Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, Arizona
Verified email at ieee.org - Homepage
Cited by
Cited by
Encyclopedia of multimedia technology and networking
M Pagani
IGI Global, 2008
Phishing attacks and defenses
JA Chaudhry, SA Chaudhry, RG Rittenhouse
International Journal of Security and Its Applications 10 (1), 247-256, 2016
A survey of information security risk analysis methods
A Behnia, R Abd Rashid, JA Chaudhry
SmartCR 2 (1), 79-94, 2012
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
Security and privacy based access control model for internet of connected vehicles
MA Habib, M Ahmad, S Jabbar, S Khalid, J Chaudhry, K Saleem, ...
Future Generation Computer Systems 97, 687-696, 2019
Entity data management in OKKAM
T Palpanas, J Chaudhry, P Andritsos, Y Velegrakis
2008 19th International Workshop on Database and Expert Systems Applications …, 2008
U-kitchen: application scenario
JA Ali, WS Yoon, JH Kim, WD Cho
Software Technologies for Future Embedded and Ubiquitous Systems, 2004 …, 2004
Security in graphical authentication
RG Rittenhouse, JA Chaudry, M Lee
International Journal of Security and Its Applications 7 (3), 347-356, 2013
Dealing with sinkhole attacks in wireless sensor networks
JA Chaudhry, U Tariq, MA Amin, RG Rittenhouse
Advanced Science and Technology Letters 29 (2), 7-12, 2013
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song
IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE
R Arul, G Raja, AK Bashir, J Chaudry, A Ali
IEEE Transactions on Industrial Informatics 14 (6), 2677-2689, 2018
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74 (10), 5171-5186, 2018
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures
W Yang, S Wang, G Zheng, J Chaudhry, C Valli
The Journal of Supercomputing, 1-17, 2018
A review on wireless sensor networks routing protocol: Challenge in energy perspective
I Ahmedy, MA Ngadi, SN Omar, J Chaudhry
Scientific Research and Essays 6 (26), 5628-5649, 2011
A novel packet marketing method in DDoS attack detection
C Beak, JA Chaudhry, K Lee, S Park, M Kim
American Journal of Applied Sciences 4 (10), 741-745, 2007
A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion
F Riaz, S Khadim, R Rauf, M Ahmad, S Jabbar, J Chaudhry
Computer Networks 143, 62-73, 2018
Designing an energy-aware mechanism for lifetime improvement of wireless sensor networks: a comprehensive study
S Jabbar, M Ahmad, KR Malik, S Khalid, J Chaudhry, O Aldabbas
Mobile Networks and Applications 23 (3), 432-445, 2018
AHSEN–Autonomic Healing-Based Self Management Engine for Network Management in Hybrid Networks
JA Chaudhry, S Park
International Conference on Grid and Pervasive Computing, 193-203, 2007
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems
U Qidwai, J Chaudhry, S Jabbar, HMA Zeeshan, N Janjua, S Khalid
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4085-4097, 2019
The system can't perform the operation now. Try again later.
Articles 1–20