Follow
Asad Raza
Title
Cited by
Cited by
Year
A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata
A Waqar, A Raza, H Abbas, MK Khan
Journal of Network and Computer Applications 36 (1), 235-248, 2013
812013
Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system
HI Kure, S Islam, M Ghazanfar, A Raza, M Pasha
Neural Computing and Applications 34 (1), 493-514, 2022
322022
An automated user transparent approach to log web URLs for forensic analysis
MK Ahmed, M Hussain, A Raza
2009 Fifth International Conference on IT Security Incident Management and …, 2009
182009
User privacy issues in eucalyptus: A private cloud computing environment
A Waqar, A Raza, H Abbas
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
172011
Security characterization for evaluation of software architectures using ATAM
A Raza, H Abbas, L Yngstrom, A Hemani
2009 International Conference on Information and Communication Technologies …, 2009
132009
A survey on network layer attacks and AODV defense in mobile ad hoc networks
A Saeed, A Raza, H Abbas
2014 IEEE Eighth International Conference on Software Security and …, 2014
112014
From trust to truth: Advancements in mitigating the Blockchain Oracle problem
A Hassan, I Makhdoom, W Iqbal, A Ahmad, A Raza
Journal of Network and Computer Applications 217, 103672, 2023
42023
Securing Internet Information Services (IIS) configuration files
S Khalid, H Abbas, M Pasha, A Raza
2012 International Conference for Internet Technology and Secured …, 2012
42012
A unified framework for automated inspection of handheld safety critical devices in production assemblies
MA Rehmat, M Shahbaz, A Raza, H Abbas
Future Generation Computer Systems 88, 342-356, 2018
32018
Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks.
GA Al-Mashaqbeh, JN Al-Karaki, M Al-Rousan, A Raza, H Abbas, ...
Adhoc & Sensor Wireless Networks 41, 2018
32018
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
I Ahmad, H Abbas, A Raza, KKR Choo, A Sajid, M Pasha, FA Khan
Australian Journal of Forensic Sciences 50 (2), 183-208, 2018
22018
Analyzing packet forwarding Schemes for selfish behavior in MANETs
A Raza, JN Al-Karaki, H Abbas
Information Technology: New Generations: 13th International Conference on …, 2016
22016
Secure SMS based automatic device pairing approach for mobile phones
S Aftab, A Khalid, A Raza, H Abbas
Intelligent Computing Theories and Technology: 9th International Conference …, 2013
12013
A boundary node detection based solution for minimizing the effects of nodes distribution over key exchange in group based WSN
R Latif, A Raza
2012 15th International Conference on Network-Based Information Systems, 194-199, 2012
12012
Security issues in Wireless Sensor Network Broadcast Authentication
A Raza, AA Romman, MF Qureshi
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019
2019
Security Evaluation of ESAM Architecture using ATAM
A Raza, L Yngström, H Abbas, A Hemani
2008
The system can't perform the operation now. Try again later.
Articles 1–16