default search action
Sohail Abbas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Sohail Abbas, Manar Abu Talib, Qassim Nasir, Sally Idhis, Mariam M. Alaboudi, Ali Mohamed:
Radio frequency fingerprinting techniques for device identification: a survey. Int. J. Inf. Sec. 23(2): 1389-1427 (2024) - [j24]Mian Ahmad Jan, Wenjing Zhang, Fazlullah Khan, Sohail Abbas, Rahim Khan:
Lightweight and smart data fusion approaches for wearable devices of the Internet of Medical Things. Inf. Fusion 103: 102076 (2024) - [c8]Mariame Elsalhy, Manar Abu Talib, Sohail Abbas, Qassim Nasir:
Investigating the Implementation of the Artificial Bee Colony Using the ArcGIS Environment: Dubai Drone Box Platform Case Study. IS 2024: 1-6 - 2023
- [j23]Khaldoun Senjab, Sohail Abbas, Naveed Ahmed, Atta ur Rehman Khan:
A survey of Kubernetes scheduling algorithms. J. Cloud Comput. 12(1): 87 (2023) - [j22]Takua Mokhamed, Manar Abu Talib, Mohammad Moufti, Sohail Abbas, Faheem Khan:
The Potential of Blockchain Technology in Dental Healthcare: A Literature Review. Sensors 23(6): 3277 (2023) - 2021
- [j21]Farman Ullah, Muhammad Zahid Khan, Mohammad Faisal, Haseeb Ur Rehman, Sohail Abbas, Foad Salem Mubarek:
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks. Comput. Commun. 165: 20-32 (2021) - [j20]Sami Ur Rahman, Adnan Khan, Sohail Abbas, Fakhre Alam, Nasir Rashid:
Hybrid system for automatic detection of gunshots in indoor environment. Multim. Tools Appl. 80(3): 4143-4153 (2021) - [j19]Sohail Abbas, Qassim Nasir, Douae Nouichi, Mohamed Abdelsalam, Manar AbuTalib, Omnia Abu Waraga, Atta ur Rehman Khan:
Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21): 14753-14769 (2021) - [j18]Sohail Abbas, Manar Abu Talib, Afaf Ahmed, Faheem Khan, Shabir Ahmad, Do-Hyeun Kim:
Blockchain-Based Authentication in Internet of Vehicles: A Survey. Sensors 21(23): 7927 (2021) - [c7]Mohammed Al-Haidary, Mhd Alaa Ajlouni, Manar Abu Talib, Sohail Abbas, Qassim Nasir, Essa Basaeed:
Metaheuristic Approaches to Facility Location Problems: A Systematic Review. ICSPIS 2021: 49-52 - 2020
- [j17]Gulzar Mehmood, Muhammad Zahid Khan, Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman:
An Energy-Efficient and Cooperative Fault- Tolerant Communication Approach for Wireless Body Area Network. IEEE Access 8: 69134-69147 (2020) - [j16]Ahmed M. Khedr, Walid Osamy, Ahmed Salim, Sohail Abbas:
A Novel Association Rule-Based Data Mining Approach for Internet of Things Based Wireless Sensor Networks. IEEE Access 8: 151574-151588 (2020) - [j15]Muhammad Asad, Muhammad Asim, Talha Javed, Mirza Omer Beg, Hasan Mujtaba, Sohail Abbas:
DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning. Comput. J. 63(7): 983-994 (2020) - [j14]Sohail Abbas, Muhammad Haqdad, Muhammad Zahid Khan, Haseeb Ur Rehman, Ajab Khan, Atta ur Rehman Khan:
Survivability Analysis of MANET Routing Protocols under DOS Attacks. KSII Trans. Internet Inf. Syst. 14(9): 3639-3662 (2020) - [j13]Thomas Rose, Kashif Kifayat, Sohail Abbas, Muhammad Asim:
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. J. Parallel Distributed Comput. 145: 124-139 (2020) - [c6]Mariam Hassan AlThabahi, Manar AbuTalib, Sohail Abbas, Essa Basaeed:
A Survey of Emergency Service Facilities Site Selection (ESFSS) Algorithms. IIT 2020: 165-171
2010 – 2019
- 2019
- [j12]Sohail Abbas, Madjid Merabti, Kashif Kifayat, Thar Baker:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6214-6242 (2019) - [j11]Fakhre Alam, Sami Ur Rahman, Nasser Tairan, Habib Shah, Mohammed Saeed Abohashrh, Sohail Abbas:
An Automatic Medical Image Registration Approach Based on Common Sub-regions of Interest. J. Medical Imaging Health Informatics 9(2): 251-260 (2019) - [j10]Nadeem Abbas, Muhammad Asim, Noshina Tariq, Thar Baker, Sohail Abbas:
A Mechanism for Securing IoT-enabled Applications at the Fog Layer. J. Sens. Actuator Networks 8(1): 16 (2019) - [j9]Mohammad Faisal, Sohail Abbas, Haseeb Ur Rahman, Muhammad Zahid Khan, Arif Ur Rahman:
An Analysis of DDoS Attacks on the Instant Messengers. Secur. Commun. Networks 2019: 1751285:1-1751285:8 (2019) - [j8]Djedjiga Mouheb, Sohail Abbas, Madjid Merabti:
Cybersecurity Curriculum Design: A Survey. Trans. Edutainment 15: 93-107 (2019) - [c5]Sohail Abbas:
An Efficient Sybil Attack Detection for Internet of Things. WorldCIST (2) 2019: 339-349 - 2018
- [j7]Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan:
Masquerading Attacks Detection in Mobile Ad Hoc Networks. IEEE Access 6: 55013-55025 (2018) - [j6]Mohammad Faisal, Sohail Abbas, Haseeb Ur Rahman:
Identity attack detection system for 802.11-based ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018: 128 (2018) - [j5]Manar AbuTalib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi Mowakeh:
Systematic literature review on Internet-of-Vehicles communication security. Int. J. Distributed Sens. Networks 14(12) (2018) - 2017
- [j4]Ikram Ali, Mohammad Faisal, Sohail Abbas:
A Survey on Lightweight Authentication Schemes in Vertical Handoff. Int. J. Cooperative Inf. Syst. 26(1): 1630001:1-1630001:18 (2017) - 2015
- [j3]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - 2013
- [j2]Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [j1]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - 2011
- [b1]Sohail Abbas:
A layered security approach for cooperation enforcement in MANETs. Liverpool John Moores University, UK, 2011 - [c4]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - 2010
- [c3]Waqqas ur Rehman Butt, Sohail Abbas:
Comprehensive Study of Transport Communication Protocol (TCP) and Its Role in Wired and Wireless Networks. ICWN 2010: 488-492 - [c2]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6
2000 – 2009
- 2008
- [c1]Waqqas ur Rehman Butt, Sohail Abbas:
Study of Bluetooth Technology and Initial Research. Communications in Computing 2008: 43-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint