Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, Arizona
Verified email at - Homepage
Cited by
Cited by
Encyclopedia of multimedia technology and networking
M Pagani
IGI Global, 2008
A survey of information security risk analysis methods
A Behnia, R Abd Rashid, JA Chaudhry
SmartCR 2 (1), 79-94, 2012
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song
IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020
Security and privacy based access control model for internet of connected vehicles
MA Habib, M Ahmad, S Jabbar, S Khalid, J Chaudhry, K Saleem, ...
Future Generation Computer Systems 97, 687-696, 2019
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74 (10), 5171-5186, 2018
U-kitchen: application scenario
JA Ali, WS Yoon, JH Kim, WD Cho
Software Technologies for Future Embedded and Ubiquitous Systems, 2004 …, 2004
Entity data management in OKKAM
T Palpanas, J Chaudhry, P Andritsos, Y Velegrakis
2008 19th International Workshop on Database and Expert Systems Applications …, 2008
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
Security in graphical authentication
RG Rittenhouse, JA Chaudry, M Lee
International Journal of Security and Its Applications 7 (3), 347-356, 2013
A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion
F Riaz, S Khadim, R Rauf, M Ahmad, S Jabbar, J Chaudhry
Computer Networks 143, 62-73, 2018
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE
R Arul, G Raja, AK Bashir, J Chaudry, A Ali
IEEE Transactions on Industrial Informatics 14 (6), 2677-2689, 2018
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures
W Yang, S Wang, G Zheng, J Chaudhry, C Valli
The Journal of Supercomputing, 1-17, 2018
Application of machine learning and image processing for detection of breast cancer
M Kashif, KR Malik, S Jabbar, J Chaudhry
Innovation in health informatics, 145-162, 2020
Designing an energy-aware mechanism for lifetime improvement of wireless sensor networks: a comprehensive study
S Jabbar, M Ahmad, KR Malik, S Khalid, J Chaudhry, O Aldabbas
Mobile Networks and Applications 23 (3), 432-445, 2018
Network performance enhancement of multi-sink enabled low power lossy networks in SDN based Internet of Things
G Shabbir, A Akram, MM Iqbal, S Jabbar, M Alfawair, J Chaudhry
International Journal of Parallel Programming 48 (2), 367-398, 2020
A review on wireless sensor networks routing protocol: Challenge in energy perspective
A Ismail, AN Md, NO Syaril, C Junaid
Scientific Research and Essays 6 (26), 5628-5649, 2011
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems
U Qidwai, J Chaudhry, S Jabbar, HMA Zeeshan, N Janjua, S Khalid
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4085-4097, 2019
Sinkhole vulnerabilities in wireless sensor networks
A Dhabi
International Journal of Security and Its Applications 8 (1), 401-410, 2014
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
C Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli
Local Computer Networks, 121-127, 2017
The system can't perform the operation now. Try again later.
Articles 1–20