEEE Access, 2019
IEEE Access, 2019
2018
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds.
IEEE Trans. Cloud Comput., 2018
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds.
Future Gener. Comput. Syst., 2018
STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018
2017
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++.
IEEE Trans. Serv. Comput., 2017
Comput. Secur., 2017
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Comput. Secur., 2017
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things.
IEEE Access, 2017
Proceedings of the 23rd International Conference on Automation and Computing, 2017
2016
A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm.
Multim. Tools Appl., 2016
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges.
J. Netw. Comput. Appl., 2016
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms.
Comput. Secur., 2016
Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics.
Proceedings of the International Conference on Frontiers of Information Technology, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
J. Supercomput., 2015
Secur. Commun. Networks, 2015
Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs.
Secur. Commun. Networks, 2015
2014
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies.
IEEE Commun. Lett., 2014
Comput. Secur., 2014
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014
2013
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013
2011
Proceedings of the 2011 Frontiers of Information Technology, 2011
Proceedings of the 2011 Frontiers of Information Technology, 2011
Proceedings of the 2011 Frontiers of Information Technology, 2011
Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement.
Proceedings of the 2011 Frontiers of Information Technology, 2011
Proceedings of the 2011 Frontiers of Information Technology, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2009
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures.
Int. J. Crit. Infrastructure Prot., 2009
An Integer Programming Model and Heuristic Algorithm for Automatic Scheduling in Synchrotron Facilities.
Proceedings of the IEEE International Conference on Systems, 2009
2008
PhD thesis, 2008
Proceedings of the Critical Infrastructure Protection II, 2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut
CoRR, 2005
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005