Fuzziness based semi-supervised learning approach for intrusion detection system RAR Ashfaq, XZ Wang, JZ Huang, H Abbas, YL He Information sciences 378, 484-497, 2017 | 675 | 2017 |
Blockchain's adoption in IoT: The challenges, and a way forward I Makhdoom, M Abolhasan, H Abbas, W Ni Journal of Network and Computer Applications 125, 251-279, 2019 | 577 | 2019 |
Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges A Sajid, H Abbas, K Saleem Ieee Access 4, 1375-1384, 2016 | 515 | 2016 |
A manufacturing big data solution for active preventive maintenance J Wan, S Tang, D Li, S Wang, C Liu, H Abbas, AV Vasilakos IEEE Transactions on Industrial Informatics 13 (4), 2039-2047, 2017 | 498 | 2017 |
Edge computing in IoT-based manufacturing B Chen, J Wan, A Celesti, D Li, H Abbas, Q Zhang IEEE Communications Magazine 56 (9), 103-109, 2018 | 351 | 2018 |
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security W Iqbal, H Abbas, M Daneshmand, B Rauf, YA Bangash IEEE Internet of Things Journal 7 (10), 10250-10276, 2020 | 327 | 2020 |
User-oriented virtual mobile network resource management for vehicle communications H Lu, Y Zhang, Y Li, C Jiang, H Abbas IEEE transactions on intelligent transportation systems 22 (6), 3521-3532, 2020 | 212 | 2020 |
Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review T Yaqoob, H Abbas, M Atiquzzaman IEEE Communications Surveys & Tutorials 21 (4), 3723-3768, 2019 | 207 | 2019 |
SS7 vulnerabilities—a survey and implementation of machine learning vs rule based filtering for detection of SS7 network attacks K Ullah, I Rashid, H Afzal, MMW Iqbal, YA Bangash, H Abbas IEEE Communications Surveys & Tutorials 22 (2), 1337-1371, 2020 | 186 | 2020 |
Privacy preservation in e-healthcare environments: State of the art and future directions MA Sahi, H Abbas, K Saleem, X Yang, A Derhab, MA Orgun, W Iqbal, ... Ieee Access 6, 464-478, 2017 | 175 | 2017 |
Cloud computing risk assessment: a systematic literature review R Latif, H Abbas, S Assar, Q Ali Future Information Technology: FutureTech 2013, 285-295, 2014 | 162 | 2014 |
Data privacy in cloud-assisted healthcare systems: state of the art and future challenges A Sajid, H Abbas Journal of medical systems 40 (6), 155, 2016 | 122 | 2016 |
Trust models of internet of smart things: A survey, open issues, and future directions A Altaf, H Abbas, F Iqbal, A Derhab Journal of Network and Computer Applications 137, 93-111, 2019 | 107 | 2019 |
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks FA Khan, A Ali, H Abbas, NAH Haldar Procedia Computer Science 34, 511-517, 2014 | 106 | 2014 |
A framework to estimate the nutritional value of food in real time using deep learning techniques R Yunus, O Arif, H Afzal, MF Amjad, H Abbas, HN Bokhari, ST Haider, ... IEEE Access 7, 2643-2652, 2018 | 104 | 2018 |
Analysis and mitigation of inverter output impedance impacts for distributed energy resource interface Y Tao, Q Liu, Y Deng, X Liu, X He IEEE Transactions on Power Electronics 30 (7), 3563-3576, 2014 | 101 | 2014 |
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review A Ahmed, R Latif, S Latif, H Abbas, FA Khan Multimedia Tools and Applications 77, 21947-21965, 2018 | 86 | 2018 |
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems NAH Haldar, FA Khan, A Ali, H Abbas Neurocomputing 220, 221-235, 2017 | 86 | 2017 |
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review R Latif, H Abbas, S Assar Journal of medical systems 38, 1-10, 2014 | 80 | 2014 |
A framework for preservation of cloud users’ data privacy using dynamic reconstruction of metadata A Waqar, A Raza, H Abbas, MK Khan Journal of Network and Computer Applications 36 (1), 235-248, 2013 | 79 | 2013 |