Ten deadly cyber security threats amid COVID-19 pandemic NA Khan, SN Brohi, N Zaman Authorea Preprints, 2023 | 190 | 2023 |
Smart traffic monitoring system using unmanned aerial vehicles (UAVs) NA Khan, NZ Jhanjhi, SN Brohi, RSA Usmani, A Nayyar Computer Communications 157, 434-443, 2020 | 164 | 2020 |
Emerging use of UAV’s: secure communication protocol issues and challenges NA Khan, NZ Jhanjhi, SN Brohi, A Nayyar Drones in smart-cities, 37-55, 2020 | 95 | 2020 |
UAV’s applications, architecture, security issues and attack scenarios: A survey NA Khan, SN Brohi, NZ Jhanjhi Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS …, 2020 | 82 | 2020 |
5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle MH Alkinani, AA Almazroi, NZ Jhanjhi, NA Khan Sensors 21 (20), 6905, 2021 | 43 | 2021 |
A secure communication protocol for unmanned aerial vehicles NA Khan, NZ Jhanjhi, SN Brohi, AA Almazroi, AA Almazroi CMC-COMPUTERS MATERIALS & CONTINUA 70 (1), 601-618, 2022 | 35 | 2022 |
Rank and wormhole attack detection model for RPL-based internet of things using machine learning F Zahra, NZ Jhanjhi, SN Brohi, NA Khan, M Masud, MA AlZain Sensors 22 (18), 6765, 2022 | 21 | 2022 |
Metaverse: Virtual Meditation SR Sindiramutty, NZ Jhanjhi, SK Ray, H Jazri, NA Khan, L Gaur Metaverse Applications for Intelligent Healthcare, 93-158, 2024 | 13 | 2024 |
Ddos attack detection approaches in on software defined network S Muzafar, NZ Jhanjhi, NA Khan, F Ashfaq 2022 14th International conference on mathematics, actuarial science …, 2022 | 13 | 2022 |
Metaverse: Virtual Gyms and Sports SR Sindiramutty, NZ Jhanjhi, SK Ray, H Jazri, NA Khan, L Gaur, A Gharib, ... Metaverse Applications for Intelligent Healthcare, 24-92, 2024 | 12 | 2024 |
Enhancing sentiment analysis via random majority under-sampling with reduced time complexity for classifying tweet reviews SN Almuayqil, M Humayun, NZ Jhanjhi, MF Almufareh, NA Khan Electronics 11 (21), 3624, 2022 | 10 | 2022 |
E-Government Privacy and Security Challenges in the Context of Internet of Things RMA Ujjan, NA Khan, L Gaur Cybersecurity Measures for E-Government Frameworks, 22-42, 2022 | 9 | 2022 |
Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication NA Khan, NZ Jhanjhi, SN Brohi, ZA Almusaylim Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS …, 2021 | 9 | 2021 |
Protocol-specific and sensor network-inherited attack detection in IoT using machine learning F Zahra, NZ Jhanjhi, NA Khan, SN Brohi, M Masud, S Aljahdali Applied Sciences 12 (22), 11598, 2022 | 8 | 2022 |
Using Dual Attention BiLSTM to Predict Vehicle Lane Changing Maneuvers on Highway Dataset F Ashfaq, RM Ghoniem, NZ Jhanjhi, NA Khan, AD Algarni Systems 11 (4), 196, 2023 | 7 | 2023 |
Explainable AI in Healthcare Application SR Sindiramutty, WJ Tee, S Balakrishnan, S Kaur, R Thangaveloo, ... Advances in Explainable AI Applications for Smart Cities, 123-176, 2024 | 6 | 2024 |
Explainable AI for Cybersecurity SR Sindiramutty, CE Tan, SP Lau, R Thangaveloo, AH Gharib, ... Advances in Explainable AI Applications for Smart Cities, 31-97, 2024 | 6 | 2024 |
Chapter Three-Emerging use of UAV’s: secure communication protocol issues and challenges, Editor (s): Fadi Al-Turjman, Drones in Smart-Cities NA Khan, NZ Jhanjhi, SN Brohi, A Nayyar Elsevier, 2020 | 5 | 2020 |
Applications of Blockchain Technology in Supply Chain Management SR Sindiramutty, NZ Jhanjhi, CE Tan, NA Khan, AH Gharib, KJ Yun Cybersecurity Measures for Logistics Industry Framework, 248-304, 2024 | 3 | 2024 |
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities SR Sindiramutty, NZ Jhanjhi, CE Tan, NA Khan, B Shah, L Gaur Cybersecurity Measures for Logistics Industry Framework, 156-223, 2024 | 3 | 2024 |