Haider Abbas

Orcid: 0000-0002-2437-4870

According to our database1, Haider Abbas authored at least 147 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure semantic search using deep learning in a blockchain-assisted multi-user setting.
J. Cloud Comput., December, 2024

Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2024

2023
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network.
IEEE Trans. Intell. Transp. Syst., September, 2023

DS-CNN: Dual-Stream Convolutional Neural Networks-Based Heart Sound Classification for Wearable Devices.
IEEE Trans. Consumer Electron., 2023

Security Assessment and Evaluation of VPNs: A Comprehensive Survey.
ACM Comput. Surv., 2023

CNN-HMM Model for Real Time DGA Categorization.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

ENCVIDC: an innovative approach for encoded video content classification.
Neural Comput. Appl., 2022

Forensic analysis of image deletion applications.
Multim. Tools Appl., 2022

An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling.
J. Netw. Comput. Appl., 2022

A deep learning assisted personalized deception system for countering web application attacks.
J. Inf. Secur. Appl., 2022

CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN.
IEEE Internet Things J., 2022

A framework to predict early news popularity using deep temporal propagation patterns.
Expert Syst. Appl., 2022

Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022

Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons.
ACM Comput. Surv., 2022

Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications.
IEEE Trans. Intell. Transp. Syst., 2021

An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing.
IEEE Syst. J., 2021

A survey on common criteria (CC) evaluating schemes for security assessment of IT products.
PeerJ Comput. Sci., 2021

Hand-based multibiometric systems: state-of-the-art and future challenges.
PeerJ Comput. Sci., 2021

Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication.
IEEE Netw., 2021

Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks.
J. Syst. Archit., 2021

Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework.
IEEE Internet Things J., 2021

ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes.
IEEE Internet Things J., 2021

Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings.
IEEE Internet Things J., 2021

Efficient attribute-based encryption with repeated attributes optimization.
Int. J. Inf. Sec., 2021

Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations.
Future Gener. Comput. Syst., 2021

Textual analysis of traitor-based dataset through semi supervised machine learning.
Future Gener. Comput. Syst., 2021

Applications of artificial intelligence in COVID-19 pandemic: A comprehensive review.
Expert Syst. Appl., 2021

AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks.
Comput. Commun., 2021

Context-oriented trust computation model for industrial Internet of Things.
Comput. Electr. Eng., 2021

A Malware Evasion Technique for Auditing Android Anti-Malware Solutions.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

Is Blockchain Overrated?
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Guest Editorial Introduction to the Special Section on Cognitive Software Defined Networks and Applications.
IEEE Trans. Netw. Sci. Eng., 2020

Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices.
IEEE J. Biomed. Health Informatics, 2020

Analytical study of hardware-rooted security standards and their implementation techniques in mobile.
Telecommun. Syst., 2020

DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.
IEEE Syst. J., 2020

Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC.
IEEE Syst. J., 2020

Cognitive computing for intelligent application and service.
Neural Comput. Appl., 2020

Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP.
Neural Comput. Appl., 2020

AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis.
Mob. Networks Appl., 2020

An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security.
IEEE Internet Things J., 2020

Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems.
Neurocomputing, 2020

Special issue: Cognitive Internet of Things assisted by cloud computing and big data.
Future Gener. Comput. Syst., 2020

On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages.
Future Gener. Comput. Syst., 2020

Multi-task reading for intelligent legal services.
Future Gener. Comput. Syst., 2020

SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks.
IEEE Commun. Surv. Tutorials, 2020

DST-HRS: A topic driven hybrid recommender system based on deep semantics.
Comput. Commun., 2020

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols.
IEEE Access, 2020

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems.
IEEE Access, 2020

Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users' Location Coordinates for Privacy Enhancement.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Handling Insider Threat Through Supervised Machine Learning Techniques.
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020

Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach.
Telecommun. Syst., 2019

CATSWoTS: Context Aware Trustworthy Social Web of Things System.
Sensors, 2019

Fog computing in internet of things: Practical applications and future directions.
Peer-to-Peer Netw. Appl., 2019

A hybrid-adaptive neuro-fuzzy inference system for multi-objective regression test suites optimization.
Neural Comput. Appl., 2019

Blockchain's adoption in IoT: The challenges, and a way forward.
J. Netw. Comput. Appl., 2019

Trust models of internet of smart things: A survey, open issues, and future directions.
J. Netw. Comput. Appl., 2019

MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems.
J. Medical Syst., 2019

Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint.
J. Medical Syst., 2019

Approximate computing using frequency upscaling.
IET Circuits Devices Syst., 2019

Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations.
Future Gener. Comput. Syst., 2019

AndroKit: A toolkit for forensics analysis of web browsers on android platform.
Future Gener. Comput. Syst., 2019

A complex event processing framework for an adaptive language learning system.
Future Gener. Comput. Syst., 2019

iBike: Intelligent public bicycle services assisted by data analytics.
Future Gener. Comput. Syst., 2019

Smart e-commerce integration with recommender systems.
Electron. Mark., 2019

Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices - A Review.
IEEE Commun. Surv. Tutorials, 2019

Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019

A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques.
IEEE Access, 2019

Flow Constraint Language for Coordination by Exogenous Connectors.
IEEE Access, 2019

Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy.
IEEE Access, 2019

A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Security Safety and Trust Management (SSTM' 19).
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT).
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
Mobile Intelligence Assisted by Data Analytics and Cognitive Computing.
Wirel. Commun. Mob. Comput., 2018

Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.
J. Supercomput., 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018

Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multim. Tools Appl., 2018

CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing.
Mob. Networks Appl., 2018

Information Diffusion Model Based on Social Big Data.
Mob. Networks Appl., 2018

Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis.
J. Netw. Comput. Appl., 2018

A unified framework for automated inspection of handheld safety critical devices in production assemblies.
Future Gener. Comput. Syst., 2018

Correlation power analysis of modes of encryption in AES and its countermeasures.
Future Gener. Comput. Syst., 2018

Edge Computing in IoT-Based Manufacturing.
IEEE Commun. Mag., 2018

Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review.
Ad Hoc Sens. Wirel. Networks, 2018

Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2018

Antenna and Propagation Considerations for Amateur UAV Monitoring.
IEEE Access, 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
A Manufacturing Big Data Solution for Active Preventive Maintenance.
IEEE Trans. Ind. Informatics, 2017

Adaptive Interference Cancellation of ECG Signals.
Sensors, 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Syst., 2017

An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes.
J. Inf. Sci. Eng., 2017

Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017

Fuzziness based semi-supervised learning approach for intrusion detection system.
Inf. Sci., 2017

Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Gener. Comput. Syst., 2017

Security and privacy issues in cloud computing.
Ann. des Télécommunications, 2017

Algebraic Side Channel Attack on Trivium and Grain Ciphers.
IEEE Access, 2017

Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Internet of things (IoT) design considerations for developers and manufacturers.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2017

2016
A framework for cloud forensics evidence collection and analysis using security information and event management.
Secur. Commun. Networks, 2016

Identifying an OpenID anti-phishing scheme for cyberspace.
Secur. Commun. Networks, 2016

Guest editorial: Secure cloud computing for mobile health services.
Peer-to-Peer Netw. Appl., 2016

Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.
J. Medical Syst., 2016

Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
J. Medical Syst., 2016

Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
J. Intell. Fuzzy Syst., 2016

Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems.
Ann. des Télécommunications, 2016

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges.
IEEE Access, 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Static Aging Analysis Using 3-Dimensional Delay Library.
Proceedings of the Workshop on Early Reliability Modeling for Aging and Variability in Silicon Systems, 2016

2015
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network.
Mob. Inf. Syst., 2015

Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
Int. J. Distributed Sens. Networks, 2015

A framework to address inconstant user requirements in cloud SLAs management.
Clust. Comput., 2015

Data Warehousing Based Computer Forensics Investigation Framework.
Proceedings of the 12th International Conference on Information Technology, 2015

Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure.
Proceedings of the 17th International Conference on E-health Networking, 2015

Survey on Mobile User's Data Privacy Threats and Defense Mechanisms.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: <i>A Systematic Literature Review</i>.
J. Medical Syst., 2014

Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.
J. Netw. Comput. Appl., 2013

A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications.
Int. J. Distributed Sens. Networks, 2013

A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

WLAN Location Privacy: A Client Server Based Architecture.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Anticipating Dormant Functionality in Malware: A Semantics Based Approach.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Secure SMS Based Automatic Device Pairing Approach for Mobile Phones.
Proceedings of the Intelligent Computing Theories and Technology, 2013

2012
Securing Internet Information Services (IIS) configuration files.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Addressing Dynamic Issues in Information Security Management.
Inf. Manag. Comput. Secur., 2011

User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2009
Adaptability infrastructure for bridging IT security evaluation and options theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009

2002
Fabric fault classification using neural trees.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics: Bridging the Digital Divide, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002


  Loading...