Mamoona Humayun

Orcid: 0000-0001-6339-2257

According to our database1, Mamoona Humayun authored at least 37 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A fog-edge-enabled intrusion detection system for smart grids.
J. Cloud Comput., December, 2024

Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency.
J. Cloud Comput., December, 2024

A deep transfer learning model for green environment security analysis in smart city.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey.
IEEE Access, 2024

Automated Brain Tumor Segmentation and Classification in MRI Using YOLO-Based Deep Learning.
IEEE Access, 2024

A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0.
IEEE Access, 2024

2023
Toward a readiness model for secure software coding.
Softw. Pract. Exp., April, 2023

Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis.
Comput. Syst. Sci. Eng., 2023

A Novel Machine Learning-Based Hand Gesture Recognition Using HCI on IoT Assisted Cloud Platform.
Comput. Syst. Sci. Eng., 2023

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures.
IEEE Access, 2023

2022
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.
Sensors, 2022

Agent-Based Medical Health Monitoring System.
Sensors, 2022

Towards aspect based requirements mining for trace retrieval of component-based software management process in globally distributed environment.
Inf. Technol. Manag., 2022

Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT-Enabled WSN.
IEEE Internet Things J., 2022

Resource discovery and scalability-aware routing in cloud federation using distributed meta-brokering paradigm.
Int. J. Web Grid Serv., 2022

IoT Wireless Intrusion Detection and Network Traffic Analysis.
Comput. Syst. Sci. Eng., 2022

Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks.
Comput. Syst. Sci. Eng., 2022

Prediction Model for Coronavirus Pandemic Using Deep Learning.
Comput. Syst. Sci. Eng., 2022

A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework.
Open Comput. Sci., 2022

Energy Optimization for Smart Cities Using IoT.
Appl. Artif. Intell., 2022

Initial Stage COVID-19 Detection System Based on Patients' Symptoms and Chest X-Ray Images.
Appl. Artif. Intell., 2022

2021
Performance Enhancement in Wireless Body Area Networks with Secure Communication.
Wirel. Pers. Commun., 2021

Cyber Security and Privacy Issues in Industrial Internet of Things.
Comput. Syst. Sci. Eng., 2021

A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks.
IEEE Access, 2021

Secure Healthcare Data Aggregation and Transmission in IoT - A Survey.
IEEE Access, 2021

FoG-Oriented Secure and Lightweight Data Aggregation in IoMT.
IEEE Access, 2021

2020
Emerging Smart Logistics and Transportation Using IoT and Blockchain.
IEEE Internet Things Mag., 2020

Towards an effective approach for architectural knowledge management considering global software development.
Int. J. Grid Util. Comput., 2020

Secure Smart and Remote Multipurpose Attendance Monitoring System.
EAI Endorsed Trans. Energy Web, 2020

Energy-Aware Task Allocation for Multi-Cloud Networks.
IEEE Access, 2020

Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things.
IEEE Access, 2020

Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based.
IEEE Access, 2020

2016
A Review of Class Based Test Case Generation Techniques.
J. Softw., 2016

2015
Web application security vulnerabilities detection approaches: A systematic mapping study.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

2013
An Empirical Study of the Complex Relationship between KMR and Trust in GSD.
J. Softw., 2013

An empirical study on investigating the role of KMS in promoting trust within GSD teams.
Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, 2013

2012
An Empirical Study on Improving Trust among GSD Teams Using KMR.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012


  Loading...