Follow
Raheel Hassan
Title
Cited by
Cited by
Year
An anomaly mitigation framework for iot using fog computing
MA Lawal, RA Shaikh, SR Hassan
Electronics 9 (10), 1565, 2020
592020
A DDoS attack mitigation framework for IoT networks using fog computing
MA Lawal, RA Shaikh, SR Hassan
Procedia Computer Science 182, 13-20, 2021
392021
Security analysis of network anomalies mitigation schemes in IoT networks
MA Lawal, RA Shaikh, SR Hassan
IEEE Access 8, 43355-43374, 2020
382020
An adaptive intrusion detection and prevention system for Internet of Things
ST Bakhsh, S Alghamdi, RA Alsemmeari, SR Hassan
International Journal of Distributed Sensor Networks 15 (11), 1550147719888109, 2019
292019
Protecting grids from cross-domain attacks using security alert sharing mechanisms
RH Syed, M Syrame, J Bourgeois
Future Generation Computer Systems 29 (2), 536-547, 2013
172013
A hybrid dual-mode trust management scheme for vehicular networks
IA Rai, RA Shaikh, SR Hassan
International Journal of Distributed Sensor Networks 16 (7), 1550147720939372, 2020
132020
A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability
SZ Nizamani, SR Hassan, RA Shaikh, EA Abozinadah, R Mehmood
IEEE Access 9, 51294-51312, 2021
102021
A text based authentication scheme for improving security of textual passwords
SZ Nizamani, TJ Khanzada, SR Hassan, MZ Jali
International Journal of Advanced Computer Science and Applications 8 (7), 2017
92017
Fast attack detection using correlation and summarizing of security alerts in grid computing networks
RH Syed, J Pazardzievska, J Bourgeois
The Journal of Supercomputing 62, 804-827, 2012
92012
Shaping the future of Ethereum: Exploring energy consumption in Proof-of-Work and Proof-of-Stake consensus
R Asif, SR Hassan
Frontiers in Blockchain 6, 1151724, 2023
72023
Evaluation of video streaming performance over peer-to-peer network
SA Memon, SR Hassan, NA Memon
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
72014
The advents of ubiquitous computing in the development of smart cities—A review on the internet of things (IoT)
J Ali, MH Zafar, C Hewage, SR Hassan, R Asif
Electronics 12 (4), 1032, 2023
62023
TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
SZ Nizamani, SR Hassan, RA Shaikh
Arabian Journal for Science and Engineering 45 (4), 2763-2778, 2020
62020
Managing Security of Grid Architecture with a Grid Security Operation Center.
J Bourgeois, SR Hassan
SECRYPT 9, 403-408, 2009
62009
Enhanced textual password scheme for better security and memorability
H Bhanbhro, SR Hassan, SZ Nizamani, ST Bakhsh, MO Alassafi
International Journal of Advanced Computer Science and Applications 9 (7), 2018
52018
Blood image analysis to detect malaria using filtering image edges and classificatio
M Memon, TJS Khanzada, S Memon, SR Hassan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (1), 194-201, 2019
42019
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator
S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon
First International Conference on Modern Communication & Computing …, 2014
42014
Integrating a blockchain-based governance framework for responsible AI
R Asif, SR Hassan, G Parr
Future Internet 15 (3), 97, 2023
32023
Mathematical modeling and validation of retransmission-based mutant MQTT for improving quality of service in developing smart cities
J Ali, MH Zafar, C Hewage, R Hassan, R Asif
Sensors 22 (24), 9751, 2022
32022
An evaluation model for recognition-based graphical password schemes.
SZ Nizamani, SR Hassan, RA Shaikh, ST Bakhsh
Journal of Information Assurance & Security 14 (3), 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20