Your selections:
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
A lightweight cyber security framework with context-awareness for pervasive computing environments
- Al-Muhtadi, Jalal, Saleem, Kashif, Al-Rabiaah, Sumaya, Imran, Muhammad, Gawanmeh, Amjad, Rodrigues, Joel
A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs
- Bada, Mousaab, Boubiche, Djallel, Lagraa, Nasreddine, Kerrache, Chaker, Imran, Muhammad, Shoaib, Muhammad
Traffic accident detection and condition analysis based on social networking data
- Ali, Farman, Ali, Amjad, Imran, Muhammad, Naqvi, Rizwan, Siddiqi, Muhammad, Kwak, Kyung-Sup
An efficient caching policy for content retrieval in autonomous connected vehicles
- Rahim, Muddasir, Javed, Muhammad, Alvi, Alvi, Imran, Muhammad
Blockchain for cloud exchange : a survey
- Xie, Shaoan, Zheng, Zibin, Chen, Weili, Wu, Jiajing, Dai, Hong-Ning, Imran, Muhammad
Cloud-assisted gamification for education and learning – recent advances and challenges
- Hakak, Saqib, Noor, Nurul, Ayub, Mohamad, Affal, Hannyzurra, Imran, Muhammad
Mobile crowd sensing – taxonomy, applications, challenges, and solutions
- Boubiche, Djallel, Imran, Muhammad, Maqsood, Aneela, Shoaib, Muhammad
- Imran, Muhammad, Bakhsh, Sheikh, Tahir, Sabeen, Basheri, Mohammed, Shoaib, Muhammad
Managing big RDF data in clouds : challenges, opportunities, and solutions
- Elzein, Nahla, Majid, Mazlina, Hashem, Ibaker, Yaqoob, Ibrar, Alaba, Fadele, Imran, Muhammad
Cloud robotics in smart manufacturing environments : challenges and countermeasures
- Yan, Hehua, Hua, Qingsong, Wang, Yingying, Wei, Wenguo, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?