Ayesha Altaf

Orcid: 0000-0001-6446-4945

According to our database1, Ayesha Altaf authored at least 16 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network.
IEEE Access, 2024

2023
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.
Sensors, October, 2023

Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective.
Syst., August, 2023

Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction.
Sensors, 2023

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
Sensors, 2023

DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents.
Sensors, 2023

Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems.
IEEE Internet Things J., 2023

PRUS: Product Recommender System Based on User Specifications and Customers Reviews.
IEEE Access, 2023

2021
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks.
J. Syst. Archit., 2021

Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings.
IEEE Internet Things J., 2021

Context-oriented trust computation model for industrial Internet of Things.
Comput. Electr. Eng., 2021

2019
Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019

Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT).
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2009
Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005.
J. Digit. Content Technol. its Appl., 2009

2008
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography.
Proceedings of the Second International Conference on Emerging Security Information, 2008


  Loading...