Haider Abbas
According to our database1, Haider Abbas
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis.
J. Network and Computer Applications, 2018
Correlation power analysis of modes of encryption in AES and its countermeasures.
Future Generation Comp. Syst., 2018
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018
2017
A Manufacturing Big Data Solution for Active Preventive Maintenance.
IEEE Trans. Industrial Informatics, 2017
Adaptive Interference Cancellation of ECG Signals.
Sensors, 2017
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Systems, 2017
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes.
J. Inf. Sci. Eng., 2017
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017
Fuzziness based semi-supervised learning approach for intrusion detection system.
Inf. Sci., 2017
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Generation Comp. Syst., 2017
Security and privacy issues in cloud computing.
Annales des Télécommunications, 2017
Algebraic Side Channel Attack on Trivium and Grain Ciphers.
IEEE Access, 2017
Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Internet of things (IoT) design considerations for developers and manufacturers.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2017
2016
A framework for cloud forensics evidence collection and analysis using security information and event management.
Security and Communication Networks, 2016
Identifying an OpenID anti-phishing scheme for cyberspace.
Security and Communication Networks, 2016
Guest editorial: Secure cloud computing for mobile health services.
Peer-to-Peer Networking and Applications, 2016
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
J. Medical Systems, 2016
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Systems, 2016
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
Journal of Intelligent and Fuzzy Systems, 2016
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks.
IJAHUC, 2016
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Annales des Télécommunications, 2016
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges.
IEEE Access, 2016
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
Static Aging Analysis Using 3-Dimensional Delay Library.
Proceedings of the Workshop on Early Reliability Modeling for Aging and Variability in Silicon Systems, 2016
2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mobile Information Systems, 2015
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
IJDSN, 2015
A framework to address inconstant user requirements in cloud SLAs management.
Cluster Computing, 2015
Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure.
Proceedings of the 17th International Conference on E-health Networking, 2015
Survey on Mobile User's Data Privacy Threats and Defense Mechanisms.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015
2014
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review.
J. Medical Systems, 2014
Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks.
IJDSN, 2014
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.
Proceedings of the Ad-hoc Networks and Wireless, 2014
2013
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Network and Computer Applications, 2013
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications.
IJDSN, 2013
A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013
WLAN Location Privacy: A Client Server Based Architecture.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Anticipating Dormant Functionality in Malware: A Semantics Based Approach.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Secure SMS Based Automatic Device Pairing Approach for Mobile Phones.
Proceedings of the Intelligent Computing Theories and Technology, 2013
2012
Securing Internet Information Services (IIS) configuration files.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Addressing Dynamic Issues in Information Security Management.
Inf. Manag. Comput. Security, 2011
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011
2009
Adaptability infrastructure for bridging IT security evaluation and options theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009