default search action
N. Z. Jhanjhi
Person information
- affiliation: King Faisal University, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j103]Arwa M. Eldhai, Mosab Hamdan, Ahmed Abdelaziz, Ibrahim Abaker Targio Hashem, Sharief F. Babiker, Muhammad N. Marsono, Muzaffar Hamzah, Noor Zaman Jhanjhi:
Improved Feature Selection and Stream Traffic Classification Based on Machine Learning in Software-Defined Networks. IEEE Access 12: 34141-34159 (2024) - [j102]Khulud Salem S. Alshudukhi, Farzeen Ashfaq, N. Z. Jhanjhi, Mamoona Humayun:
Blockchain-Enabled Federated Learning for Longitudinal Emergency Care. IEEE Access 12: 137284-137294 (2024) - [j101]Danish Javed, N. Z. Jhanjhi, Navid Ali Khan, Sayan Kumar Ray, Alanoud Al Mazroa, Farzeen Ashfaq, Shampa Rani Das:
Towards the future of bot detection: A comprehensive taxonomical review and challenges on Twitter/X. Comput. Networks 254: 110808 (2024) - [j100]Waqas Ahmad, Ata Ullah, Sheharyar, N. Z. Jhanjhi, Rania M. Ghoniem, Sarfraz Nawaz Brohi:
Bargaining based Design Mechanism for delay sensitive tasks of mobile crowdsensing in IoT. ICT Express 10(1): 111-117 (2024) - [j99]Loveleen Gaur, Mohan Bhandari, Bhadwal Singh Shikhar, NZ Jhanjhi, Mohammad Shorfuzzaman, Mehedi Masud:
Explanation-Driven HCI Model to Examine the Mini-Mental State for Alzheimer's Disease. ACM Trans. Multim. Comput. Commun. Appl. 20(2): 41:1-41:16 (2024) - [i5]Sayan Kumar Ray, NZ Jhanjhi, Akbar Hossain:
A Reliable Target Evolved Node B Selection Scheme in LTE-Advanced Handover. CoRR abs/2405.13827 (2024) - [i4]Sayan Kumar Ray, Geri Harris, Akbar Hossain, NZ Jhanjhi:
Pervasive Technology-Enabled Care and Support for People with Dementia: The State of Art and Research Issues. CoRR abs/2406.16138 (2024) - 2023
- [j98]Navneet Kaur, Sahil Verma, Kavita, N. Z. Jhanjhi, Saurabh Singh, Rania M. Ghoniem, Sayan Kumar Ray:
Enhanced QoS-Aware Routing Protocol for Delay Sensitive Data in Wireless Body Area Networks. IEEE Access 11: 106000-106012 (2023) - [j97]Tarana Singh, Arun Solanki, Sanjay Kumar Sharma, N. Z. Jhanjhi, Rania M. Ghoniem:
Grey Wolf Optimization-Based CNN-LSTM Network for the Prediction of Energy Consumption in Smart Home Environment. IEEE Access 11: 114917-114935 (2023) - [j96]Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, Ibrahim Abaker Targio Hashem, Raja Sher Afgun Usmani, Faizan Qamar:
A comprehensive review on deep learning algorithms: Security and privacy issues. Comput. Secur. 131: 103297 (2023) - [j95]Prasant Ku. Dash, Lopamudra Hota, Madhumita Panda, N. Z. Jhanjhi, Kshira Sagar Sahoo, Mehedi Masud:
FSE2R: An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocol in USN. Comput. Syst. Sci. Eng. 44(3): 2225-2242 (2023) - [j94]Kuldeep Chouhan, Mukesh Yadav, Ranjeet Kumar Rout, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Sultan Aljahdali:
Sentiment Analysis with Tweets Behaviour in Twitter Streaming API. Comput. Syst. Sci. Eng. 45(2): 1113-1128 (2023) - [j93]Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, N. Z. Jhanjhi, Mehedi Masud, Mohammed Baz:
Energy Efficient Unequal Fault Tolerance Clustering Approach. Comput. Syst. Sci. Eng. 45(2): 1971-1983 (2023) - [j92]Saurabh Adhikari, Tushar Kanti Gangopadhayay, Souvik Pal, D. Akila, Mamoona Humayun, Majed Alfayad, N. Z. Jhanjhi:
A Novel Machine Learning-Based Hand Gesture Recognition Using HCI on IoT Assisted Cloud Platform. Comput. Syst. Sci. Eng. 46(2): 2123-2140 (2023) - [j91]Mamoona Humayun, Danish Javed, N. Z. Jhanjhi, Maram Fahhad Almufareh, Saleh Naif Almuayqil:
Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis. Comput. Syst. Sci. Eng. 47(1): 575-591 (2023) - [j90]Sandip K. Chaurasiya, Arindam Biswas, Anand Nayyar, Noor Zaman Jhanjhi, Rajib Banerjee:
DEICA: A differential evolution-based improved clustering algorithm for IoT-based heterogeneous wireless sensor networks. Int. J. Commun. Syst. 36(5) (2023) - [j89]Loveleen Gaur, Ujwal Bhatia, N. Z. Jhanjhi, Ghulam Muhammad, Mehedi Masud:
Medical image-based detection of COVID-19 using Deep Convolution Neural Networks. Multim. Syst. 29(3): 1729-1738 (2023) - [j88]Saber Zerdoumi, NZ Jhanjhi, Riyaz Ahamed Ariyaluran Habeeb, Ibrahim Abaker Targio Hashem:
A deep learning based approach for extracting Arabic handwriting: applied calligraphy and old cursive. PeerJ Comput. Sci. 9: e1465 (2023) - [j87]Reetu Gupta, Priyesh Kanungo, Nirmal Dagdee, Golla Madhu, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Nabil Sharaf Almalki, Mohammed A. Alzain:
Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing. Sensors 23(5): 2617 (2023) - [j86]Ramanjot, Usha Mittal, Ankita Wadhawan, Jimmy Singla, N. Z. Jhanjhi, Rania M. Ghoniem, Sayan Kumar Ray, Abdelzahir Abdelmaboud:
Plant Disease Detection and Classification: A Systematic Literature Review. Sensors 23(10): 4769 (2023) - [j85]Tallat Jabeen, Ishrat Jabeen, Humaira Ashraf, N. Z. Jhanjhi, Abdulsalam Yassine, M. Shamim Hossain:
An Intelligent Healthcare System Using IoT in Wireless Sensor Network. Sensors 23(11): 5055 (2023) - [j84]Mehreen Mushtaq, Ata Ullah, Humaira Ashraf, N. Z. Jhanjhi, Mehedi Masud, Abdulmajeed Alqhatani, Mrim M. Alnfiai:
Anonymity Assurance Using Efficient Pseudonym Consumption in Internet of Vehicles. Sensors 23(11): 5217 (2023) - [j83]Tallat Jabeen, Ishrat Jabeen, Humaira Ashraf, Ata Ullah, N. Z. Jhanjhi, Rania M. Ghoniem, Sayan Kumar Ray:
Smart Wireless Sensor Technology for Healthcare Monitoring System Using Cognitive Radio Networks. Sensors 23(13): 6104 (2023) - [j82]Subhita Menon, Divya Anand, Kavita, Sahil Verma, Maninder Kaur, N. Z. Jhanjhi, Rania M. Ghoniem, Sayan Kumar Ray:
Blockchain and Machine Learning Inspired Secure Smart Home Communication Network. Sensors 23(13): 6132 (2023) - [j81]Mamoona Humayun, Mahmood Niazi, Noor Zaman Jhanjhi, Sajjad Mahmood, Mohammad R. Alshayeb:
Toward a readiness model for secure software coding. Softw. Pract. Exp. 53(4): 1013-1035 (2023) - [j80]Farzeen Ashfaq, Rania M. Ghoniem, N. Z. Jhanjhi, Navid Ali Khan, Abeer D. Algarni:
Using Dual Attention BiLSTM to Predict Vehicle Lane Changing Maneuvers on Highway Dataset. Syst. 11(4): 196 (2023) - [e2]Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi, Satyen Parikh, Kiran Amin:
Computing Science, Communication and Security - 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6-7, 2023, Revised Selected Papers. Communications in Computer and Information Science 1861, Springer 2023, ISBN 978-3-031-40563-1 [contents] - [i3]Faiza Ishaq, Humaira Ashraf, Noor Zaman Jhanjhi:
A Survey on Scheduling the Task in Fog Computing Environment. CoRR abs/2312.12910 (2023) - [i2]Uswa Ihsan, Humaira Ashraf, NZ Jhanjhi:
Survey on Multi-Document Summarization: Systematic Literature Review. CoRR abs/2312.12915 (2023) - [i1]Rabia Nasir, Humaira Ashraf, NZ Jhanjhi:
Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey. CoRR abs/2312.12925 (2023) - 2022
- [j79]Muhammad Attaullah, Mushtaq Ali, Maram Fahhad Almufareh, Muneer Ahmad, Lal Hussain, NZ Jhanjhi, Mamoona Humayun:
Initial Stage COVID-19 Detection System Based on Patients' Symptoms and Chest X-Ray Images. Appl. Artif. Intell. 36(1) (2022) - [j78]Mamoona Humayun, Mohammed Saleh Alsaqer, NZ Jhanjhi:
Energy Optimization for Smart Cities Using IoT. Appl. Artif. Intell. 36(1) (2022) - [j77]Ishaani Priyadarshini, Jyotir Moy Chatterjee, Sujatha Radhakrishnan, NZ Jhanjhi, Ali Karime, Mehedi Masud:
Exploring Internet Meme Activity during COVID-19 Lockdown Using Artificial Intelligence Techniques. Appl. Artif. Intell. 36(1) (2022) - [j76]Qazi Mudassar Ilyas, Muneer Ahmad, Noor Zaman, Majed A. Alshamari, Ijaz Ahmed:
Localized Text-Free User Interfaces. IEEE Access 10: 2357-2371 (2022) - [j75]S. Nanglia, Muneer Ahmad, Fawad Ali Khan, N. Z. Jhanjhi:
An enhanced Predictive heterogeneous ensemble model for breast cancer prediction. Biomed. Signal Process. Control. 72(Part): 103279 (2022) - [j74]Rao Nadeem, Rana M. Amir Latif, Khalid Hussain, N. Z. Jhanjhi, Mamoona Humayun:
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework. Open Comput. Sci. 12(1): 364-377 (2022) - [j73]Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad, Abdul Razaque:
Light Weight Authentication Scheme for Smart Home IoT Devices. Cryptogr. 6(3): 37 (2022) - [j72]Adlyn Adam Teoh, Norjihan Binti Abdul Ghani, Muneer Ahmad, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Organizational Data Breach: Building Conscious Care Behavior in Incident Response. Comput. Syst. Sci. Eng. 40(2): 505-515 (2022) - [j71]Vasaki Ponnusamy, Aun Yichiet, N. Z. Jhanjhi, Mamoona Humayun, Maram Fahhad Almufareh:
IoT Wireless Intrusion Detection and Network Traffic Analysis. Comput. Syst. Sci. Eng. 40(3): 865-879 (2022) - [j70]Norjihan Binti Abdul Ghani, Suraya Hamid, Muneer Ahmad, Younes Saadi, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume. Comput. Syst. Sci. Eng. 40(3): 913-926 (2022) - [j69]Vasaki Ponnusamy, Mamoona Humayun, N. Z. Jhanjhi, Aun Yichiet, Maram Fahhad Almufareh:
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. Comput. Syst. Sci. Eng. 40(3): 1199-1215 (2022) - [j68]Varun Dogra, Sahil Verma, Kavita, NZ Jhanjhi, Uttam Ghosh, Dac-Nhuong Le:
A Comparative Analysis of Machine Learning Models for Banking News Extraction by Multiclass Classification With Imbalanced Datasets of Financial News: Challenges and Solutions. Int. J. Interact. Multim. Artif. Intell. 7(3): 35 (2022) - [j67]Ata Ullah, Muhammad Azeem, Humaira Ashraf, N. Z. Jhanjhi, Lewis Nkenyereye, Mamoona Humayun:
Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT-Enabled WSN. IEEE Internet Things J. 9(4): 2669-2677 (2022) - [j66]Qazi Mudassar Ilyas, Muneer Ahmad, Noor Zaman Jhanjhi, Muhammad Bilal Ahmad:
Analyzing the Impact of Social Distancing on the Stoning Ritual of the Islamic Pilgrimage. KSII Trans. Internet Inf. Syst. 16(6): 1953-1972 (2022) - [j65]Sadia Ali, Yaser Hafeez, Mamoona Humayun, N. Z. Jhanjhi, Dac-Nhuong Le:
Towards aspect based requirements mining for trace retrieval of component-based software management process in globally distributed environment. Inf. Technol. Manag. 23(3): 151-165 (2022) - [j64]Casper Gihes Kaun Simon, Noor Zaman Jhanjhi, Wei Wei Goh, Sanath Sukumaran:
Applications of Machine Learning in Knowledge Management System: A Comprehensive Review. J. Inf. Knowl. Manag. 21(2): 2250017:1-2250017:62 (2022) - [j63]Bata Krishna Tripathy, Kshira Sagar Sahoo, Ashish Kr. Luhach, N. Z. Jhanjhi, Swagat Kumar Jena:
A virtual execution platform for OpenFlow controller using NFV. J. King Saud Univ. Comput. Inf. Sci. 34(3): 964-971 (2022) - [j62]S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi:
Early detection of crypto-ransomware using pre-encryption detection algorithm. J. King Saud Univ. Comput. Inf. Sci. 34(5): 1984-1999 (2022) - [j61]Dalia Abdulkareem Shafiq, N. Z. Jhanjhi, Azween B. Abdullah:
Load balancing techniques in cloud computing environment: A review. J. King Saud Univ. Comput. Inf. Sci. 34(7): 3910-3933 (2022) - [j60]Soobia Saeed, Afnizanfaizal Abdullah, N. Z. Jhanjhi, Mehmood Naqvi, Anand Nayyar:
New techniques for efficiently k-NN algorithm for brain tumor detection. Multim. Tools Appl. 81(13): 18595-18616 (2022) - [j59]Saber Zerdoumi, Ibrahim Abaker Targio Hashem, Noor Zaman Jhanjhi:
A new spatial spherical pattern model into interactive cartography pattern: multi-dimensional data via geostrategic cluster. Multim. Tools Appl. 81(16): 22903-22952 (2022) - [j58]R. Gopi, V. Sathiyamoorthi, S. Selvakumar, Manikandan Ramasamy, Pushpita Chatterjee, N. Z. Jhanjhi, Ashish Kumar Luhach:
Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multim. Tools Appl. 81(19): 26739-26757 (2022) - [j57]R. Muthukkumar, Lalit Garg, K. Maharajan, M. Jayalakshmi, NZ Jhanjhi, S. Parthiban, G. Saritha:
A genetic algorithm-based energy-aware multi-hop clustering scheme for heterogeneous wireless sensor networks. PeerJ Comput. Sci. 8: e1029 (2022) - [j56]Umema Hani, Khalid Khan, Usman Amjad, Noor Zaman Jhanjhi, Ayub Latif, Saood Zia:
A benchmarking program to support software process improvement adaptation in a developing country, a Pakistan case. PeerJ Comput. Sci. 8: e936 (2022) - [j55]Mamoona Humayun, Noor Zaman Jhanjhi, Abdullah Almotilag, Maram Fahhad Almufareh:
Agent-Based Medical Health Monitoring System. Sensors 22(8): 2820 (2022) - [j54]Syeda Mariam Muzammal, Raja Kumar Murugesan, NZ Jhanjhi, M. Shamim Hossain, Abdulsalam Yassine:
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors 22(16): 6215 (2022) - [j53]F. Zahra, NZ Jhanjhi, Sarfraz Nawaz Brohi, Navid Ali Khan, Mehedi Masud, Mohammed A. Alzain:
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. Sensors 22(18): 6765 (2022) - [j52]Syeda Mariam Muzammal, Raja Kumar Murugesan, Noor Zaman Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, Abdelzahir Abdelmaboud:
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors 22(18): 7052 (2022) - [j51]Ashwani Kumar, Mohit Kumar, Sahil Verma, Kavita, N. Z. Jhanjhi, Rania M. Ghoniem:
Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism. Symmetry 14(11): 2441 (2022) - [j50]Rana Muhammad Waseem, Farrukh Zeeshan Khan, Muneer Ahmad, Anum Naseem, N. Z. Jhanjhi, Uttam Ghosh:
Performance Evaluation of AOMDV on Realistic and Efficient VANet Simulations. Wirel. Pers. Commun. 127(1): 659-678 (2022) - [c6]Matasem Saleh, N. Z. Jhanjhi, Azween B. Abdullah, Raazia Saher:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. ICACT 2022: 210-219 - [c5]Matasem Saleh, NZ Jhanjhi, Azween B. Abdullah, Raazia Saher:
IoTES (A Machine learning model) Design dependent encryption selection for IoT devices. ICACT 2022: 239-246 - [e1]Nirbhay Chaubey, Sabu M. Thampi, Noor Zaman Jhanjhi:
Computing Science, Communication and Security - Third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, Revised Selected Papers. Communications in Computer and Information Science 1604, Springer 2022, ISBN 978-3-031-10550-0 [contents] - 2021
- [j49]Ata Ullah, Muhammad Azeem, Humaira Ashraf, Abdulellah A. Alaboudi, Mamoona Humayun, N. Z. Jhanjhi:
Secure Healthcare Data Aggregation and Transmission in IoT - A Survey. IEEE Access 9: 16849-16865 (2021) - [j48]Dalia Abdulkareem Shafiq, Noor Zaman Jhanjhi, Azween B. Abdullah, Mohammed A. Alzain:
A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications. IEEE Access 9: 41731-41744 (2021) - [j47]Sandeep Verma, Satnam Kaur, Danda B. Rawat, Xi Chen, Linss T. Alex, Noor Zaman Jhanjhi:
Intelligent Framework Using IoT-Based WSNs for Wildfire Detection. IEEE Access 9: 48185-48196 (2021) - [j46]Sunil Jacob, Mukil Alagirisamy, Xi Chen, Venki Balasubramanian, Ram Srinivasan, Parvathi R, N. Z. Jhanjhi, Sardar M. N. Islam:
AI and IoT-Enabled Smart Exoskeleton System for Rehabilitation of Paralyzed People in Connected Communities. IEEE Access 9: 80340-80350 (2021) - [j45]Muhammad Azeem, Ata Ullah, Humaira Ashraf, N. Z. Jhanjhi, Mamoona Humayun, Sultan Aljahdali, Thamer A. Tabbakh:
FoG-Oriented Secure and Lightweight Data Aggregation in IoMT. IEEE Access 9: 111072-111082 (2021) - [j44]Muhammad Javed Iqbal, Muhammad Munwar Iqbal, Iftikhar Ahmad, Muneer Ahmad, N. Z. Jhanjhi, Sultan Aljahdali, Memoona Mushtaq:
Smart Home Automation Using Intelligent Electricity Dispatch. IEEE Access 9: 118077-118086 (2021) - [j43]Ata Ullah, Nagina Ishaq, Muhammad Azeem, Humaira Ashraf, N. Z. Jhanjhi, Mamoona Humayun, Thamer A. Tabbakh, Zahrah A. Almusaylim:
A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks. IEEE Access 9: 126324-126336 (2021) - [j42]Loveleen Gaur, Anam Afaq, Arun Solanki, Gurmeet Singh, Shavneet Sharma, N. Z. Jhanjhi, Hoang Thi My, Dac-Nhuong Le:
Capitalizing on big data and revolutionary 5G technology: Extracting and visualizing ratings and reviews of global chain hotels. Comput. Electr. Eng. 95: 107374 (2021) - [j41]Shahrul Nizam Ismail, Suraya Hamid, Muneer Ahmad, Abdulellah Alaboudi, N. Z. Jhanjhi:
Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics. Comput. Syst. Sci. Eng. 37(1): 73-87 (2021) - [j40]N. Z. Jhanjhi, Mamoona Humayun, Saleh Naif Almuayqil:
Cyber Security and Privacy Issues in Industrial Internet of Things. Comput. Syst. Sci. Eng. 37(3): 361-380 (2021) - [j39]Shakeel Ahmed, Munazza Ambreen, Muneer Ahmad, Abdulellah A. Alaboudi, Roobaea Alroobaea, N. Z. Jhanjhi:
An Effective Online Collaborative Training in Developing Listening Comprehension Skills. Comput. Syst. Sci. Eng. 38(2): 131-140 (2021) - [j38]Sankar Sennan, Ramasubbareddy Somula, Ashish Kumar Luhach, Ganesh Gopal Deverajan, Waleed S. Alnumay, N. Z. Jhanjhi, Uttam Ghosh, Pradip Kumar Sharma:
Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j37]Balachandran Vijayalakshmi, Kadarkarayandi Ramar, N. Z. Jhanjhi, Sahil Verma, Madasamy Kaliappan, Kandasamy Vijayalakshmi, Shanmuganathan Vimal, Kavita, Uttam Ghosh:
An attention-based deep learning model for traffic flow prediction using spatiotemporal features towards sustainable smart city. Int. J. Commun. Syst. 34(3) (2021) - [j36]Sobia Wassan, Xi Chen, N. Z. Jhanjhi, Laiqa Binte Imran:
Effect of frost on plants, leaves, and forecast of frost events using convolutional neural networks. Int. J. Distributed Sens. Networks 17(10): 155014772110537 (2021) - [j35]Sujatha Radhakrishnan, Aarthy SL, Jyotir Moy Chatterjee, Abdulellah Alaboudi, N. Z. Jhanjhi:
A Machine Learning Way to Classify Autism Spectrum Disorder. Int. J. Emerg. Technol. Learn. 16(6) (2021) - [j34]Sohaib Al-Yadumi, Wei-Wei Goh, Ee-Xion Tan, Noor Zaman Jhanjhi, Patrice Boursier:
Multimatcher Model to Enhance Ontology Matching Using Background Knowledge. Inf. 12(11): 487 (2021) - [j33]Syeda Mariam Muzammal, Raja Kumar Murugesan, N. Z. Jhanjhi:
A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet Things J. 8(6): 4186-4210 (2021) - [j32]Khalid Hussain, N. Z. Jhanjhi, Hafiz Mati-ur-Rahman, Jawad Hussain, Muhammad Hasan Islam:
Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes. J. King Saud Univ. Comput. Inf. Sci. 33(4): 417-425 (2021) - [j31]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi:
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. J. King Saud Univ. Comput. Inf. Sci. 33(10): 1202-1210 (2021) - [j30]Radhakrishnan Sujatha, Jyotir Moy Chatterjee, N. Z. Jhanjhi, Sarfraz Nawaz Brohi:
Performance of deep learning vs machine learning in plant leaf disease detection. Microprocess. Microsystems 80: 103615 (2021) - [j29]Seungjin Lee, Azween B. Abdullah, N. Z. Jhanjhi, S. H. Kok:
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning. PeerJ Comput. Sci. 7: e350 (2021) - [j28]Jie Li, Wei Wei Goh, NZ Jhanjhi, Filzah Binti Md Isa, Sumathi Balakrishnan:
An Empirical Study on Challenges Faced by the Elderly in Care Centres. EAI Endorsed Trans. Pervasive Health Technol. 7(28): e2 (2021) - [j27]Monagi H. Alkinani, Abdulwahab Ali Almazroi, N. Z. Jhanjhi, Navid Ali Khan:
5G and IoT Based Reporting and Accident Detection (RAD) System to Deliver First Aid Box Using Unmanned Aerial Vehicle. Sensors 21(20): 6905 (2021) - [j26]Akhilendra Pratap Singh, Nihar Ranjan Pradhan, Ashish Kumar Luhach, Sivansu Agnihotri, Noor Zaman Jhanjhi, Sahil Verma, Kavita, Uttam Ghosh, Diptendu Sinha Roy:
A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications. IEEE Trans. Ind. Informatics 17(8): 5779-5789 (2021) - [j25]Syed Jawad Hussain, Muhammad Irfan, N. Z. Jhanjhi, Khalid Hussain, Mamoona Humayun:
Performance Enhancement in Wireless Body Area Networks with Secure Communication. Wirel. Pers. Commun. 116(1): 1-22 (2021) - [c4]Matasem Saleh, N. Z. Jhanjhi, Azween B. Abdullah, Raazia Saher:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. ICACT 2021: 210-219 - 2020
- [j24]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi, Muhammad Khurram Khan:
Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks. IEEE Access 8: 16550-16559 (2020) - [j23]Abebe Abeshu Diro, Haftu Reda, Naveen K. Chilamkurti, Abdun Naser Mahmood, Noor Zaman, Yunyoung Nam:
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication. IEEE Access 8: 60539-60551 (2020) - [j22]Sunil Jacob, Mukil Alagirisamy, Varun G. Menon, B. Manoj Kumar, N. Z. Jhanjhi, Vasaki Ponnusamy, Shynu Gopalan Padinjappurathu, Venki Balasubramanian:
An Adaptive and Flexible Brain Energized Full Body Exoskeleton With IoT Edge for Assisting the Paralyzed Patients. IEEE Access 8: 100721-100731 (2020) - [j21]Vivek Singhal, S. S. Jain, Divya Anand, Aman Singh, Sahil Verma, Kavita, Joel J. P. C. Rodrigues, Noor Zaman, Uttam Ghosh, Ohyun Jo, Celestine Iwendi:
Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings. IEEE Access 8: 113790-113806 (2020) - [j20]Sadia Ali, Yaser Hafeez, N. Z. Jhanjhi, Mamoona Humayun, Muhammad Imran, Anand Nayyar, Saurabh Singh, In-Ho Ra:
Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based. IEEE Access 8: 148007-148020 (2020) - [j19]Sambit Kumar Mishra, Sonali Mishra, Ahmed Alsayat, N. Z. Jhanjhi, Mamoona Humayun, Kshira Sagar Sahoo, Ashish Kumar Luhach:
Energy-Aware Task Allocation for Multi-Cloud Networks. IEEE Access 8: 178825-178834 (2020) - [j18]Mamoona Humayun, N. Z. Jhanjhi, Madallah Alruwaili, Sagaya Sabestinal Amalathas, Venki Balasubramanian, Buvana Selvaraj:
Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things. IEEE Access 8: 183665-183677 (2020) - [j17]Zahrah A. Almusaylim, Abdulaziz Al-Humam, N. Z. Jhanjhi:
Proposing a Secure RPL based Internet of Things Routing Protocol: A Review. Ad Hoc Networks 101: 102096 (2020) - [j16]Theyvaa Sangkaran, Azween B. Abdullah, N. Z. Jhanjhi:
Criminal Community Detection Based on Isomorphic Subgraph Analytics. Open Comput. Sci. 10(1): 164-174 (2020) - [j15]Navid Ali Khan, N. Z. Jhanjhi, Sarfraz Nawaz Brohi, Raja Sher Afgun Usmani, Anand Nayyar:
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). Comput. Commun. 157: 434-443 (2020) - [j14]Theyvaa Sangkaran, Azween Bin Abdullah, N. Z. Jhanjhi:
Criminal Network Community Detection Using Graphical Analytic Methods: A Survey. EAI Endorsed Trans. Energy Web 7(26): e5 (2020) - [j13]Amos Loh Yee Ren, Chong Tze Liang, Im Jun Hyug, Sarfraz Nawaz Broh, N. Z. Jhanjhi:
A Three-Level Ransomware Detection and Prevention Mechanism. EAI Endorsed Trans. Energy Web 7(26): e6 (2020) - [j12]Azeem Khan, NZ Jhanjhi, Mamoona Humayun:
Secure Smart and Remote Multipurpose Attendance Monitoring System. EAI Endorsed Trans. Energy Web 7(30): e5 (2020) - [j11]Muneeb Ali Hamid, Yaser Hafeez, Bushra Hamid, Mamoona Humayun, N. Z. Jhanjhi:
Towards an effective approach for architectural knowledge management considering global software development. Int. J. Grid Util. Comput. 11(6): 780-791 (2020) - [j10]Mamoona Humayun, N. Z. Jhanjhi, Bushra Hamid, Ghufran Ahmed:
Emerging Smart Logistics and Transportation Using IoT and Blockchain. IEEE Internet Things Mag. 3(2): 58-62 (2020) - [j9]S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi:
Evaluation metric for crypto-ransomware detection using machine learning. J. Inf. Secur. Appl. 55: 102646 (2020) - [j8]Zahrah A. Almusaylim, N. Z. Jhanjhi, Abdulaziz Al-Humam:
Detection and Mitigation of RPL Rank and Version Number Attacks in the Internet of Things: SRPL-RP. Sensors 20(21): 5997 (2020) - [j7]Zahrah A. Almusaylim, N. Z. Jhanjhi:
Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing. Wirel. Pers. Commun. 111(1): 541-564 (2020) - [c3]Matasem Saleh, N. Z. Jhanjhi, Azween B. Abdullah, Fatima-tuz-Zahra:
Proposing a Privacy Protection Model in Case of Civilian Drone. ICACT 2020: 596-602
2010 – 2019
- 2019
- [j6]Chander Diwaker, Pradeep Tomar, Arun Solanki, Anand Nayyar, N. Z. Jhanjhi, Azween B. Abdullah, Mahadevan Supramaniam:
A New Model for Predicting Component-Based Software Reliability Using Soft Computing. IEEE Access 7: 147191-147203 (2019) - [j5]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi, Muhammad Khurram Khan, Mahadevan Supramaniam:
Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique. IEEE Access 7: 184797-184807 (2019) - [j4]Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi, Mahadevan Supramaniam:
Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique. Comput. 8(1): 8 (2019) - [j3]S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi, Mahadevan Supramaniam:
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm. Comput. 8(4): 79 (2019) - [j2]Zahrah A. Almusaylim, Noor Zaman:
A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wirel. Networks 25(6): 3193-3204 (2019) - 2018
- [c2]Abdulaziz Alsubaie, Mohammed Alaithan, Muath Boubaid, Noor Zaman:
Making learning fun: Educational concepts & logics through game. ICACT 2018: 454-459 - [c1]Maria Almulhim, Noor Zaman:
Proposing secure and lightweight authentication scheme for IoT based E-health applications. ICACT 2018: 481-487 - 2015
- [j1]Tanesh Kumar, Bishwajeet Pandey, S. H. A. Mussavi, Noor Zaman:
CTHS Based Energy Efficient Thermal Aware Image ALU Design on FPGA. Wirel. Pers. Commun. 85(3): 671-696 (2015)
Coauthor Index
aka: Azween Bin Abdullah
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint