default search action
Munam Ali Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Muhammad Usman Rana, Munam Ali Shah, Mohammed Abdulaziz Al Naeem, Carsten Maple:
Ransomware Attacks in Cyber-Physical Systems: Countermeasure of Attack Vectors Through Automated Web Defenses. IEEE Access 12: 149722-149739 (2024) - [j57]Ikram Ullah, Munam Ali Shah:
SGO: Semantic Group Obfuscation for Location-Based Services in VANETS. Sensors 24(4): 1145 (2024) - 2023
- [j56]Muhammad Haris, Munam Ali Shah, Carsten Maple:
Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling. IEEE Access 11: 49665-49674 (2023) - [j55]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3361-3377 (2023) - [j54]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3379 (2023) - [j53]Maria Naz, Munam Ali Shah, Hasan Ali Khattak, Abdul Wahid, Muhammad Nabeel Asghar, Hafiz Tayyab Rauf, Muhammad Attique Khan, Zoobia Ameer:
Multi-branch sustainable convolutional neural network for disease classification. Int. J. Imaging Syst. Technol. 33(5): 1621-1633 (2023) - [c91]Bushra Abbasi, Munam Ali Shah:
An Empirical Study on Hybrid Scheduling Algorithms in Cloud Computing. ICAC 2023: 1-6 - 2022
- [j52]Abdul Waheed, Munam Ali Shah, Syed Muhammad Mohsin, Abid Khan, Carsten Maple, Sheraz Aslam, Shahab Shamshirband:
A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks. IEEE Access 10: 3580-3600 (2022) - [j51]Beenish Urooj, Munam Ali Shah, Carsten Maple, Muhammad Kamran Abbasi, Sidra Riasat:
Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms. IEEE Access 10: 89031-89050 (2022) - [j50]Faizan Karim, Munam Ali Shah, Hasan Ali Khattak, Zoobia Ameer, Umar Shoaib, Hafiz Tayyab Rauf, Fadi Al-Turjman:
Towards an effective model for lung disease classification: Using Dense Capsule Nets for early classification of lung diseases. Appl. Soft Comput. 124: 109077 (2022) - [j49]Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak, Hafiz Tayyab Rauf, Fadi M. Al-Turjman:
Achieving data privacy for decision support systems in times of massive data sharing. Clust. Comput. 25(5): 3037-3049 (2022) - [j48]Awais Manzoor, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, Muhammad Khurram Khan:
Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst. 35(12) (2022) - [j47]Samman Zahra, Wei Gong, Hasan Ali Khattak, Munam Ali Shah, Houbing Song:
Cross-Domain Security and Interoperability in Internet of Things. IEEE Internet Things J. 9(14): 11993-12000 (2022) - [j46]Ayesha Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Munam Ali Shah, Carsten Maple:
A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors 22(7): 2811 (2022) - [c90]Shahrukh Malik, Munam Ali Shah:
Access Control using Blockchain: A Taxonomy and Review. ICISDM 2022: 46-54 - [c89]Beenish Urooj, Ubaid Ullah, Munam Ali Shah, Hira Shahzadi Sikandar, Abdul Qarib Stanikzai:
Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems. ICAC 2022: 1-6 - [i1]Zeba Ghaffar, Pir Masoom Shah, Hikmat Ullah Khan, Syed Farhan Alam Zaidi, Abdullah Gani, Izaz Ahmad Khan, Munam Ali Shah, Saif ul Islam:
Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images. CoRR abs/2208.01637 (2022) - 2021
- [j45]Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j44]Abdul Basit Ajmal, Munam Ali Shah, Carsten Maple, Muhammad Nabeel Asghar, Saif ul Islam:
Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation. IEEE Access 9: 126023-126033 (2021) - [j43]Nasir Ali Khan, Abid Khan, Mansoor Ahmad, Munam Ali Shah, Gwanggil Jeon:
URL filtering using big data analytics in 5G networks. Comput. Electr. Eng. 95: 107379 (2021) - [j42]Adeena Nasir, Munam Ali Shah, Ummarah Ashraf, Abid Khan, Gwanggil Jeon:
An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments. Comput. Electr. Eng. 96(Part): 107526 (2021) - [j41]Ikram Ullah, Munam Ali Shah, Abid Khan, Gwanggil Jeon:
Privacy-preserving multilevel obfuscation scheme for vehicular network. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j40]Abdul Waheed, Munam Ali Shah, Abid Khan, Carsten Maple, Ikram Ullah:
Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs. Sensors 21(8): 2718 (2021) - [j39]Ikram Ullah, Munam Ali Shah, Abid Khan, Carsten Maple, Abdul Waheed:
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors 21(9): 3077 (2021) - [j38]Huniya Shahid, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar, Carsten Maple:
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things. ACM Trans. Internet Techn. 21(4): 101:1-101:26 (2021) - [j37]Usama Arshad, Munam Ali Shah, Nadeem Javaid:
Futuristic blockchain based scalable and cost-effective 5G vehicular network architecture. Veh. Commun. 31: 100386 (2021) - [c88]Osama Ellahi, Munam Ali Shah, Muhammad Usman Rana:
The ingenuity of malware substitution: Bypassing next-generation Antivirus. ICAC 2021: 1-5 - [c87]Zainab Iftikhar, Malayka Iftikhar, Munam Ali Shah:
Quantum Safe Cloud Computing Using Hash-based Digital Signatures. ICAC 2021: 1-6 - [c86]Ayesha Ishaq, Bilal Qadeer, Munam Ali Shah, Nimra Bari:
A Comparative study on Securing Electronic Health Records (EHR) in Cloud Computing. ICAC 2021: 1-7 - [c85]Muhammad Usman Rana, Munam Ali Shah, Osama Ellahi:
Malware Persistence and Obfuscation: An Analysis on Concealed Strategies. ICAC 2021: 1-6 - [c84]Rida Yaqoob, Sanaa, Muhammad Haris, Samadyar, Munam Ali Shah:
The Price Scraping Bot Threat on E-commerce Store Using Custom XPATH Technique. ICAC 2021: 1-6 - [c83]Abdul Qarib Stanikzai, Munam Ali Shah:
Evaluation of Cyber Security Threats in Banking Systems. SSCI 2021: 1-4 - [c82]Ikram Ullah, Munam Ali Shah, Abid Khan:
Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs. SSCI 2021: 1-7 - 2020
- [j36]Sahrish Khan Tayyaba, Hasan Ali Khattak, Ahmad Almogren, Munam Ali Shah, Ikram Ud Din, Ibrahim Alkhalifa, Mohsen Guizani:
5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning. IEEE Access 8: 6792-6800 (2020) - [j35]Ayesha Amjid, Abid Khan, Munam Ali Shah:
VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles. IEEE Access 8: 71763-71774 (2020) - [j34]Muhammad Ammad, Munam Ali Shah, Saif ul Islam, Carsten Maple, Abdullah A. Alaulamie, Joel J. P. C. Rodrigues, Shafaq Mussadiq, Usman Tariq:
A Novel Fog-Based Multi-Level Energy-Efficient Framework for IoT-Enabled Smart Environments. IEEE Access 8: 150010-150026 (2020) - [j33]Zunaira Amjad, Munam Ali Shah, Carsten Maple, Hasan Ali Khattak, Zoobia Ameer, Muhammad Nabeel Asghar, Shafaq Mussadiq:
Towards Energy Efficient Smart Grids Using Bio-Inspired Scheduling Techniques. IEEE Access 8: 158947-158960 (2020) - [j32]Muhammad Hamza Sarwar, Munam Ali Shah, Saif ul Islam, Carsten Maple, Joel J. P. C. Rodrigues, Abdullah A. Alaulamie, Shafaq Mussadiq, Usman Tariq, Muhammad Nabeel Asghar:
Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles. IEEE Access 8: 160596-160606 (2020) - [j31]Hikmat Ullah Khan, Pir Masoom Shah, Munam Ali Shah, Saif ul Islam, Joel J. P. C. Rodrigues:
Cascading handcrafted features and Convolutional Neural Network for IoT-enabled brain tumor segmentation. Comput. Commun. 153: 196-207 (2020) - [j30]Uferah Shafi, Munam Ali Shah, Abdul Wahid, Kamran Abbasi, Qaisar Javaid, Muhammad Nabeel Asghar, Muhammad Haider:
A novel amended dynamic round robin scheduling algorithm for timeshared systems. Int. Arab J. Inf. Technol. 17(1): 90-98 (2020) - [j29]Abdul Waheed, Munam Ali Shah, Abid Khan, Saif ul Islam, Suleman Khan, Carsten Maple, Muhammad Khurram Khan:
Volunteer Computing in Connected Vehicles: Opportunities and Challenges. IEEE Netw. 34(5): 212-218 (2020)
2010 – 2019
- 2019
- [j28]Rashid Kamal, Munam Ali Shah, Carsten Maple, Mohsin Masood, Abdul Wahid, Amjad Mehmood:
Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach. IEEE Access 7: 27124-27134 (2019) - [j27]Bilal Khalid Dar, Munam Ali Shah, Saif ul Islam, Castren Maple, Shafaq Mussadiq, Suleman Khan:
Delay-Aware Accident Detection and Response System Using Fog Computing. IEEE Access 7: 70975-70985 (2019) - [j26]Hina Rafique, Munam Ali Shah, Saif ul Islam, Tahir Maqsood, Suleman Khan, Carsten Maple:
A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing. IEEE Access 7: 115760-115773 (2019) - [j25]Saba Ameer, Munam Ali Shah, Abid Khan, Houbing Song, Carsten Maple, Saif ul Islam, Muhammad Nabeel Asghar:
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities. IEEE Access 7: 128325-128338 (2019) - [j24]Tayaba Iftikhar, Hasan Ali Khattak, Zoobia Ameer, Munam Ali Shah, Faisal Fayyaz Qureshi, Muhammad Zeeshan Shakir:
Human Bond Communications: Architectures, Challenges, and Possibilities. IEEE Commun. Mag. 57(2): 19-25 (2019) - [j23]Abdul Wahid, Humera Yasmeen, Munam Ali Shah, Masoom Alam, Sayed Chhattan Shah:
Holistic approach for coupling privacy with safety in VANETs. Comput. Networks 148: 214-230 (2019) - [j22]Ayesha Siddiqa, Faisal Fayyaz Qureshi, Munam Ali Shah, Rahat Iqbal, Abdul Wahid, Victor Chang:
CCN: A novel energy efficient greedy routing protocol for green computing. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j21]Ayesha Siddiqua, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, Mohsen Guizani:
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services. Future Gener. Comput. Syst. 99: 365-375 (2019) - [j20]Hasan Ali Khattak, Munam Ali Shah, Sangeen Khan, Ihsan Ali, Muhammad Imran:
Perception layer security in Internet of Things. Future Gener. Comput. Syst. 100: 144-164 (2019) - [j19]Munam Ali Shah, Sijing Zhang, Hong-Ji Yang:
A reliability aware protocol for cooperative communication in cognitive radio networks. Int. J. Autom. Comput. 16(1): 84-92 (2019) - [j18]Sahrish Khan Tayyaba, Munam Ali Shah:
Resource allocation in SDN based 5G cellular networks. Peer-to-Peer Netw. Appl. 12(2): 514-538 (2019) - [j17]Fizzah Bhatti, Munam Ali Shah, Carsten Maple, Saif ul Islam:
A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments. Sensors 19(9): 2071 (2019) - [c81]Abdul Waheed, Abdul Wahid, Munam Ali Shah:
LAOD: Link Aware on Demand Routing in Flying Ad-Hoc Networks. ICC Workshops 2019: 1-5 - [c80]Hammad Ali, Rosheen Qazi, Munam Ali Shah:
Smart Cities: Methods, Encounters & Hunt for Future - Survey. ICAC 2019: 1-6 - [c79]Ayesha Aslam, Sehreen Manzoor Maher, Laraib Kanwal, Munam Ali Shah:
An Aspect of Internet of Things Security: Analysis of Digital Fingerprinting of Generic Twitter Sessions by Using Forensic Tool. ICAC 2019: 1-5 - [c78]Kamran Sattar Awaisi, Munam Ali Shah, Danish Iqbal, Tehseen Riaz Abbasi:
Coronary Artery Bypass Grafting (CABG) Anatomy with E-Learning Environment. ICAC 2019: 1-6 - [c77]Fehda Malik, Hasan Ali Khattak, Munam Ali Shah:
Evaluation of the Impact of Traffic Congestion Based on SUMO. ICAC 2019: 1-5 - [c76]Shafaq Munir, Muhammad Jalal Shah, Muhammad Umer, Munam Ali Shah, Muhamad Ali Javed:
A Novel Model for HD video calling in 5G Networks. ICAC 2019: 1-6 - [c75]Afrah Naeem, Zeeshan Aslam, Munam Ali Shah:
Analyzing Quality of Software Requirements; A Comparison Study on NLP Tools. ICAC 2019: 1-6 - [c74]Anwar Ur Rehman, Ali Haider Khan, Mustansar Aftab, Zobia Rehman, Munam Ali Shah:
Hierarchical Topic Modeling for Urdu Text Articles. ICAC 2019: 1-6 - [c73]Ammara Roohi, Muhammad Adeel, Munam Ali Shah:
DDoS in IoT: A Roadmap Towards Security & Countermeasures. ICAC 2019: 1-6 - [c72]Muhammad Hamza Sarwar, Munam Ali Shah, Muhammad Umair, Syad Hassnain Faraz:
Network of ECUs Software Update in Future vehicles. ICAC 2019: 1-5 - [c71]Muhammad Umair, Munam Ali Shah, Muhammad Hamza Sarwar:
Barriers of Requirement Change Management Process in the Context of Global Software Development. ICAC 2019: 1-6 - [c70]Attiya khan, Munazza Ishtiaq, Sajjad Anwar, Munam Ali Shah:
A Survey on secure routing strategies in VANETs. ICAC 2019: 1-6 - [c69]Sahibzada Muhammad Shuja, Raja Farhat Makhdoom Khan, Munam Ali Shah, Hasan Ali Khattak, Assad Abbas, Samee U. Khan:
On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine. SERVICES 2019: 16-30 - [p4]Waleed Rafique, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada:
Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 83-92 - [p3]Sardar Mehboob Hussain, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faheem Khan, Noor Ul Amin, Saba Arshad, Ihsan Ali:
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 93-105 - [p2]Sidra Razzaq, Abdul Wahid, Faheem Khan, Noor Ul Amin, Munam Ali Shah, Adnan Akhunzada, Ihsan Ali:
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 107-117 - [p1]Umara Zafar, Munam Ali Shah, Abdul Wahid, Adnan Akhunzada, Shahan Arif:
Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions. Recent Trends and Advances in Wireless and IoT-enabled Networks 2019: 291-309 - 2018
- [j16]Saba Arshad, Munam Ali Shah, Abdul Wahid, Amjad Mehmood, Houbing Song, Hongnian Yu:
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System. IEEE Access 6: 4321-4339 (2018) - [j15]Syeda Mariam Muzammal, Munam Ali Shah, Hasan Ali Khattak, Sohail Jabbar, Ghufran Ahmed, Shehzad Khalid, Shahid Hussain, Kijun Han:
Counter Measuring Conceivable Security Threats on Smart Healthcare Devices. IEEE Access 6: 20722-20733 (2018) - [j14]Ayesha Siddiqa, Munam Ali Shah, Hasan Ali Khattak, Adnan Akhunzada, Ihsan Ali, Zaidi Bin Razak, Abdullah Gani:
Social Internet of Vehicles: Complexity, Adaptivity, Issues and Beyond. IEEE Access 6: 62089-62106 (2018) - [j13]Omair Ahmad Khan, Munam Ali Shah, Ikram Ud Din, Byung-Seo Kim, Hasan Ali Khattak, Joel J. P. C. Rodrigues, Haleem Farman, Bilal Jan:
Leveraging Named Data Networking for Fragmented Networks in Smart Metropolitan Cities. IEEE Access 6: 75899-75911 (2018) - [j12]Abdul Wahid, Munam Ali Shah, Faisal Fayyaz Qureshi, Hafsa Maryam, Rahat Iqbal, Victor I. Chang:
Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks. Future Gener. Comput. Syst. 86: 1301-1320 (2018) - [j11]Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, Munam Ali Shah, Faheem Khan, Ihsan Ali:
NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks. EAI Endorsed Trans. Mob. Commun. Appl. 4(13): e6 (2018) - [j10]Abdulaziz Aldegheishem, Humera Yasmeen, Hafsa Maryam, Munam Ali Shah, Amjad Mehmood, Nabil Ali Alrajeh, Houbing Song:
Smart Road Traffic Accidents Reduction Strategy Based on Intelligent Transportation Systems (TARS). Sensors 18(7): 1983 (2018) - [j9]Ikram Ullah, Munam Ali Shah, Abdul Wahid, Amjad Mehmood, Houbing Song:
ESOT: a new privacy model for preserving location privacy in Internet of Things. Telecommun. Syst. 67(4): 553-575 (2018) - [c68]Shiza Hasan, Muhammad Awais, Munam Ali Shah:
Full Disk Encryption: A Comparison on Data Management Attributes. ICISDM 2018: 39-43 - [c67]Saba Arshad, Hafsa Maryam, Humera Yasmeen, Munam Ali Shah:
Complex Adaptive Systems: A Data Modelling and Engineering Perspective. ICISDM 2018: 44-48 - [c66]Bushra Zaheer Abbasi, Shahid Hussain, Shaista Bibi, Munam Ali Shah:
Impact of Membership and Non-membership Features on Classification Decision: An Empirical Study for Appraisal of Feature Selection Methods. ICAC 2018: 1-6 - [c65]Syed Muhammad Abdullah, Munam Ali Shah:
Internet of Things - Security threats and challenges in M2M Devices. ICAC 2018: 1-7 - [c64]Waqar Ali, Tanveer Ahmad, Zobia Rehman, Anwar Ur Rehman, Munam Ali Shah, Ansar Abbas, Ghulam Dustgeer:
A Novel Framework for Plagiarism Detection: A Case Study for Urdu Language. ICAC 2018: 1-6 - [c63]Muhammad Farhan Ali, Munam Ali Shah:
Adaptive Transmission Power - Geographical and Energy Aware Routing Algorithm for Wireless Sensor Networks. ICAC 2018: 1-5 - [c62]Umair Amin, Munam Ali Shah:
A Novel Authentication and Security Protocol for Wireless Adhoc Networks. ICAC 2018: 1-5 - [c61]Shaista Bibi, Munam Ali Shah, Bushra Zaheer Abbasi, Shahid Hussain:
A methodology to characterize and compute correlation between traffic congestion and health issues via social media. ICAC 2018: 1-6 - [c60]Umer Asghar Chattha, Munam Ali Shah:
Survey on Causes of Motion Sickness in Virtual Reality. ICAC 2018: 1-5 - [c59]Bilal Khalid Dar, Munam Ali Shah, Huniya Shahid, Fizzah Fizzah, Zunaira Amjad:
An Architecture for Fog Computing Enabled Emergency Response and Disaster Management System (ERDMS). ICAC 2018: 1-6 - [c58]Wajeeha Hamid, Munam Ali Shah:
AWS Support in Open Source Mano Monitoring Module. ICAC 2018: 1-6 - [c57]Ch Anwar ul Hassan, Rizwana Irfan, Munam Ali Shah:
Integrated Architecture of Data Warehouse with Business Intelligence Technologies. ICAC 2018: 1-6 - [c56]C. H. Anwar ul Hassan, Muhammad Sufyan Khan, Munam Ali Shah:
Comparison of Machine Learning Algorithms in Data classification. ICAC 2018: 1-6 - [c55]Muhammad Sufyan Khan, Ch Anwar ul Hassan, Munam Ali Shah, Azra Shamim:
Software Cost and Effort Estimation using a New Optimization Algorithm Inspired by Strawberry Plant. ICAC 2018: 1-6 - [c54]Omair Ahmad Khan, Munam Ali Shah, Muhammad Salman, Abdul Hannan, M. Haris, Tayyab Khan, Nouman Ejaz:
NDN Based Communication for Fragmented Network: The Case of Smart Metropolitan (MAN). ICAC 2018: 1-6 - [c53]Fehda Malik, Munam Ali Shah, Hasan Ali Khattak:
Intelligent Transport System: An Important Aspect of Emergency Management in Smart Cities. ICAC 2018: 1-6 - [c52]Maham Qayyum, Wajeeha Hamid, Munam Ali Shah:
Performance Analysis of Snort using Network Function Virtualization. ICAC 2018: 1-6 - [c51]Rida Rashid, Munam Ali Shah:
EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features. ICAC 2018: 1-6 - [c50]Anwar Ur Rehman, Zobia Rehman, Junaid Akram, Waqar Ali, Munam Ali Shah, Muhammad Salman:
Statistical Topic Modeling for Urdu Text Articles. ICAC 2018: 1-6 - [c49]Mujeeb ur Rehman, Munam Ali Shah, Muhammad Khan, Shaheed Ahmad:
A VANET based Smart Car Parking System to Minimize Searching Time, Fuel Consumption and CO2 Emission. ICAC 2018: 1-6 - [c48]Muhammad Azeem Sarwar, Nasir Kamal, Wajeeha Hamid, Munam Ali Shah:
Prediction of Diabetes Using Machine Learning Algorithms in Healthcare. ICAC 2018: 1-6 - [c47]Pir Masoom Shah, Adnan Zeb, Uferah Shafi, Syed Farhan Alam Zaidi, Munam Ali Shah:
Detection of Parkinson Disease in Brain MRI using Convolutional Neural Network. ICAC 2018: 1-6 - [c46]Huniya Shahid, Munam Ali Shah, Bilal Khalid Dar, Fizzah Fizzah:
A Review of Smartphone's Text Entry for Visually Impaired. ICAC 2018: 1-7 - [c45]Hafsa Arshad, Munam Ali Shah, Hasan Ali Khattak, Zoobia Ameer, Assad Abbas, Samee Ullah Khan:
Evaluating Bio-Inspired Optimization Techniques for Utility Price Estimation in Fog Computing. SmartCloud 2018: 84-89 - [c44]Saba Ameer, Munam Ali Shah:
Exploiting Big Data Analytics for Smart Urban Planning. VTC Fall 2018: 1-5 - 2017
- [j8]Rushan Arshad, Saman Zahoor, Munam Ali Shah, Abdul Wahid, Hongnian Yu:
Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond. IEEE Access 5: 15667-15681 (2017) - [c43]Sahrish Khan Tayyaba, Munam Ali Shah, Omair Ahmad Khan, Abdul Wahab Ahmed:
Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead. ICFNDS 2017: 15:1-15:8 - [c42]Bushra Zaheer Abbasi, Munam Ali Shah:
Fog computing: Security issues, solutions and robust practices. ICAC 2017: 1-6 - [c41]Zain Ul Abideen, Munam Ali Shah:
An IoT based robust healthcare model for continuous health monitoring. ICAC 2017: 1-6 - [c40]Muhammad Waseem Akram, Muhammad Salman, Munam Ali Shah, Mian Muhammad Ahmed:
A review: Security challenges in cognitive radio networks. ICAC 2017: 1-6 - [c39]Waqar Ali, Ghulam Dustgeer, Muhammad Awais, Munam Ali Shah:
IoT based smart home: Security challenges, security requirements and solutions. ICAC 2017: 1-6 - [c38]Syed Arslan Ali, Munam Ali Shah, Taimoor Ahmed Javed, Syed Muhammad Abdullah, Maham Zafar:
Iris recognition system in smartphones using light version (LV) recognition algorithm. ICAC 2017: 1-6 - [c37]Muhammad Usman Atif, Munam Ali Shah:
OptiSEC: In search of an optimal sensor cloud architecture. ICAC 2017: 1-6 - [c36]Muhammad Awais, Munam Ali Shah:
Information-centric networking: A review on futuristic networks. ICAC 2017: 1-5 - [c35]Tamour Bilal, Zafar Faiz, Munam Ali Shah:
Software defined networks: An analysis on robust security practices. ICAC 2017: 1-5 - [c34]Muhammad Junaid, Munam Ali Shah, Imran Abbas Satti:
A survey of internet of things, enabling technologies and protocols. ICAC 2017: 1-5 - [c33]Rashid Kamal, Munam Ali Shah, Asad Hanif, Jamil Ahmad:
Real-time opinion mining of Twitter data using spring XD and Hadoop. ICAC 2017: 1-4 - [c32]Rashid Kamal, Munam Ali Shah, Nashmiya Hafeez, Asad Hanif:
Enhanced user preference based intelligent scheduling algorithm (E-UPISA). ICAC 2017: 1-6 - [c31]Mahnoor Khan, Munam Ali Shah:
Inter-process communication, MPI and MPICH in microkernel environment: A comparative analysis. ICAC 2017: 1-7 - [c30]Hussain Ahmad Madni, Zahid Anwar, Munam Ali Shah:
Data mining techniques and applications - A decade review. ICAC 2017: 1-7 - [c29]Fehda Malik, Munam Ali Shah:
Smart city: A roadmap towards implementation. ICAC 2017: 1-6 - [c28]Anwar Ur Rehman, Muhammad Awais, Munam Ali Shah:
Authentication analysis using input gestures in touch-based mobile devices. ICAC 2017: 1-5 - [c27]Mujeeb ur Rehman, Munam Ali Shah:
A smart parking system to minimize searching time, fuel consumption and CO2 emission. ICAC 2017: 1-6 - [c26]Maham Tariq, Munam Ali Shah:
Review of model-free gait recognition in biometrie systems. ICAC 2017: 1-7 - [c25]Abdul Wahid, Ikram Ullah, Omair Ahmad Khan, Abdul Wahab Ahmed, Munam Ali Shah:
A new cross layer MAC protocol for data forwarding in underwater acoustic sensor networks. ICAC 2017: 1-5 - [c24]Asma Zahra, Munam Ali Shah:
IoT based ransomware growth rate evaluation and detection using command and control blacklisting. ICAC 2017: 1-6 - [c23]Urooj Zehra, Munam Ali Shah:
A survey on resource allocation in software defined networks (SDN). ICAC 2017: 1-6 - [c22]Asma Haroon, Sana Akram, Munam Ali Shah, Abdul Wahid:
E-Lithe: A Lightweight Secure DTLS for IoT. VTC Fall 2017: 1-5 - [c21]Humera Yasmeen, Omair Ahmad Khan, Abdul Wahid, Munam Ali Shah:
A Novel Delay Constraint Location Privacy Scheme in VANETs. VTC Fall 2017: 1-5 - 2016
- [j7]Munam Ali Shah, Sijing Zhang, Muhammad Kamran, Qaisar Javaid, Bahjat Fatima:
A survey on MAC protocols for complex self-organizing cognitive radio networks. Complex Adapt. Syst. Model. 4: 18 (2016) - [j6]Munam Ali Shah, Sijing Zhang, Muhammad Kamran, Qaisar Javaid, Bahjat Fatima:
Erratum to: A survey on MAC protocols for complex self-organizing cognitive radio networks. Complex Adapt. Syst. Model. 4: 26 (2016) - [j5]Syeda Mariam Muzammal, Munam Ali Shah, Sijing Zhang, Hongji Yang:
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices. Int. J. Autom. Comput. 13(4): 350-363 (2016) - [c20]Faisal Rehman, Sana Akram, Munam Ali Shah:
The framework for efficient passphrase-based multifactor authentication in cloud computing. ICAC 2016: 37-41 - [c19]Muhammad Ilyas, Qaisar Javaid, Munam Ali Shah:
Use of Symmetric Multiprocessor Architecture to achieve high performance computing. ICAC 2016: 42-47 - [c18]Junaid Ali Khan, Munam Ali Shah:
Car Number Plate Recognition (CNPR) system using multiple template matching. ICAC 2016: 290-295 - [c17]Syeda Mariam Muzammal, Munam Ali Shah:
ScreenStealer: Addressing Screenshot attacks on Android devices. ICAC 2016: 336-341 - [c16]Waleed Rafique, Munam Ali Shah:
Performance evaluation of IoT network infrastructure. ICAC 2016: 348-353 - [c15]Daifur Abubakar Girei, Munam Ali Shah, Muhammad Bilal Shahid:
An enhanced botnet detection technique for mobile devices using log analysis. ICAC 2016: 450-455 - [c14]Muhammad Salman, Muhammad Asif Aziz, Munam Ali Shah:
Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks. ICAC 2016: 516-521 - [c13]Abdul Waheed, Munam Ali Shah, Abid Khan:
Secure login protocols: An analysis on modern attacks and solutions. ICAC 2016: 535-541 - [c12]Ikram Ullah, Munam Ali Shah:
A novel model for preserving Location Privacy in Internet of Things. ICAC 2016: 542-547 - [c11]Muhammad Rehman Zafar, Munam Ali Shah:
Fingerprint authentication and security risks in smart devices. ICAC 2016: 548-553 - [c10]Muhammad Hassam Khan, Munam Ali Shah:
Survey on security threats of smartphones in Internet of Things. ICAC 2016: 560-566 - [c9]Waseem Akram, Munam Ali Shah:
Online Signature Verification: A Survey on Authentication in Smartphones. UNet 2016: 471-480 - 2015
- [j4]Bahjat Fatima, Munam Ali Shah:
Self organization based energy management techniques in mobile complex networks: a review. Complex Adapt. Syst. Model. 3: 2 (2015) - [j3]Abdul Majeed, Munam Ali Shah:
Energy efficiency in big data complex systems: a comprehensive survey of modern energy saving techniques. Complex Adapt. Syst. Model. 3: 6 (2015) - [c8]Munam Ali Shah, Naila Naheed, Sijing Zhang:
Energy efficiency in smartphones: A survey on modern tools and techniques. ICAC 2015: 1-6 - [c7]Munam Ali Shah, Muhammad Bilal Shahid, Sijing Zhang, Safi Mustafa, Mushahid Hussain:
Organization Based Intelligent Process Scheduling Algorithm (OIPSA). ICAC 2015: 1-6 - 2014
- [j2]Munam Ali Shah, Sijing Zhang, Carsten Maple:
Erratum to: An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks. Int. J. Autom. Comput. 11(1): 118 (2014) - [c6]Munam Ali Shah, Irfan Azam, Muhammad Qasim Khan, Sijing Zhang:
Enhanced micro-TCB approach for smartphone security. ICAC 2014: 301-305 - 2013
- [j1]Munam Ali Shah, Sijing Zhang, Carsten Maple:
An Analysis on Decentralized Adaptive MAC Protocols for Cognitive Radio Networks. Int. J. Autom. Comput. 10(1): 46-52 (2013) - [c5]Munam Ali Shah, Sijing Zhang, Carsten Maple:
Cognitive radio networks for Internet of Things: Applications, challenges and future. ICAC 2013: 1-6 - [c4]Omair Shah, Sijing Zhang, Carsten Maple, Munam Ali Shah:
A novel symmetric key cryptographic authentication for cooperative communication in cognitive radio networks. ICAC 2013: 1-5 - [c3]Munam Ali Shah, Sijing Zhang, Carsten Maple:
Control channel etiquettes: Implementation and evaluation of a hybrid approach for cognitive radio networks. PIMRC 2013: 1823-1828 - 2012
- [c2]Naveed Ahmed, Munam Ali Shah, Sijing Zhang:
Efficient Deployment of Relay Stations in IEEE802.16m for Cost Effective Performance. ANT/MobiWIS 2012: 992-997 - 2011
- [c1]Munam Ali Shah, Ghazanfar Ali Safdar, Carsten Maple, Khurram Sardar:
Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET. FIT 2011: 57-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint