Kashif Kifayat

According to our database1, Kashif Kifayat authored at least 45 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Image forgery detection by transforming local descriptors into deep-derived features.
Appl. Soft Comput., November, 2023

Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks.
Comput. Commun., September, 2023

Cortex-inspired ensemble based network intrusion detection system.
Neural Comput. Appl., July, 2023

Katz centrality based approach to perform human action recognition by using OMKZ.
Signal Image Video Process., June, 2023

2022
Human activity recognition based on an amalgamation of CEV & SGM features.
J. Intell. Fuzzy Syst., 2022

A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions.
IEEE Access, 2022

2021
A comprehensive survey of AI-enabled phishing attacks detection techniques.
Telecommun. Syst., 2021

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning.
Trans. Emerg. Telecommun. Technol., 2021

2020
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment.
J. Parallel Distributed Comput., 2020

Key feature identification for recognition of activities performed by a smart-home resident.
J. Ambient Intell. Humaniz. Comput., 2020

Efficient Non-Linear Covert Channel Detection in TCP Data Streams.
IEEE Access, 2020

2019
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
Sensors, 2019

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks.
KSII Trans. Internet Inf. Syst., 2019

ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet.
IET Networks, 2019

Robust spatial fuzzy GMM based MRI segmentation and carotid artery plaque detection in ultrasound images.
Comput. Methods Programs Biomed., 2019

Security Safety and Trust Management (SSTM' 19).
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2018
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel.
J. Inf. Secur. Appl., 2018

Revocable, Decentralized Multi-Authority Access Control System.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

2017
Preventing and detecting cache side-channel attacks in cloud computing.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Enforcing Access Control Models in System Applications by Using Aspect-Oriented Programming: A Literature Review.
Proceedings of the 10th International Conference on Developments in eSystems Engineering, 2017

2016
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids.
J. Sens. Actuator Networks, 2016

Risk assessment and attack graph generation for collaborative infrastructures: a survey.
Int. J. Crit. Comput. Based Syst., 2016

Replay Attack Impact on Advanced Metering Infrastructure (AMI).
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A System for Intrusion Prediction in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

2015
Hosting critical infrastructure services in the cloud environment considerations.
Int. J. Crit. Infrastructures, 2015

Detecting Intrusions in Federated Cloud Environments Using Security as a Service.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A New Prime and Probe Cache Side-Channel Attack for Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
An access control model for cloud computing.
J. Inf. Secur. Appl., 2014

A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

2013
Lightweight Sybil Attack Detection in MANETs.
IEEE Syst. J., 2013

Component-based security system (COMSEC) with QoS for wireless sensor networks.
Secur. Commun. Networks, 2013

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013

Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Considering an elastic scaling model for cloud Security.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Misbehaviour monitoring on system-of-systems components.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2011
Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

2010
Security in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Future security challenges in cloud computing.
Int. J. Multim. Intell. Secur., 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Body Area Networks for Movement Analysis in Physiotherapy Treatments.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
A framework for physical health improvement using Wireless Sensor Networks and gaming.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

2008
Group-based secure communication for wireless sensor networks.
PhD thesis, 2008

2007
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...