Advancing database security: a comprehensive systematic mapping study of potential challenges A Iqbal, SU Khan, M Niazi, M Humayun, NU Sama, AA Khan, A Ahmad Wireless Networks, 1-28, 2023 | 6 | 2023 |
An extensive survey on performance comparison of routing protocols in wireless sensor network NU Sama, K Zen, A Ur-Rahman Journal of Applied Sciences 17 (5), 238-245, 2017 | 4 | 2017 |
An integrated approach on verification of signatures using multiple classifiers (SVM and Decision Tree): A multi-classification approach U Jindal, S Dalal, G Rajesh, NU Sama, NZ Jhanjhi, M Humayun | 21 | 2021 |
Computational Intelligence Ethical Issues in Health Care NU Sama, K Zen, NZ Jhanjhi, M Humayun Computational Intelligence in Healthcare Informatics, 349-362, 2024 | | 2024 |
Detection of skin cancer based on skin lesion images using deep learning W Gouda, NU Sama, G Al-Waakid, M Humayun, NZ Jhanjhi Healthcare 10 (7), 1183, 2022 | 139 | 2022 |
Digital twin evolution, application areas and enabling technology NU Sama, NZ Jhanjhi, M Humayun, AU Rahman AIP Conference Proceedings 2729 (1), 2024 | 2 | 2024 |
Digital Twin for Cyber Physical System Security Najm Us Sama, NZ Jhanjhi, Mamoona Humayun, Muhammad Ibrahim Khalil Design Engineering(Toronto), 2021 (9), 8318, 2022 | | 2022 |
Efficient energy utilization through optimum number of sensor node distribution in engineered corona-based (ONSD-EC) wireless sensor network AU Rahman, H Hasbullah, NU Sama Wireless personal communications 73, 1227-1243, 2013 | 6 | 2013 |
Energy efficient least edge computation LEACH in wireless sensor network NU Sama, KB Zen, AU Rahman, B BiBi, AU Rahman, IA Chesti 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 15 | 2020 |
Energy-aware routing hole detection algorithm in the hierarchical wireless sensor network NU Sama, KB Zen, AU Rahman, AU Din International Journal of Advanced Computer Science and Applications 10 (3), 2019 | 5 | 2019 |
Evolution, mitigation, and prevention of ransomware IA Chesti, M Humayun, NU Sama, NZ Jhanjhi 2020 2nd International Conference on Computer and Information Sciences …, 2020 | 51 | 2020 |
Experimental evaluation of fracture properties of bovine hip cortical bone using elastic–plastic fracture mechanics W Ur Rahman, R Khan, N Rahman, ZA Alrowaili, B Bibi, N Us Sama Bio-Medical Materials and Engineering 33 (2), 91-99, 2022 | 1 | 2022 |
Hybrid Behavior-based Biometric Authentication Systems (HBAS) V Ponnusamy Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 …, 2021 | 1 | 2021 |
Impact of Gaussian deployment strategies on the performance of wireless sensor network H Hasbullah 2012 International Conference on Computer & Information Science (ICCIS) 2 …, 2012 | 9 | 2012 |
Impact of olive oil constituents on C-reactive protein: in silico evidence HU Rahman, MH Mahmood, NU Sama, M Afzal, MR Asaruddin, ... Journal of Oleo Science 71 (8), 1199-1206, 2022 | 2 | 2022 |
Impact of olive oil constituents on C-reactive protein: in silico evidence. MH Mahmood, NU Sama, M Afzal, MR Asaruddin, MSA Khan | | 2022 |
Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases K Zen, S Mohanan, S Tarmizi, N Annuar, NU Sama 2022 Applied Informatics International Conference (AiIC), 111-116, 2022 | 7 | 2022 |
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks A Khan, M Imran, M Shoaib, AU Rahman, N Sama Computer Communications 181, 428-437, 2022 | 4 | 2022 |
Melanoma detection using deep learning-based classifications G Alwakid, W Gouda, M Humayun, NU Sama Healthcare 10 (12), 2481, 2022 | 52 | 2022 |
Mobile Authentication using Hybrid Modalities (MAHM) in Pervasive Computing V Ponnusamy Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 …, 2021 | 1 | 2021 |