Asad Raza

Orcid: 0000-0003-4104-9727

According to our database1, Asad Raza authored at least 13 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
From trust to truth: Advancements in mitigating the Blockchain Oracle problem.
J. Netw. Comput. Appl., 2023

IHGWO-Based Optimization of IoT Wireless Sensor Networks.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

2022
Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system.
Neural Comput. Appl., 2022

Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

2018
A unified framework for automated inspection of handheld safety critical devices in production assemblies.
Future Gener. Comput. Syst., 2018

Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2018

2014
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Netw. Comput. Appl., 2013

Secure SMS Based Automatic Device Pairing Approach for Mobile Phones.
Proceedings of the Intelligent Computing Theories and Technology, 2013

2012
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Securing Internet Information Services (IIS) configuration files.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2009
An Automated User Transparent Approach to log Web URLs for Forensic Analysis.
Proceedings of the IMF 2009, 2009


  Loading...