Follow
Shahabuddin Muhammad
Title
Cited by
Cited by
Year
Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks
T Mumtaz, S Muhammad, MI Aslam, N Mohammad
IEEE Access 8, 86495-86509, 2020
572020
Discovering man-in-the-middle attacks in authentication protocols
RK Guha, Z Furqan, S Muhammad
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
502007
Formal Analysis of Human-Assisted Smart City Emergency Services
N Mohammad, S Muhammad, B Abul, M Khan
IEEE Access 7, 60376 - 60388, 2019
372019
Understanding the intruder through attacks on cryptographic protocols
S Muhammad, Z Furqan, RK Guha
Proceedings of the 44th annual Southeast regional conference, 667-672, 2006
272006
Formal verification of 802.11 i using strand space formalism
Z Furqan, S Muhammad, RK Guha
International Conference on Networking, International Conference on Systems …, 2006
142006
Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis
E Shaikh, N Mohammad, S Muhammad
International Conference on Communications, Signal Processing and their …, 2021
132021
Wireless sensor network security: a secure sink node architecture
S Muhammad, Z Furqan, R Guha
PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005
122005
Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking
S Muhammad, N Mohammad, B Abul, MA Khan
Journal of Intelligent & Robotic Systems 94 (3), 687-709, 2019
112019
Modeling and analyzing MAC frame aggregation techniques in 802.11 n using bi-dimensional Markovian model
N Mohammad, S Muhammad
Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012
112012
A logic-based verification framework for authentication protocols
S Muhammad, Z Furqan, RK Guha
International Journal of Internet Technology and Secured Transactions 1 (1/2 …, 2007
112007
Modeling and Analysis of MDP-based Security Risk Assessment System for Smart Grids
A Bashar, S Muhammad, N Mohammad, M Khan
2020 Fourth International Conference on Inventive Systems and Control (ICISC …, 2020
92020
Modeling and Analysis of MDP-based Security Risk Assessment System for Smart Grids
A Bashar, S Muhammad, N Mohammad, M Khan
Proc. of 4th IEEE ICISC Conference (IEEE ICISC 2020), 08-10 Jan., 2020, 2020
92020
'Modeling and Evaluation of Pre-copy Live VM Migration using Probabilistic Model Checking
B Abul, M Nazeeruddin, M Shahabuddin
12th International Conference on Signal Processing and Communication Systems …, 2018
92018
A Multi-agent Approach Toward the Security Analysis of the 802.11 i Handshake Protocol
R Guha, Z Furqan, S Muhammad
2007 2nd International Symposium on Wireless Pervasive Computing, 2007
92007
Inter-slice resource management for 5G radio access network using Markov decision process
T Mumtaz, S Muhammad, A Muhammad, I Ahmed
Telecommunication Systems, 2022
82022
Designing authentication protocols: Trends and issues
S Muhammad, Z Furqan, RK Guha
International Conference on Networking, International Conference on Systems …, 2006
82006
Priority based channel assignment with pair-wise listen and sleep scheduling for wireless sensor networks
Z Furqan, S Muhammad, R Guha
8th International Multitopic Conference, 2004. Proceedings of INMIC 2004 …, 2004
82004
Logic-based formal analysis of cryptographic protocols
S Muhammad, Z Furqan, RK Guha
2006 14th IEEE International Conference on Networks 2, 1-6, 2006
62006
Modeling operator performance in human-in-the-loop autonomous systems
S Muhammad
IEEE Access 9, 102715 - 102731, 2021
52021
Analysis of in-vehicle security system of smart vehicles
N Mohammad, S Muhammad, E Shaikh
Future Network Systems and Security: 5th International Conference, FNSS 2019 …, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20