Sfoglia per Autore
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
2023-01-01 Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
2023-01-01 Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
2023-01-01 Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks
2023-01-01 Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah
An Insight into the Machine-Learning-Based Fileless Malware Detection
2023-01-01 Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
2023-01-01 Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah
Backdoor Malware Detection in Industrial IoT Using Machine Learning
2024-01-01 Khan, Maryam Mahsal; Buriro, Attaullah; Ahmad, Tahir; Ullah, Subhan
Miscellaneous applications of deep learning based multi-sensor Earth observation
2025-01-01 Saha, Sudipan; Ahmad, Tahir; Yadav, Ashish
A basic introduction to deep learning
2025-01-01 Saha, Sudipan; Ahmad, Tahir
Position-Agnostic Smartphone Placement Detection for Improved Reliability in Human Activity Recognition
2025-01-01 Shehzad, Saba; Buriro, Attaullah; Ullah, Subhan; Ahmad, Tahir
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks | 1-gen-2023 | Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah | |
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization | 1-gen-2023 | Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan | |
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol | 1-gen-2023 | Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah | |
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks | 1-gen-2023 | Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah | |
An Insight into the Machine-Learning-Based Fileless Malware Detection | 1-gen-2023 | Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan | |
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware | 1-gen-2023 | Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah | |
Backdoor Malware Detection in Industrial IoT Using Machine Learning | 1-gen-2024 | Khan, Maryam Mahsal; Buriro, Attaullah; Ahmad, Tahir; Ullah, Subhan | |
Miscellaneous applications of deep learning based multi-sensor Earth observation | 1-gen-2025 | Saha, Sudipan; Ahmad, Tahir; Yadav, Ashish | |
A basic introduction to deep learning | 1-gen-2025 | Saha, Sudipan; Ahmad, Tahir | |
Position-Agnostic Smartphone Placement Detection for Improved Reliability in Human Activity Recognition | 1-gen-2025 | Shehzad, Saba; Buriro, Attaullah; Ullah, Subhan; Ahmad, Tahir |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile