Ayesha Altaf

Orcid: 0000-0001-6446-4945

According to our database1, Ayesha Altaf authored at least 25 papers between 2008 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Feature Fusion-Based Ensemble Approach for Robust Malware Detection with Reduced False Positives.
J. Netw. Syst. Manag., March, 2026

2025
Context-aware chatbot for personal healthcare assistance using LLMs and LangChain.
J. Intell. Inf. Syst., December, 2025

An Enhanced Wheat Stripe Rust Segmentation Approach Using Vision Transformer Model.
Int. J. Comput. Intell. Syst., December, 2025

Misclassification in voice over internet protocol honeypots: distinguishing genuine calls from malicious traffic.
Int. J. Inf. Sec., October, 2025

CATcAFSMs: Context-based adaptive trust calculation for attack detection in fog computing based smart medical systems.
Expert Syst. J. Knowl. Eng., February, 2025

Enhancing movie recommendations using quantum support vector machine (QSVM).
J. Supercomput., January, 2025

A Secure and Privacy-Preserving Approach to Healthcare Data Collaboration.
Symmetry, 2025

Analyzing post-quantum cryptographic algorithms efficiency for transport security layer.
Comput. Electr. Eng., 2025

2024
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain.
J. Netw. Syst. Manag., October, 2024

Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network.
IEEE Access, 2024

2023
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.
Sensors, October, 2023

Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective.
Syst., August, 2023

Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction.
Sensors, 2023

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
Sensors, 2023

DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents.
Sensors, 2023

Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems.
IEEE Internet Things J., 2023

PRUS: Product Recommender System Based on User Specifications and Customers Reviews.
IEEE Access, 2023

2021
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks.
J. Syst. Archit., 2021

Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings.
IEEE Internet Things J., 2021

Context-oriented trust computation model for industrial Internet of Things.
Comput. Electr. Eng., 2021

2019
Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019

Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT).
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2009
Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005.
J. Digit. Content Technol. its Appl., 2009

2008
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...