Haider Abbas

According to our database1, Haider Abbas authored at least 63 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.
The Journal of Supercomputing, 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics and Informatics, 2018

Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multimedia Tools Appl., 2018

Information Diffusion Model Based on Social Big Data.
MONET, 2018

Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis.
J. Network and Computer Applications, 2018

A unified framework for automated inspection of handheld safety critical devices in production assemblies.
Future Generation Comp. Syst., 2018

Correlation power analysis of modes of encryption in AES and its countermeasures.
Future Generation Comp. Syst., 2018

Edge Computing in IoT-Based Manufacturing.
IEEE Communications Magazine, 2018

Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2018

Antenna and Propagation Considerations for Amateur UAV Monitoring.
IEEE Access, 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

A Manufacturing Big Data Solution for Active Preventive Maintenance.
IEEE Trans. Industrial Informatics, 2017

Adaptive Interference Cancellation of ECG Signals.
Sensors, 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Systems, 2017

An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes.
J. Inf. Sci. Eng., 2017

Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017

Fuzziness based semi-supervised learning approach for intrusion detection system.
Inf. Sci., 2017

Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Generation Comp. Syst., 2017

Security and privacy issues in cloud computing.
Annales des Télécommunications, 2017

Algebraic Side Channel Attack on Trivium and Grain Ciphers.
IEEE Access, 2017

Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Internet of things (IoT) design considerations for developers and manufacturers.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2017

A framework for cloud forensics evidence collection and analysis using security information and event management.
Security and Communication Networks, 2016

Identifying an OpenID anti-phishing scheme for cyberspace.
Security and Communication Networks, 2016

Guest editorial: Secure cloud computing for mobile health services.
Peer-to-Peer Networking and Applications, 2016

Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
J. Medical Systems, 2016

Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Systems, 2016

Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
Journal of Intelligent and Fuzzy Systems, 2016

Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks.
IJAHUC, 2016

Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Annales des Télécommunications, 2016

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges.
IEEE Access, 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Static Aging Analysis Using 3-Dimensional Delay Library.
Proceedings of the Workshop on Early Reliability Modeling for Aging and Variability in Silicon Systems, 2016

EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mobile Information Systems, 2015

Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
IJDSN, 2015

A framework to address inconstant user requirements in cloud SLAs management.
Cluster Computing, 2015

Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure.
Proceedings of the 17th International Conference on E-health Networking, 2015

Survey on Mobile User's Data Privacy Threats and Defense Mechanisms.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review.
J. Medical Systems, 2014

Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks.
IJDSN, 2014

A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.
Proceedings of the Ad-hoc Networks and Wireless, 2014

A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Network and Computer Applications, 2013

A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications.
IJDSN, 2013

A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

WLAN Location Privacy: A Client Server Based Architecture.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Anticipating Dormant Functionality in Malware: A Semantics Based Approach.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Secure SMS Based Automatic Device Pairing Approach for Mobile Phones.
Proceedings of the Intelligent Computing Theories and Technology, 2013

Securing Internet Information Services (IIS) configuration files.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Addressing Dynamic Issues in Information Security Management.
Inf. Manag. Comput. Security, 2011

User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Adaptability infrastructure for bridging IT security evaluation and options theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009