Search Results - "Ali Babar, M."
-
1
Architectural Resilience in Cloud, Fog and Edge Systems: A Survey
Published in IEEE access (2020)“…An increasing number of large-scale distributed systems are being built by incorporating Cloud, Fog, and Edge computing. There is an important need of…”
Get full text
Journal Article -
2
Challenges With Developing Secure Mobile Health Applications: Systematic Review
Published in JMIR mHealth and uHealth (21-06-2021)“…Background Mobile health (mHealth) apps have gained significant popularity over the last few years due to their tremendous benefits, such as lowering health…”
Get full text
Journal Article -
3
Design and Generation of a Set of Declarative APIs for Security Orchestration
Published in IEEE transactions on services computing (01-01-2024)“…The emerging threat landscape causes continuous change in the Incident Response Process (IRP) and security tools of security orchestration platforms (SOAR)…”
Get full text
Journal Article -
4
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Published in 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-11-2021)“…It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there…”
Get full text
Conference Proceeding -
5
MIMO antenna array with the capability of dual polarization reconfiguration for 5G mm-wave communication
Published in Scientific reports (31-10-2022)“…This communication presents a polarization reconfigurable antenna array (PRAA) with Multi-input Multi-output (MIMO) formation for 5th generation (5G)…”
Get full text
Journal Article -
6
The stimulatory effects of plant growth promoting rhizobacteria and plant growth regulators on wheat physiology grown in sandy soil
Published in Archives of microbiology (01-08-2019)“…The present study was aimed to investigate the effects of plant growth promoting rhizobacteria (PGPR) and plant growth regulators (PGRs) on the physiology and…”
Get full text
Journal Article -
7
Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study
Published in IEEE access (01-01-2020)“…An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad…”
Get full text
Journal Article -
8
Systematic Literature Review on Cyber Situational Awareness Visualizations
Published in IEEE access (2022)“…The dynamics of cyber threats are increasingly complex, making it more challenging than ever for organizations to obtain in-depth insights into their cyber…”
Get full text
Journal Article -
9
Game Theoretical Modelling of Network/Cybersecurity
Published in IEEE access (2019)“…Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to…”
Get full text
Journal Article -
10
An Empirical Study of the Effectiveness of Software Architecture Evaluation Meetings
Published in IEEE access (2019)“…One of the most important issues in scenario-based software architecture evaluation is the development of scenarios for characterizing a desired set of quality…”
Get full text
Journal Article -
11
truncated FatB resulting from a single nucleotide insertion is responsible for reducing saturated fatty acids in maize seed oil
Published in Theoretical and applied genetics (01-07-2014)“…KEY MESSAGE : We identified a G-nucleotide insertion in a maize FatB responsible for reducing saturated fatty acids through QTL mapping and map-based cloning…”
Get full text
Journal Article -
12
Design and evaluation of adaptive system for big data cyber security analytics
Published in Expert systems with applications (30-11-2022)“…Big Data Cyber Security Analytics (BDCA) systems leverage big data technologies to collect, store, and analyze a large volume of security event data for…”
Get full text
Journal Article -
13
On the privacy of mental health apps: An empirical investigation and its implications for app development
Published in Empirical software engineering : an international journal (2023)“…An increasing number of mental health services are now offered through mobile health (mHealth) systems, such as in mobile applications (apps). Although there…”
Get full text
Journal Article -
14
Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs
Published in Journal of network and computer applications (01-01-2021)“…Recent years have witnessed the emergence of the Internet of Things (IoT) systems that incorporate blockchain (BC) elements in their architecture. Due to…”
Get full text
Journal Article -
15
Wide-band dielectric resonator antenna using K-shaped fractal
Published in Microwave and optical technology letters (01-06-2016)“…ABSTRACT A K‐shaped fractal dielectric resonator antenna with CPW feed is proposed. Self‐repetition property of fractal configuration has been utilized to…”
Get full text
Journal Article -
16
Data Quality for Software Vulnerability Datasets
Published in 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (01-05-2023)“…The use of learning-based techniques to achieve automated software vulnerability detection has been of longstanding interest within the software security…”
Get full text
Conference Proceeding -
17
The root growth of wheat plants, the water conservation and fertility status of sandy soils influenced by plant growth promoting rhizobacteria
Published in Symbiosis (Philadelphia, Pa.) (01-06-2017)“…Plant growth promoting rhizobacteria were isolated and characterized from sandy soils in Pakistan. The role of the rhizobacteria, in association with plant…”
Get full text
Journal Article -
18
Interaction between PGPR and PGR for water conservation and plant growth attributes under drought condition
Published in Biológia (01-11-2018)“…Drought is one of the key restraints to agricultural productivity worldwide and is expected to increase further. Drought stress accompanied by reduction in…”
Get full text
Journal Article -
19
An empirical study of developers’ discussions about security challenges of different programming languages
Published in Empirical software engineering : an international journal (01-01-2022)“…Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting…”
Get full text
Journal Article -
20
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Published in Computers & security (01-05-2024)“…The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits while simultaneously escalating cybersecurity risks. With the…”
Get full text
Journal Article