Sufian Hameed

Orcid: 0000-0003-4683-1988

According to our database1, Sufian Hameed authored at least 32 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PenChain: A Blockchain-Based Platform for Penalty-Aware Service Provisioning.
IEEE Access, 2024

2023
Smart contract-based security architecture for collaborative services in municipal smart cities.
J. Syst. Archit., February, 2023

Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks.
Eng. Appl. Artif. Intell., 2023

Towards SDN-based smart contract solution for IoT access control.
Comput. Commun., 2023

Enhancing Cryptocurrency Price Forecasting Accuracy: A Feature Selection and Weighting Approach With Bi-Directional LSTM and Trend-Preserving Model Bias Correction.
IEEE Access, 2023

Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts.
IEEE Access, 2023

2022
A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN.
IEEE Internet Things J., 2022

Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects.
IEEE Access, 2022

2020
Live Anomaly Detection based on Machine Learning Techniques SAD-F: Spark Based Anomaly Detection Framework.
CoRR, 2020

An Efficient Counter-Based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT).
IEEE Access, 2020

An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework.
IEEE Access, 2020

2019
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review.
J. Comput. Networks Commun., 2019

Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics Be the Game Changers?
IEEE Access, 2019

The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects.
IEEE Access, 2019

2018
SDN Based Collaborative Scheme for Mitigation of DDoS Attacks.
Future Internet, 2018

HADEC: Hadoop-based live DDoS detection framework.
EURASIP J. Inf. Secur., 2018

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review.
CoRR, 2018

2017
Efficacy of Object-Based Passwords for User Authentication.
CoRR, 2017

Software Defined Security Service Provisioning Framework for Internet of Things.
CoRR, 2017

The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies.
CoRR, 2017

A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks.
CoRR, 2017

Leveraging SDN for collaborative DDoS mitigation.
Proceedings of the 2017 International Conference on Networked Systems, 2017

2016
Protecting NFC data exchange against eavesdropping with encryption record type definition.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Efficacy of Live DDoS Detection with Hadoop.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Clicksafe: Providing Security against Clickjacking Attacks.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

2013
Identity based email sender authentication for spam mitigation.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

2012
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation.
PhD thesis, 2012

iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation.
Proceedings of the SECRYPT 2012, 2012

Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012

2011
LENS: Leveraging social networking and trust to prevent spam transmission.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011


  Loading...