A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020 | 108 | 2020 |
A survey of information security risk analysis methods A Behnia, R Abd Rashid, JA Chaudhry SmartCR 2 (1), 79-94, 2012 | 99 | 2012 |
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli IEEE Access 6, 36939-36947, 2018 | 77 | 2018 |
A security review of local government using NIST CSF: a case study A Ibrahim, C Valli, I McAteer, J Chaudhry The Journal of Supercomputing 74, 5171-5186, 2018 | 75 | 2018 |
Security and privacy based access control model for internet of connected vehicles MA Habib, M Ahmad, S Jabbar, S Khalid, J Chaudhry, K Saleem, ... Future Generation Computer Systems 97, 687-696, 2019 | 60 | 2019 |
Risk analysis of cloud sourcing in healthcare and public health industry H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ... IEEE Access 6, 19140-19150, 2018 | 45 | 2018 |
Encyclopedia of multimedia technology and networking M Pagani IGI Global, 2008 | 40 | 2008 |
Application of machine learning and image processing for detection of breast cancer M Kashif, KR Malik, S Jabbar, J Chaudhry Innovation in Health Informatics, 145-162, 2020 | 36 | 2020 |
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE R Arul, G Raja, AK Bashir, J Chaudry, A Ali IEEE Transactions on Industrial Informatics 14 (6), 2677-2689, 2018 | 34 | 2018 |
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures W Yang, S Wang, G Zheng, J Chaudhry, C Valli The Journal of Supercomputing, 1-17, 2018 | 32 | 2018 |
A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion F Riaz, S Khadim, R Rauf, M Ahmad, S Jabbar, J Chaudhry Computer Networks 143, 62-73, 2018 | 28 | 2018 |
Security in graphical authentication RG Rittenhouse, JA Chaudry, M Lee International Journal of Security and Its Applications 7 (3), 347-356, 2013 | 28 | 2013 |
U-kitchen: application scenario JA Ali, WS Yoon, JH Kim, WD Cho Software Technologies for Future Embedded and Ubiquitous Systems, 2004 …, 2004 | 27 | 2004 |
Network performance enhancement of multi-sink enabled low power lossy networks in SDN based Internet of Things G Shabbir, A Akram, MM Iqbal, S Jabbar, M Alfawair, J Chaudhry International Journal of Parallel Programming 48 (2), 367-398, 2020 | 25 | 2020 |
A survey of big data security solutions in healthcare M Siddique, MA Mirza, M Ahmad, J Chaudhry, R Islam Security and Privacy in Communication Networks: 14th International …, 2018 | 25 | 2018 |
Entity data management in OKKAM T Palpanas, J Chaudhry, P Andritsos, Y Velegrakis 2008 19th International Workshop on Database and Expert Systems Applications …, 2008 | 24 | 2008 |
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems U Qidwai, J Chaudhry, S Jabbar, HMA Zeeshan, N Janjua, S Khalid Journal of Ambient Intelligence and Humanized Computing 10, 4085-4097, 2019 | 23 | 2019 |
Designing an energy-aware mechanism for lifetime improvement of wireless sensor networks: a comprehensive study S Jabbar, M Ahmad, KR Malik, S Khalid, J Chaudhry, O Aldabbas Mobile Networks and Applications 23, 432-445, 2018 | 22 | 2018 |
A survey of distributed certificate authorities in MANETs J Chaudhry, K Saleem, P Haskell-Dowland, MH Miraz arXiv preprint arXiv:1807.03246, 2018 | 18 | 2018 |
A review on wireless sensor networks routing protocol: Challenge in energy perspective I Ahmedy, MA Ngadi, SN Omar, J Chaudhry Scientific Research and Essays 6 (26), 5628-5649, 2011 | 18 | 2011 |