Firdous Kausar

Orcid: 0000-0001-8922-549X

According to our database1, Firdous Kausar authored at least 35 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Energy Demand Forecasting for Electric Vehicles Using Blockchain-Based Federated Learning.
IEEE Access, 2024

2023
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach.
J. Comput. Virol. Hacking Tech., November, 2023

Skills Extraction from Entities in Arabic CVs.
Proceedings of the 5th IEEE International Conference on Cognitive Machine Intelligence, 2023

2022
N-BGP: An efficient BGP routing protocol adaptation for named data networking.
Int. J. Commun. Syst., 2022

Automated Machine Learning based Elderly Fall Detection Classification.
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022

2021
DHCP attacking tools: an analysis.
J. Comput. Virol. Hacking Tech., 2021

RSSI Based Implementation of Indoor Positioning Visible Light Communication System in NS-3.
Proceedings of the ICC 2021, 2021

2019
Traffic Analysis Attack for Identifying Users' Online Activities.
IT Prof., 2019

2018
A secure ECC-based RFID mutual authentication protocol for internet of things.
J. Supercomput., 2018

Security Attacks and Countermeasures on Cloud Assisted IoT Applications.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

2017
Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2015
A granular approach for user-centric network analysis to identify digital evidence.
Peer-to-Peer Netw. Appl., 2015

2014
Correlating messages from multiple IM networks to identify digital forensic artifacts.
Electron. Commer. Res., 2014

2013
Advances in communication networks for pervasive and ubiquitous applications.
J. Supercomput., 2013

A cluster-based key agreement scheme using keyed hashing for Body Area Networks.
Multim. Tools Appl., 2013

2010
Analysis of Internet Download Manager for collection of digital forensic artefacts.
Digit. Investig., 2010

Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Attacks on Bluetooth Security Architecture and Its Countermeasures.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Res., 2009

A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment.
Proceedings of the Advances in Information Security and Assurance, 2009

Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Authenticated Encryption in WSN Using eSTREAM Ciphers.
Proceedings of the Advances in Information Security and Assurance, 2009

Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol.
Proceedings of the NBiS 2009, 2009

Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks.
Proceedings of the NBiS 2009, 2009

Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts.
Proceedings of the IMF 2009, 2009

Analysis of Free Download Manager for Forensic Artefacts.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Scalable and efficient key management for heterogeneous sensor networks.
J. Supercomput., 2008

Key Management and Secure Routing in Heterogeneous Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

An efficient key distribution scheme for heterogeneous sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...