IIUM Repository

Items where Author is "Mir, Roohie Naaz"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 22.

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Morshidi, Malik Arman and Mir, Roohie Naaz and Mat Kiah, Miss Laiha and Khan, Abdul Mobeen (2022) Evolution and analysis of securehash algorithm (sha) family. Malaysian Journal of Computer Science, 35 (3). pp. 179-200. ISSN 0127-9084

Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Mat Kiah, Miss Laiha and Mir, Roohie Naaz (2021) Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access, 9. 61778 -61792. ISSN 2169-3536 (In Press)

Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access, 8. pp. 98481-98490. ISSN 2169 3536 E-ISSN 2169 3536

Anwar, Farhat and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A comprehensive insight into game theory in relevance to cyber security. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 8 (1). pp. 189-203. ISSN 2089-3272

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Yaacob, Mashkuri (2020) Scrutinising internet banking security solutions. International Journal of Information and Computer Security, 12 (2-3). pp. 269-302. ISSN 1744-1765 E-ISSN 1744-1773

Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Anwar, Farhat and Mir, Roohie Naaz and Yaacob, Mashkuri and Mehraj, Tehseen (2020) Bayesian signaling game based efficient security model for MANETs. In: 2019 Future of Information and Communication Conference (FICC), 14th-15th March 2019, San Francisco.

Khan, Burhan ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks. IEEE Access, 8. pp. 124097-124109. ISSN 2169-3536

Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Oussama, Allama and Jusoh, Ahmad Zamani (2019) Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore, pp. 63-86. ISBN 978-981-13-8613-8

Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz (2019) ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET. International Journal of Soft Computing and Engineering, 8 (7). pp. 506-519. ISSN 2278-3075

Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Anwar, Farhat and Mir, Roohie Naaz (2018) Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology, 7 (4). pp. 4899-4904. ISSN 2227-524X

Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Yusoff, Siti Hajar and Mir, Roohie Naaz and Sanni, Mistura L. (2018) Trust and resource oriented communication scheme in mobile ad hoc networks. In: Intelligent systems and applications: extended and selected results from SAI Intelligent Systems Conference (IntelliSys) 2016. Studies in Computational Intelligence, 751 . Springer, Cham, Switzerland, pp. 414-430. ISBN 978-3-319-69265-4

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Najeeb, Athaur Rahman (2018) A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. International Journal of Information and Computer Security. pp. 1-23. ISSN 1744-1765 E-ISSN 1744-1773 (In Press)

Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Mir, Roohie Naaz and Khan, Abdul Raouf and Yusoff, Siti Hajar (2017) A computationally efficient P-LRU based optimal cache heap object replacement policy. International Journal of Advanced Computer Science and Applications (IJASA), 8 (1). pp. 128-138. ISSN 2158-107X E-ISSN 2156-5570

Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Mattoo, M. Mueen Ul Islam and Anwar, Farhat and Nordin, Anis Nurashikin and Mir, Roohie Naaz (2017) Securing electronic transactions via payment gateways: a systematic review. International Journal Internet Technology and Secured Transactions, 7 (3). pp. 245-269. ISSN 1748-569X E-ISSN 1748-5703

Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Mir, Roohie Naaz and Baba, Asifa Mehraj and Anwar, Farhat (2016) DFAM: A distributed feedback analysis mechanism for knowledge based educational big data. Jurnal Teknologi, 78 (12-3). pp. 31-38. E-ISSN 2180-3722

Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Baba, Asifa Mehraj and Mir, Roohie Naaz and Lone, Sajaad Ahmad (2016) RFDA: Reliable framework for data administration based on split-merge policy. In: 2016 SAI Computing Conference (SAI), 13th-15th July 2016, ExCeL London (CentrEd Conference Center), One Western Gateway, Royal Victoria DockLondon; United Kingdom.

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Baba, Asifa Mehraj and Mir, Roohie Naaz and Lone, Sajad Ahmad (2015) DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. International Journal of Information Technology & Computer Science (IJITCS), 22 (1). pp. 1-9. ISSN 2090-1610

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Mir, Roohie Naaz and Baba, Asifa and Adebayo, Balagon Wasiu (2015) Strategic profiling for behaviour visualization of malicious node in MANETs using game theory. Journal of Theoretical and Applied Information Technology, 77 (1). pp. 25-43. ISSN 1817-3195 (O), 1992-8645 (P)

Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Mir, Roohie Naaz and Shah, Asadullah (2015) Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. American Journal of Computer Science and Engineering, 2 (3). pp. 10-19.

Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Baba, Asifa Mehraj and Mir, Roohie Naaz and Lone, Sajad Ahmad (2015) DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network. In: International Conference on Computing Education and Information Technology (ICCEIT 2015) , 9th-10th Nov. 2015, Paris, France.

Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Mir, Roohie Naaz and Baba, Asifa Mehraj and Gannie, Mohammad Rafiq (2015) RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), 24th-26th August 2015, Melaka, Malaysia.

Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Mir, Roohie Naaz and Baba, Asifa and Gannie, Mohammad Rafiq (2015) RAED: Response analysis of educational data for leveraging knowledge dissemination system. In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e) , 24th-26th August 2015, Melaka, Malaysia.

This list was generated on Thu Dec 5 03:02:51 2024 +08.