A new ensemble-based intrusion detection system for internet of things A Abbas, MA Khan, S Latif, M Ajaz, AA Shah, J Ahmad Arabian Journal for Science and Engineering, 1-15, 2022 | 94 | 2022 |
A deep learning-based intrusion detection system for MQTT enabled IoT MA Khan, MA Khan, SU Jan, J Ahmad, SS Jamal, AA Shah, N Pitropakis, ... Sensors 21 (21), 7016, 2021 | 72 | 2021 |
Voting classifier-based intrusion detection for iot networks MA Khan, MA Khan Khattk, S Latif, AA Shah, M Ur Rehman, W Boulila, ... Advances on Smart and Soft Computing: Proceedings of ICACIn 2021, 313-328, 2022 | 52 | 2022 |
Intrusion detection using machine learning techniques: an experimental comparison KA Tait, JS Khan, F Alqahtani, AA Shah, FA Khan, MU Rehman, W Boulila, ... 2021 International Congress of Advanced Technology and Engineering (ICOTEN …, 2021 | 31 | 2021 |
A qualitative cross-comparison of emerging technologies for software-defined systems AA Shah, G Piro, LA Grieco, G Boggia 2019 Sixth International Conference on Software Defined Systems (SDS), 138-145, 2019 | 23 | 2019 |
A Review of Forwarding Strategies in Transport Software-Defined Networks AA Shah, G Piro, LA Grieco, G Boggia Proc. of IEEE Workshop on SDN-NFV Challenges and Solutions, in conjunction …, 2020 | 19 | 2020 |
A quantitative cross‐comparison of container networking technologies for virtualized service infrastructures in local computing environments A Aziz Shah, G Piro, L Alfredo Grieco, G Boggia Transactions on Emerging Telecommunications Technologies, e4234, 2021 | 18 | 2021 |
An efficient lightweight image encryption scheme using multichaos A Ullah, AA Shah, JS Khan, M Sajjad, W Boulila, A Akgul, J Masood, ... Security and Communication Networks 2022, 2022 | 9 | 2022 |
Dynamic Management of Forwarding Rules in a T-SDN Architecture with Energy and Bandwidth Constraints A Petrosino, G Sciddurlo, G Grieco, AA Shah, G Piro, LA Grieco, G Boggia Proc. of IEEE International Conference on Ad Hoc Networks and Wireless …, 2020 | 7 | 2020 |
A user behavior analytics (uba)-based solution using lstm neural network to mitigate ddos attack in fog and cloud environment F Nocera, S Demilito, P Ladisa, M Mongiello, AA Shah, J Ahmad, ... 2022 2nd International Conference of Smart Systems and Emerging Technologies …, 2022 | 4 | 2022 |
A Survey of Energy Optimization Approaches for Computational Task Offloading and Resource Allocation in MEC Networks J Yang, AA Shah, D Pezaros Electronics 12 (17), 3548, 2023 | 3 | 2023 |
Accelerated gpu based protein sequence alignment–an optimized database sequences approach MS Amin, L Hassan, AA Shah, U Akbar, HA Niaz IJCSNS 17 (10), 231, 2017 | 3 | 2017 |
A Real-time Simulation Framework for Complex and Large-scale Optical Transport Networks based on the SDN Paradigm AA Shah, M Mussini, F Nicassio, G Parladori, F Triggiani, G Grieco, ... Proc. of IEEE/ACM International Symposium on Distributed Simulation and Real …, 2020 | 2 | 2020 |
A Software-Defined Networking based Simulation Framework for Internet of Space Things AA Shah 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 1-4, 2023 | 1 | 2023 |
A novel chaos-based light-weight image encryption scheme for multi-modal hearing aids AA Shah, A Adeel, J Ahmad, A Al-Dubai, M Gogate, A Bishnu, M Diyan, ... 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-6, 2022 | 1 | 2022 |
The Role of 6G and Beyond on the Road to Net-Zero Carbon MA Imran, A Taha, S Ansari, M Usman, QH Abbasi Institution of Engineering and Technology (IET), 2023 | | 2023 |
Cyber-Attack Mitigation in Cloud-Fog Environment Using an Ensemble Machine Learning Model F Nocera, S Abascià, M Fiore, AA Shah, M Mongiello, E Di Sciascio, ... 2022 7th International Conference on Smart and Sustainable Technologies …, 2022 | | 2022 |
Voting Classifier-based Intrusion Detection for IoT Networks M Almas Khan, MA Khan, S Latif, A Aziz Shah, MU Rehman, W Boulila, ... arXiv e-prints, arXiv: 2104.10015, 2021 | | 2021 |