Follow
Raheel Hassan
Title
Cited by
Cited by
Year
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
592020
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
382021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
382020
An adaptive intrusion detection and prevention system for Internet of Things
ST Bakhsh, S Alghamdi, RA Alsemmeari, SR Hassan
International Journal of Distributed Sensor Networks 15 (11), 1550147719888109, 2019
292019
Protecting grids from cross-domain attacks using security alert sharing mechanisms
RH Syed, M Syrame, J Bourgeois
Future Generation Computer Systems 29 (2), 536-547, 2013
172013
A hybrid dual-mode trust management scheme for vehicular networks
IA Rai, RA Shaikh, SR Hassan
International Journal of Distributed Sensor Networks 16 (7), 1550147720939372, 2020
132020
A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
SZ Nizamani, SR Hassan, RA Shaikh, EA Abozinadah, R Mehmood
IEEE Access 9, 51294-51312, 2021
92021
A text based authentication scheme for improving security of textual passwords
SZ Nizamani, TJ Khanzada, SR Hassan, MZ Jali
International Journal of Advanced Computer Science and Applications 8 (7), 2017
92017
Fast attack detection using correlation and summarizing of security alerts in grid computing networks
RH Syed, J Pazardzievska, J Bourgeois
The Journal of Supercomputing 62, 804-827, 2012
92012
Evaluation of video streaming performance over peer-to-peer network
SA Memon, SR Hassan, NA Memon
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
72014
TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
SZ Nizamani, SR Hassan, RA Shaikh
Arabian Journal for Science and Engineering 45 (4), 2763-2778, 2020
62020
Managing Security of Grid Architecture with a Grid Security Operation Center.
J Bourgeois, SR Hassan
SECRYPT 9, 403-408, 2009
62009
Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus
R Asif, SR Hassan
Frontiers in Blockchain 6, 1151724, 2023
52023
The advents of ubiquitous computing in the development of smart cities—A review on the internet of things (IoT)
J Ali, MH Zafar, C Hewage, SR Hassan, R Asif
Electronics 12 (4), 1032, 2023
52023
Enhanced textual password scheme for better security and memorability
H Bhanbhro, SR Hassan, SZ Nizamani, ST Bakhsh, MO Alassafi
International Journal of Advanced Computer Science and Applications 9 (7), 2018
52018
Blood image analysis to detect malaria using filtering image edges and classificatio
M Memon, TJS Khanzada, S Memon, SR Hassan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (1), 194-201, 2019
42019
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator
S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon
First International Conference on Modern Communication & Computing …, 2014
42014
Mathematical modeling and validation of retransmission-based mutant MQTT for improving quality of service in developing smart cities
J Ali, MH Zafar, C Hewage, R Hassan, R Asif
Sensors 22 (24), 9751, 2022
32022
An evaluation model for recognition-based graphical password schemes.
SZ Nizamani, SR Hassan, RA Shaikh, ST Bakhsh
Journal of Information Assurance & Security 14 (3), 2019
32019
Significance of line length for tablet PC users
WA Sahito, HI Chunpir, Z Hussain, SR Hassan, F Schulte
Design, User Experience, and Usability: Users and Interactions: 4th …, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20