Maqsood Mahmud

Orcid: 0000-0002-9038-4567

According to our database1, Maqsood Mahmud authored at least 19 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector.
Inf. Comput. Secur., 2023

2022
Toward Zero Trust Security IN 5G Open Architecture Network Slices.
Proceedings of the IEEE Military Communications Conference, 2022

2020
Kalman Filter Based Multiple Person Head Tracking.
CoRR, 2020

Generative Adversarial Networks: A Short Review.
Proceedings of the Image Processing: Algorithms and Systems XVIII, 2020

Head based tracking.
Proceedings of the Intelligent Robotics and Industrial Applications using Computer Vision 2020, 2020

Crowd Congestion Detection in Videos.
Proceedings of the Intelligent Robotics and Industrial Applications using Computer Vision 2020, 2020

2018
Reversible and Fragile Watermarking for Medical Images.
Comput. Math. Methods Medicine, 2018

Analysis of Cloud Computing Security in Perspective of Saudi Arabia.
Proceedings of the 20th IEEE International Conference on e-Health Networking, 2018

2016
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series.
Neurocomputing, 2016

Stock market forecasting by using a hybrid model of exponential fuzzy time series.
Int. J. Approx. Reason., 2016

A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting.
Appl. Soft Comput., 2016

2015
Detection of Criminally Convicted Email Users by Behavioral Dissimilarity.
Proceedings of the Advances in Nature and Biologically Inspired Computing, 2015

2014
A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

2012
Intrinsic authentication of multimedia objects using biometric data manipulation.
Int. Arab J. Inf. Technol., 2012

Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2010
Security Analysis of Firewall Rule Sets in Computer Networks.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation.
Proceedings of the Future Generation Information Technology, 2010

2009
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).
Proceedings of the Bio-Science and Bio-Technology, 2009

Bio-chaotic Stream Cipher-Based Iris Image Encryption.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...