Search Results - "Jamal, Tauseef"

Refine Results
  1. 1

    IoT malware detection architecture using a novel channel boosted and squeezed CNN by Asam, Muhammad, Khan, Saddam Hussain, Akbar, Altaf, Bibi, Sameena, Jamal, Tauseef, Khan, Asifullah, Ghafoor, Usman, Bhutta, Muhammad Raheel

    Published in Scientific reports (15-09-2022)
    “…Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of…”
    Get full text
    Journal Article
  2. 2

    Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier by Zahoora, Umme, Khan, Asifullah, Rajarajan, Muttukrishnan, Khan, Saddam Hussain, Asam, Muhammad, Jamal, Tauseef

    Published in Scientific reports (19-09-2022)
    “…Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is…”
    Get full text
    Journal Article
  3. 3

    Malicious node analysis in MANETS by Jamal, Tauseef, Butt, Shariq Aziz

    “…The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the intermediate nodes play an role of routers to pass data packets to…”
    Get full text
    Journal Article
  4. 4

    A Novel Cooperative Relaying-Based Vertical Handover Technique for Unmanned Aerial Vehicles by Haider, Zeeshan, Muztazhar Gilani, Syed Mushhad, Jamal, Tauseef, Javaid, Shumaila, Fahim, Hamza, Cheikhrouhou, Omar, Hamdi, Monia

    Published in Security and communication networks (21-09-2022)
    “…The real-time monitoring and autonomous decision making through unmanned aerial vehicles (UAVs) are the potential applications of future networks. Vertical…”
    Get full text
    Journal Article
  5. 5

    Detection of Exceptional Malware Variants Using Deep Boosted Feature Spaces and Machine Learning by Asam, Muhammad, Hussain, Shaik Javeed, Mohatram, Mohammed, Khan, Saddam Hussain, Jamal, Tauseef, Zafar, Amad, Khan, Asifullah, Ali, Muhammad Umair, Zahoora, Umme

    Published in Applied sciences (01-11-2021)
    “…Malware is a key component of cyber-crime, and its analysis is the first line of defence against cyber-attack. This study proposes two new malware…”
    Get full text
    Journal Article
  6. 6

    Predictive Variables for Agile Development Merging Cloud Computing Services by Butt, Shariq Aziz, Tariq, Muhammad Imran, Jamal, Tauseef, Ali, Arshad, Diaz Martinez, Jorge Luis, De-La-Hoz-Franco, Emiro

    Published in IEEE access (2019)
    “…Cloud Technology is a most challenging modern area in the field of modern technologies in which assets (e.g., CPU and capacity) can be rented and discharged by…”
    Get full text
    Journal Article
  7. 7

    Proton, UV, and X-ray Induced Luminescence in Tb3+ Doped LuGd2Ga2Al3O12 Phosphors by Fawad, U., Kim, H. J., Gul, Ibrahim, Khan, Matiullah, Tahir, Sajjad, Jamal, Tauseef, Muhammad, Wazir

    Published in Crystals (Basel) (22-09-2020)
    “…The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 phosphor. XRD and SEM techniques are used for the phase and…”
    Get full text
    Journal Article
  8. 8

    Optimization of moderator assembly for neutron flux measurement: experimental and theoretical approaches by Waheed, Abdul, Ali, Nawab, Baloch, Muzahir A., Qureshi, Aziz A., Munem, Eid A., Rajput, Muhammad Usman, Jamal, Tauseef, Muhammad, Wazir

    Published in Nuclear science and techniques (01-05-2017)
    “…A moderator of paraffin wax assembly has been demonstrated where its thickness can be optimized to thermalize fast neutrons. The assembly is used for measuring…”
    Get full text
    Journal Article
  9. 9

    Remote mobile health monitoring frameworks and mobile applications: Taxonomy, open challenges, motivation, and recommendations by Aziz Butt, Shariq, Naseer, Mudasser, Ali, Arshad, Khalid, Abbas, Jamal, Tauseef, Naz, Sumera

    “…Advancements in mobile technology have propelled the rapid progress of remote health monitoring, particularly in the domain of mobile health (mHealth). This…”
    Get full text
    Journal Article
  10. 10

    A multivariant secure framework for smart mobile health application by Butt, Shariq Aziz, Jamal, Tauseef, Azad, Muhammad Ajmal, Ali, Arshad, Safa, Nader Sohrabi

    “…Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost as well as easy…”
    Get full text
    Journal Article
  11. 11

    Design and performance of wireless cooperative relaying by Jamal, Tauseef

    Published 01-01-2013
    “…In recent years, a new paradigm for communication called cooperative communications has been proposed for which initial information theoretic studies have…”
    Get full text
    Dissertation
  12. 12

    Design and performance of wireless cooperative relaying by Jamal, Tauseef

    Published 2013
    “…In recent years, a new paradigm for communication called cooperative communications has been proposed for which initial information theoretic studies have…”
    Get full text
    Dissertation
  13. 13

    IoT Smart Health Security Threats by Butt, Shariq Aziz, Diaz-Martinez, Jorge Luis, Jamal, Tauseef, Ali, Arshad, De-La-Hoz-Franco, Emiro, Shoaib, Muhammad

    “…The Internet of things (IoT) is an active area in the current research community due to the improvement in mobile computing and wireless networks. Currently,…”
    Get full text
    Conference Proceeding
  14. 14

    IoT Malware Detection Architecture using a Novel Channel Boosted and Squeezed CNN by Asam, Muhammad, Khan, Saddam Hussain, Jamal, Tauseef, Khan, Asifullah

    Published 08-02-2022
    “…Interaction between devices, people, and the Internet has given birth to a new digital communication model, the Internet of Things (IoT). The seamless network…”
    Get full text
    Journal Article
  15. 15

    Small Object Detection using Deep Learning by Ajaz, Aleena, Salar, Ayesha, Jamal, Tauseef, Khan, Asif Ullah

    Published 10-01-2022
    “…Now a days, UAVs such as drones are greatly used for various purposes like that of capturing and target detection from ariel imagery etc. Easy access of these…”
    Get full text
    Journal Article
  16. 16

    DoS Attacks at Cooperative MAC by Haider, Zeeshan, Ullah, Kiramat, Jamal, Tauseef

    Published 30-11-2018
    “…Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to…”
    Get full text
    Journal Article
  17. 17

    Detection and Prevention Against RTS Attacks in Wireless LAN by Jamal, Tauseef, Umair, Muhammad Mussadiq, Alam, M

    Published 13-11-2018
    “…Widely deployed wireless network devices use a shared medium to communicate among mobile nodes. WLAN uses virtual carrier sensing mechanism to solve issues…”
    Get full text
    Journal Article
  18. 18

    Novel Relay Selection Protocol for Cooperative Networks by Asam, Muhammad, Haider, Zeeshan, Jamal, Tauseef, Ghuman, Kashif, Ajaz, Aleena

    Published 15-11-2019
    “…Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems…”
    Get full text
    Journal Article
  19. 19

    Malware Classification Using Deep Boosted Learning by Asam, Muhammad, Khan, Saddam Hussain, Jamal, Tauseef, Zahoora, Umme, Khan, Asifullah

    Published 08-07-2021
    “…Malicious activities in cyberspace have gone further than simply hacking machines and spreading viruses. It has become a challenge for a nations survival and…”
    Get full text
    Journal Article
  20. 20

    Denial of Service Attack in Cooperative Networks by Jamal, Tauseef, Haider, Zeeshan, Butt, Shariq Aziz, Chohan, Assim

    Published 15-10-2018
    “…In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity…”
    Get full text
    Journal Article