Zahid Anwar

Orcid: 0000-0002-4608-4305

According to our database1, Zahid Anwar authored at least 63 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles.
IEEE Internet Things J., May, 2023

Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review.
Comput. Sci. Rev., May, 2023

A systematic threat analysis and defense strategies for the metaverse and extended reality systems.
Comput. Secur., May, 2023

Quantum Computing for Healthcare: A Review.
Future Internet, March, 2023

Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities.
IEEE Internet Things J., 2023

Tackling Food Insecurity Using Remote Sensing and Machine Learning-Based Crop Yield Prediction.
IEEE Access, 2023

A Unified Deep Learning Diagnostic Architecture for Big Data Healthcare Analytics.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023

2022
An analysis of zero-trust architecture and its cost-effectiveness for organizational security.
Comput. Secur., 2022

Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation.
Comput. J., 2022

Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
TAMEC: Trusted Augmented Mobile Execution on Cloud.
Sci. Program., 2021

CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks.
Int. J. Intell. Syst., 2021

2020
A survey of link flooding attacks in software defined network ecosystems.
J. Netw. Comput. Appl., 2020

SCERM - A novel framework for automated management of cyber threat response activities.
Future Gener. Comput. Syst., 2020

Customer-oriented ranking of cyber threat intelligence service providers.
Electron. Commer. Res. Appl., 2020

2019
A novel JSON based regular expression language for pattern matching in the internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories.
Future Gener. Comput. Syst., 2019

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.
Future Gener. Comput. Syst., 2019

Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks.
IEEE Access, 2019

Big Data in Motion: A Vehicle-Assisted Urban Computing Framework for Smart Cities.
IEEE Access, 2019

2018
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds.
IEEE Trans. Cloud Comput., 2018

A thin client friendly trusted execution framework for infrastructure-as-a-service clouds.
Future Gener. Comput. Syst., 2018

A generic framework for application streaming service.
Comput. Electr. Eng., 2018

STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

2017
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++.
IEEE Trans. Serv. Comput., 2017

Data-driven analytics for cyber-threat intelligence and information sharing.
Comput. Secur., 2017

IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Comput. Secur., 2017

IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things.
IEEE Access, 2017

Data mining techniques and applications - A decade review.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

2016
A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm.
Multim. Tools Appl., 2016

Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges.
J. Netw. Comput. Appl., 2016

A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms.
Comput. Secur., 2016

Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
RRW - A Robust and Reversible Watermarking Technique for Relational Data.
IEEE Trans. Knowl. Data Eng., 2015

Storage schema and ontology-independent SPARQL to HiveQL translation.
J. Supercomput., 2015

A survey on reversible watermarking techniques for relational databases.
Secur. Commun. Networks, 2015

Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs.
Secur. Commun. Networks, 2015

2014
Semantic security against web application attacks.
Inf. Sci., 2014

Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies.
IEEE Commun. Lett., 2014

Ontology for attack detection: An intelligent approach to web application security.
Comput. Secur., 2014

secCloudSim: Secure Cloud Simulator.
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

2013
SOAD: Securing Oncology EMR by Anonymizing DICOM Images.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

GSAN: Green Cloud-Simulation for Storage Area Networks.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

2011
Digital Forensics for Eucalyptus.
Proceedings of the 2011 Frontiers of Information Technology, 2011

SWAM: Stuxnet Worm Analysis in Metasploit.
Proceedings of the 2011 Frontiers of Information Technology, 2011

DOFUR: DDoS Forensics Using MapReduce.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Trusted Framework for Health Information Exchange.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Design and Deployment of a Trusted Eucalyptus Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2009
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures.
Int. J. Crit. Infrastructure Prot., 2009

An Integer Programming Model and Heuristic Algorithm for Automatic Scheduling in Synchrotron Facilities.
Proceedings of the IEEE International Conference on Systems, 2009

2008
Automatic Security Assessment of Control Systems for Critical Cyber -Infrastructures
PhD thesis, 2008

Automated Assessment Of Compliance With Security Best Practices.
Proceedings of the Critical Infrastructure Protection II, 2008

Automatic security assessment of critical cyber-infrastructures.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

2006
Multiple design patterns for voice over IP (VoIP) security.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut
CoRR, 2005

Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

A First Step Towards Call Survivability in Cellular Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...