default search action
Zahid Anwar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Memoona Sadaf, Zafar Iqbal, Zahid Anwar, Umara Noor, Mohammad Imran, Thippa Reddy Gadekallu:
A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic. Veh. Commun. 46: 100741 (2024) - 2023
- [j36]Uferah Shafi, Rafia Mumtaz, Zahid Anwar, Muhammad Muzyyab Ajmal, Muhammad Ajmal Khan, Zahid Mahmood, Maqsood Qamar, Hafiz Muhammad Jhanzab:
Tackling Food Insecurity Using Remote Sensing and Machine Learning-Based Crop Yield Prediction. IEEE Access 11: 108640-108657 (2023) - [j35]Sara Qamar, Zahid Anwar, Mehreen Afzal:
A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Comput. Secur. 128: 103127 (2023) - [j34]Hafiz Farooq Ahmad, Wajid Rafique, Raihan Ur Rasool, Abdulaziz Alhumam, Zahid Anwar, Junaid Qadir:
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review. Comput. Sci. Rev. 48: 100558 (2023) - [j33]Raihan Ur Rasool, Hafiz Farooq Ahmad, Wajid Rafique, Adnan Qayyum, Junaid Qadir, Zahid Anwar:
Quantum Computing for Healthcare: A Review. Future Internet 15(3): 94 (2023) - [j32]Asad Waqar Malik, Zahid Anwar, Anis Ur Rahman:
A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles. IEEE Internet Things J. 10(10): 8348-8356 (2023) - [j31]Kadhim Hayawi, Zahid Anwar, Asad W. Malik, Zouheir Trabelsi:
Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities. IEEE Internet Things J. 10(21): 18941-18950 (2023) - [c25]Sarah Shafqat, Zahid Anwar, Qaisar Javaid, Hafiz Farooq Ahmad:
A Unified Deep Learning Diagnostic Architecture for Big Data Healthcare Analytics. ISADS 2023: 1-8 - 2022
- [j30]Syed Saqib Ali Kazmi, Mehreen Ahmed, Rafia Mumtaz, Zahid Anwar:
Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation. Comput. J. 65(2): 155-176 (2022) - [j29]Zillah Adahman, Asad Waqar Malik, Zahid Anwar:
An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Comput. Secur. 122: 102911 (2022) - [c24]Mahshad Shariatnasab, Farhad Shirani, Zahid Anwar:
Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks. ISIT 2022: 2862-2867 - [i2]Mahshad Shariatnasab, Farhad Shirani, Zahid Anwar:
Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks. CoRR abs/2202.05895 (2022) - 2021
- [j28]Raihan Ur Rasool, Khandakar Ahmed, Zahid Anwar, Hua Wang, Usman Ashraf, Wajid Rafique:
CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks. Int. J. Intell. Syst. 36(8): 3852-3879 (2021) - [j27]Syed Luqman Shah, Irshad Ahmed Abbasi, Gasm Elseed Ibrahim Mohamed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, Maria Riaz:
TAMEC: Trusted Augmented Mobile Execution on Cloud. Sci. Program. 2021: 5542852:1-5542852:8 (2021) - 2020
- [j26]Umara Noor, Zahid Anwar, Jörn Altmann, Zahid Rashid:
Customer-oriented ranking of cyber threat intelligence service providers. Electron. Commer. Res. Appl. 41: 100976 (2020) - [j25]Zafar Iqbal, Zahid Anwar:
SCERM - A novel framework for automated management of cyber threat response activities. Future Gener. Comput. Syst. 108: 687-708 (2020) - [j24]Raihan Ur Rasool, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar, Wajid Rafique:
A survey of link flooding attacks in software defined network ecosystems. J. Netw. Comput. Appl. 172: 102803 (2020)
2010 – 2019
- 2019
- [j23]Raihan Ur Rasool, Usman Ashraf, Khandakar Ahmed, Hua Wang, Wajid Rafique, Zahid Anwar:
Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks. IEEE Access 7: 34885-34899 (2019) - [j22]Murk, Asad Waqar Malik, Imran Mahmood, Nadeem Ahmed, Zahid Anwar:
Big Data in Motion: A Vehicle-Assisted Urban Computing Framework for Smart Cities. IEEE Access 7: 55951-55965 (2019) - [j21]Umara Noor, Zahid Anwar, Asad Waqar Malik, Sharifullah Khan, Shahzad Saleem:
A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories. Future Gener. Comput. Syst. 95: 467-487 (2019) - [j20]Umara Noor, Zahid Anwar, Tehmina Amjad, Kim-Kwang Raymond Choo:
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Gener. Comput. Syst. 96: 227-242 (2019) - [j19]Raihan Ur Rasool, Maleeha Najam, Hafiz Farooq Ahmad, Hua Wang, Zahid Anwar:
A novel JSON based regular expression language for pattern matching in the internet of things. J. Ambient Intell. Humaniz. Comput. 10(4): 1463-1481 (2019) - 2018
- [j18]Asad Waqar Malik, Raihan Ur Rasool, Zahid Anwar, Shahid Nawaz:
A generic framework for application streaming service. Comput. Electr. Eng. 66: 149-161 (2018) - [j17]Imran Khan, Habib-ur Rehman, Mohammad Hussein Fayiz Al-khatib, Zahid Anwar, Masoom Alam:
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds. Future Gener. Comput. Syst. 89: 239-248 (2018) - [j16]Imran Khan, Zahid Anwar, Behzad Bordbar, Eike Ritter, Habib-ur Rehman:
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds. IEEE Trans. Cloud Comput. 6(4): 942-954 (2018) - [c23]Yumna Ghazi, Zahid Anwar, Rafia Mumtaz, Shahzad Saleem, Ali Tahir:
A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources. FIT 2018: 129-134 - [c22]Zafar Iqbal, Zahid Anwar, Rafia Mumtaz:
STIXGEN - A Novel Framework for Automatic Generation of Structured Cyber Threat Information. FIT 2018: 241-246 - 2017
- [j15]Mujahid Mohsin, Muhammad Usama Sardar, Osman Hasan, Zahid Anwar:
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things. IEEE Access 5: 5494-5505 (2017) - [j14]Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67: 35-58 (2017) - [j13]Mujahid Mohsin, Zahid Anwar, Farhat Zaman, Ehab Al-Shaer:
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. Comput. Secur. 70: 199-223 (2017) - [j12]Asad Waqar Malik, Kashif Bilal, Saif Ur Rehman Malik, Zahid Anwar, Khurram Aziz, Dzmitry Kliazovich, Nasir Ghani, Samee U. Khan, Rajkumar Buyya:
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++. IEEE Trans. Serv. Comput. 10(4): 506-519 (2017) - [c21]Hussain Ahmad Madni, Zahid Anwar, Munam Ali Shah:
Data mining techniques and applications - A decade review. ICAC 2017: 1-7 - 2016
- [j11]Hira Asghar, Zahid Anwar, Khalid Latif:
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms. Comput. Secur. 58: 63-82 (2016) - [j10]Usman Shaukat, Ejaz Ahmed, Zahid Anwar, Feng Xia:
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. J. Netw. Comput. Appl. 62: 18-40 (2016) - [j9]Usman Shaukat, Zahid Anwar:
A fast and scalable technique for constructing multicast routing trees with optimized quality of service using a firefly based genetic algorithm. Multim. Tools Appl. 75(4): 2275-2301 (2016) - [c20]Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). CNS 2016: 180-188 - [c19]Mujahid Mohsin, Zahid Anwar:
Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics. FIT 2016: 23-28 - 2015
- [j8]Saman Iftikhar, Muhammad Kamran, Zahid Anwar:
A survey on reversible watermarking techniques for relational databases. Secur. Commun. Networks 8(15): 2580-2603 (2015) - [j7]Zahid Anwar, Waqas Ahmad Khan:
Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. Secur. Commun. Networks 8(16): 2813-2825 (2015) - [j6]Naila Karim, Khalid Latif, Zahid Anwar, Sharifullah Khan, Amir Hayat:
Storage schema and ontology-independent SPARQL to HiveQL translation. J. Supercomput. 71(7): 2694-2719 (2015) - [j5]Saman Iftikhar, Muhammad Kamran, Zahid Anwar:
RRW - A Robust and Reversible Watermarking Technique for Relational Data. IEEE Trans. Knowl. Data Eng. 27(4): 1132-1145 (2015) - 2014
- [j4]Abdul Razzaq, Zahid Anwar, Hafiz Farooq Ahmad, Khalid Latif, Rana Faisal Munir:
Ontology for attack detection: An intelligent approach to web application security. Comput. Secur. 45: 124-146 (2014) - [j3]Zahid Anwar, Asad Waqar Malik:
Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies. IEEE Commun. Lett. 18(7): 1175-1178 (2014) - [j2]Abdul Razzaq, Khalid Latif, Hafiz Farooq Ahmad, Ali Hur, Zahid Anwar, Peter Charles Bloodsworth:
Semantic security against web application attacks. Inf. Sci. 254: 19-38 (2014) - [c18]Ubaid Ur Rehman, Amir Ali, Zahid Anwar:
secCloudSim: Secure Cloud Simulator. FIT 2014: 208-213 - 2013
- [c17]Sidra Shahbaz, Asiah Mahmood, Zahid Anwar:
SOAD: Securing Oncology EMR by Anonymizing DICOM Images. FIT 2013: 125-130 - [c16]Umara Noor, Zahid Anwar, Yasir Mehmood, Waseem Aslam:
TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks. FIT 2013: 223-228 - [c15]Mohsin Ikram, Qurrat-Ul-Ain Babar, Zahid Anwar, Asad Waqar Malik:
GSAN: Green Cloud-Simulation for Storage Area Networks. FIT 2013: 265-270 - 2011
- [c14]Imran Khan, Habib-ur Rehman, Zahid Anwar:
Design and Deployment of a Trusted Eucalyptus Cloud. IEEE CLOUD 2011: 380-387 - [c13]Zafarullah, Faiza Anwar, Zahid Anwar:
Digital Forensics for Eucalyptus. FIT 2011: 110-116 - [c12]Rana Khattak, Shehar Bano, Shujaat Hussain, Zahid Anwar:
DOFUR: DDoS Forensics Using MapReduce. FIT 2011: 117-120 - [c11]Rahat Masood, Um-e-Ghazia, Zahid Anwar:
SWAM: Stuxnet Worm Analysis in Metasploit. FIT 2011: 142-147 - [c10]Mohammad Ali, Humayun Ali, Zahid Anwar:
Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An Improvement. FIT 2011: 148-153 - [c9]Muhammad Afzal, Maqbool Hussain, Mahmood Ahmad, Zahid Anwar:
Trusted Framework for Health Information Exchange. FIT 2011: 308-313
2000 – 2009
- 2009
- [j1]Zahid Anwar, Mirko Montanari, Alejandro Gutierrez, Roy H. Campbell:
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures. Int. J. Crit. Infrastructure Prot. 2(1-2): 13-25 (2009) - [c8]Zahid Anwar, Zhiguo Wang, Chun Wang, Dan Ni, Yaofeng Xu, Yuhong Yan:
An Integer Programming Model and Heuristic Algorithm for Automatic Scheduling in Synchrotron Facilities. SMC 2009: 4048-4053 - 2008
- [b1]Zahid Anwar:
Automatic Security Assessment of Control Systems for Critical Cyber -Infrastructures. University of Illinois Urbana-Champaign, USA, 2008 - [c7]Zahid Anwar, Ravinder Shankesi, Roy H. Campbell:
Automatic security assessment of critical cyber-infrastructures. DSN 2008: 366-375 - [c6]Zahid Anwar, Roy H. Campbell:
Automated Assessment Of Compliance With Security Best Practices. Critical Infrastructure Protection 2008: 173-187 - 2007
- [c5]Zahid Anwar, Roy H. Campbell:
Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines. PerCom Workshops 2007: 477-482 - 2006
- [c4]Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell:
Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006 - 2005
- [c3]Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell:
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. ITCC (2) 2005: 205-213 - [c2]Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell:
A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502 - [c1]Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell:
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. MobiQuitous 2005: 192-201 - [i1]Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell:
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut. CoRR abs/cs/0509095 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint