Shahzad Saleem

Orcid: 0000-0002-0264-5887

According to our database1, Shahzad Saleem authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.
IEEE Access, 2024

2023
Correction to: Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., September, 2023

Mean flow and Convective instability analysis of the BEK and related rotating boundary layer flows subject to a uniform static magnetic field.
J. Comput. Sci., 2023

2022
A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy.
Sensors, 2022

2021
Enhanced adaptive data hiding method using LSB and pixel value differencing.
Multim. Tools Appl., 2021

DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?
CoRR, 2021

A Conceptual Model to Address the Communication and Coordination Challenges During Requirements Change Management in Global Software Development.
IEEE Access, 2021

2020
QCM2R: A QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks.
J. Netw. Comput. Appl., 2020

A novel dynamic confidence interval based secure channel prediction approach for stream-based multichannel wireless sensor networks.
Ad Hoc Networks, 2020

Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication.
IEEE Access, 2020

Augmented reality based criminal investigation system (ARCRIME).
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

2019
VPN Traffic Detection in SSL-Protected Channel.
Secur. Commun. Networks, 2019

A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories.
Future Gener. Comput. Syst., 2019

<i>In silico</i> structural and functional characterization and phylogenetic study of alkaline phosphatase in bacterium, <i>Rhizobium leguminosarum</i> (Frank 1879).
Comput. Biol. Chem., 2019

Web Server Integrity Protection Using Blockchain.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

Forensics Analysis of Wish-Shopping Made Fun Application on Android.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

Security Against Compromised Servers: Verifiable DB Queries.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

2018
Forensics study of IMO call and chat app.
Digit. Investig., 2018

Securing Insulin Pump System Using Deep Learning and Gesture Recognition.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

2017
Signatures of Viber Security Traffic.
J. Digit. Forensics Secur. Law, 2017

Protecting Digital Evidence Integrity and Preserving Chain of Custody.
J. Digit. Forensics Secur. Law, 2017

Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, S55-S64].
Digit. Investig., 2017

Weighted hybrid features for person re-identification.
Proceedings of the Seventh International Conference on Image Processing Theory, 2017

2016
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis.
Digit. Investig., 2016

2015
Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics.
PhD thesis, 2015

2014
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices.
J. Digit. Forensics Secur. Law, 2014

Testing Framework for Mobile Device Forensics Tools.
J. Digit. Forensics Secur. Law, 2014

Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

2012
A review on low-complexity structures and algorithms for the correction of mismatch errors in time-interleaved ADCs.
Proceedings of the 10th IEEE International NEWCAS Conference, 2012

Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

2011
Adaptive Blind Background Calibration of Polynomial-Represented Frequency Response Mismatches in a Two-Channel Time-Interleaved ADC.
IEEE Trans. Circuits Syst. I Regul. Pap., 2011

2010
Adaptive compensation of frequency response mismatches in high-resolution time-interleaved ADCs using a low-resolution ADC and a time-varying filter.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Protecting Digital Evidence Integrity by Using Smart Cards.
Proceedings of the Digital Forensics and Cyber Crime, 2010

2008
Adaptive blind compensation of gain and timing mismatches in M-channel time-interleaved ADCs.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008


  Loading...