Search

Your search keyword '"Khan, Farrukh Aslam"' showing total 104 results

Search Constraints

Start Over You searched for: Author "Khan, Farrukh Aslam" Remove constraint Author: "Khan, Farrukh Aslam" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
104 results on '"Khan, Farrukh Aslam"'

Search Results

9. FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.

21. Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.

26. BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.

32. Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids.

34. A Smart Sensors-Based Solar-Powered System to Monitor and Control Tube Well for Agriculture Applications.

37. Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT.

38. CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.

39. Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.

40. DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.

41. Formal Verification of Hardware Components in Critical Systems.

42. Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks.

43. Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis.

44. Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.

45. Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.

46. Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.

49. Network intrusion detection using hybrid binary PSO and random forests algorithm.

Catalog

Books, media, physical & digital resources