Intercept the cloud network from brute force and DDoS attacks via intrusion detection and prevention system M Nadeem, A Arshad, S Riaz, SS Band, A Mosavi IEEE Access 9, 152300-152309, 2021 | 37 | 2021 |
Two layer symmetric cryptography algorithm for protecting data from attacks M Nadeem, A Arshad, S Riaz, S Wajiha Zahra, S S Band, A Mosavi | 7 | 2023 |
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms. M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, M Al Moteri, ... Computers, Materials & Continua 74 (2), 2023 | 6 | 2023 |
Development of Security Rules and Mechanisms to Protect Data from Assaults SW Zahra, A Arshad, M Nadeem, S Riaz, AK Dutta, Z Alzaid, R Alabdan, ... Applied Sciences 12 (24), 12578, 2022 | 6 | 2022 |
Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, S Almotairi Applied Sciences 12 (15), 7701, 2022 | 6 | 2022 |
Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, A Alruban, B Almutairi, ... Applied Sciences 12 (19), 9736, 2022 | 4 | 2022 |
A secure architecture to protect the network from replay attacks during client-to-client data transmission M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, S Almotairi Applied Sciences 12 (16), 8143, 2022 | 4 | 2022 |
Systematic Literature Review on Web Services in E-commerce and Business Communication. E-Commerce for Future & Trends. 2023; 10 (3): 7–25p SW Zahra, M Nadeem, MN Abbasi, A Arshad, S Riaz, W Ahmed Web Services in E-commerce and Business Communication Zahra et al. STM …, 2023 | 3 | 2023 |
Preventing cloud network from spamming attacks using cloudflare and KNN M Nadeem, A Arshad, S Riaz, SW Zahra, M Rashid, S S Band, A Mosavi | 3 | 2022 |
Baggage Detection and Recognition Using Local Tri-Directional Pattern JAK Ayesha, W Ahmad, M Nadeem, SW Zahra, A Arshad, S Riaz, ... International Journal of Mobile Computing Technology 1 (1), 8-17p, 2023 | 2 | 2023 |
Enhancing the cloud data security using keeper key and kernel tag SW Zahra, M Nadeem, A Ramzan, W Ahmad, A Arshad, S Riaz, ... J Adv Shell Program 10 (1), 35-46, 2023 | 2 | 2023 |
A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks M Saddheer, W Ahmad, M Nadeem, SW Zahra, A Arshad, S Riaz | 1 | 2023 |
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault SW Zahra, M Nadeem, A Arshad, S Riaz, MA Bakr, AK Dutta, Z Alzaid, ... Computers, Materials & Continua 78 (1), 2024 | | 2024 |
Comparative Machine Learning Approaches to Analyzing the Illnesses of the Chronic Renal and Heart Diseases M Arslan, W Ahmad, AU Yasin, JA Khan, M Nadeem, SW Zahra Research Reports on Computer Science, 128-157, 2023 | | 2023 |
Witness System of Vehicle Accidents Based on the Internet of Things JA Khan, W Ahmad, A Hussain, SW Zahra, M Nadeem Research Reports on Computer Science, 111-127, 2023 | | 2023 |
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault SA Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad,, Saman Riaz, Muhammad ... TechScience, 2023 | | 2023 |
A Visible Light-based Indoor Navigation and Localization Solution for Visually Criticized Users WA Arslaan Ali, Alec Mabhiza Chirawu, Syeda Wajiha Zahra, Muhammad Nadeem ... Journal of Telecommunication, Switching Systems and Networks 10 (2), 22-34, 2023 | | 2023 |
Vehicles Communication with Fuel Station using Internet of Vehicles W Ahmad, A Hussain, JA Khan, M Nadeem, SW Zahra The Sciencetech 4 (3), 2023 | | 2023 |
A Comprehensive Analysis of Context-aware Recommender Systems Implemented Across a Range of Domains WA Muhammad Nadeem, Syeda Wajiha Zahra, Muhammad Nouman Abbasi, Ali Arshad3 ... international journal of Software Computing and Testing 9 (2), 9-19, 2023 | | 2023 |
A Securing infrastructure against signature-based assaults using Karnaugh Detection Systems SR Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad Recent Trends in Parallel Computing 10 (1), 1-12, 2023 | | 2023 |