default search action
Ahmad Karim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Attia Qammar, Ahmad Karim, Huansheng Ning, Jianguo Ding:
Securing federated learning with blockchain: a systematic literature review. Artif. Intell. Rev. 56(5): 3951-3985 (2023) - 2022
- [j19]Amjad Ali, Faiz Jillani, Rabbiah Zaheer, Ahmad Karim, Yasser Obaid Alharbi, Mohammad Salih Alsaffar, Khalid Alhamazani:
Practically Implementation of Information Loss: Sensitivity, Risk by Different Feature Selection Techniques. IEEE Access 10: 27643-27654 (2022) - [j18]Attia Qammar, Ahmad Karim, Yasser Obaid Alharbi, Mohammad Salih Alsaffar, Abdullah Alharbi:
A Learning Model to Detect Android C&C Applications Using Hybrid Analysis. Comput. Syst. Sci. Eng. 43(3): 915-930 (2022) - 2020
- [j17]Sana Moin, Ahmad Karim, Kalsoom Safdar, Iqra Iqbal, Zanab Safdar, V. Vijayakumar, Khawaja Tehseen Ahmed, Shahbaz Akhtar Abid:
GREEN SDN - An enhanced paradigm of SDN: Review, taxonomy, and future directions. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j16]Ahmad Karim, Aisha Siddiqa, Zanab Safdar, Maham Razzaq, Syeda Anum Gillani, Huma Tahir, Sana Kiran, Ejaz Ahmed, Muhammad Imran:
Big data management in participatory sensing: Issues, trends and future directions. Future Gener. Comput. Syst. 107: 942-955 (2020) - [j15]Ahmad Karim, Victor Chang, Ahmad Firdaus:
Android Botnets: A Proof-of-Concept Using Hybrid Analysis Approach. J. Organ. End User Comput. 32(3): 50-67 (2020) - [j14]Rukhsana Kousar, Majed Alhaisoni, Shahbaz Akhtar Abid, Nadir Shah, Aamir Qamar, Ahmad Karim:
A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network. Wirel. Commun. Mob. Comput. 2020: 2740654:1-2740654:32 (2020)
2010 – 2019
- 2019
- [j13]Attia Qamar, Ahmad Karim, Victor Chang:
Mobile malware attacks: Review, taxonomy & future directions. Future Gener. Comput. Syst. 97: 887-909 (2019) - [j12]Sana Moin, Ahmad Karim, Zanab Safdar, Kalsoom Safdar, Ejaz Ahmed, Muhammad Imran:
Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Gener. Comput. Syst. 100: 325-343 (2019) - 2018
- [j11]Ahmad Firdaus, Nor Badrul Anuar, Ahmad Karim, Mohd Faizal Ab Razak:
Discovering optimal features using static analysis and a genetic search based method for Android malware detection. Frontiers Inf. Technol. Electron. Eng. 19(6): 712-736 (2018) - [j10]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Ahsan Qureshi, Ihsan Ali, Rafidah Md Noor:
Coverage Differentiation Based Adaptive Tx-Power for Congestion and Awareness Control in VANETs. Mob. Networks Appl. 23(5): 1194-1205 (2018) - [j9]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah Md Noor:
Adaptive Beaconing Approaches for Vehicular Ad Hoc Networks: A Survey. IEEE Syst. J. 12(2): 1263-1277 (2018) - [j8]Aisha Siddiqa, Ahmad Karim, Victor Chang:
Modeling SmallClient indexing framework for big data analytics. J. Supercomput. 74(10): 5241-5262 (2018) - 2017
- [j7]Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, Ibrar Yaqoob:
Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges. IEEE Access 5: 5247-5261 (2017) - [j6]Aisha Siddiqa, Ahmad Karim, Victor Chang:
SmallClient for big data: an indexing framework towards fast data retrieval. Clust. Comput. 20(2): 1193-1208 (2017) - [j5]Aisha Siddiqa, Ahmad Karim, Tanzila Saba, Victor Chang:
On the analysis of big data indexing execution strategies. J. Intell. Fuzzy Syst. 32(5): 3259-3271 (2017) - [j4]Aisha Siddiqa, Ahmad Karim, Abdullah Gani:
Big data storage technologies: a survey. Frontiers Inf. Technol. Electron. Eng. 18(8): 1040-1070 (2017) - 2016
- [j3]Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Aisha Siddiqa, Kim-Kwang Raymond Choo:
On the Analysis and Detection of Mobile Botnet Applications. J. Univers. Comput. Sci. 22(4): 567-588 (2016) - [i1]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah Md Noor:
Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey. CoRR abs/1605.07329 (2016) - 2015
- [j2]Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. KSII Trans. Internet Inf. Syst. 9(4): 1471-1492 (2015) - [c2]Ahmad Karim, Rosli Salleh, Syed Adeel Ali Shah:
DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis. UIC/ATC/ScalCom 2015: 1327-1332 - 2014
- [j1]Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar:
Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15(11): 943-983 (2014) - [c1]Ahmad Karim, Syed Adeel Ali Shah, Rosli Salleh:
Mobile Botnet Attacks: A Thematic Taxonomy. WorldCIST (2) 2014: 153-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint