Obserwuj
Talha Naqash
Tytuł
Cytowane przez
Cytowane przez
Rok
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore
International Journal of Communication Systems 30 (10), e3225, 2017
292017
Android (Nougats) security issues and solutions
S Iqbal, A Yasin, T Naqash
2018 IEEE International Conference on Applied System Invention (ICASI), 1152 …, 2018
132018
Edge sharpening in grayscale images using modified Sobel technique
T Naqash, I Shafi
2011 IEEE 14th International Multitopic Conference, 132-136, 2011
112011
Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed Software Defined Network
T Naqash, SH Shah, MNU Islam
International Journal of Parallel Programming 50 (1), 89-114, 2022
82022
Anti-theft cloud application for android operating system (Nougats)
O Sohail, T Naqash
2018 IEEE International Conference on Applied System Invention (ICASI), 321-324, 2018
82018
Secure DNS from amplification attack by using modified bloom filters
U Sattar, T Naqash, MR Zafar, K Razzaq, F bin Ubaid
Eighth International Conference on Digital Information Management (ICDIM …, 2013
72013
Mutual authentication protocol for LTE based mobile networks
T Naqash, A Yasin, MA Hasan, U Mujhaid, A Ishfaq, M Najam-ul-Islam, ...
2012 International Conference on Open Source Systems and Technologies, 1-4, 2012
62012
Protecting DNS from cache poisoning attack by using secure proxy
T Naqash, FB Ubaid, A Ishfaq
2012 International Conference on Emerging Technologies, 1-5, 2012
62012
Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems
A Ishfaq, T Naqash, MA Hasan, A Mukhtar, MAA Ch, U Mujahid, ...
2012 IEEE Student Conference on Research and Development (SCOReD), 188-192, 2012
42012
Encryption and decryption of mobile security using AES and gost algorithms
I Yaqoob, T Naqash, SH Shah
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018
32018
Review on safe reversible image data hiding
T Naqash, A Iqbal, SH Shah
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
22019
Statistical analysis-based intrusion detection for software defined network
T Naqash, MH Tanveer, SH Shah, M Salman
Smart Trends in Computing and Communications: Proceedings of SmartCom 2021 …, 2022
12022
Efficient implementation of 1024-Bit symmetric encryption protocol for low range devices
A Jahangee, T Naqash
2018 International Conference on Computing, Mathematics and Engineering …, 2018
12018
Techniques for Reduction of False Alarms in Signature-Based Intrusion Detection Systems
T Naqash, H Waraich
published in IEEE 13th International Forum on Strategic Technology (IFOST 2018), 0
1
Secure DNS from amplification attack by using modified bloom filters
T Naqash, MR Zafar, K Razzaq, F bin Ubaid
Eighth International Conference on Digital Information Management (ICDIM 2013), 0
1*
Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System
T Naqash, M Asfand-e-Yar, MH Tanveer
2024
Quantitative Analysis of Self-Regulation in Engineering and Mathematics Education
O Lawanto, A Minichiello, Z ul Abideen, T Naqash, A Iqbal
2023 ASEE Annual Conference & Exposition, 2023
2023
Board 383: Self-Regulation of Cognition and Self-Regulation of Motivation in Problem Solving
O Lawanto, A Minichiello, Z ul Abideen, T Naqash, A Iqbal
2023 ASEE Annual Conference & Exposition, 2023
2023
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks
O Mustafa, K Ali, T Naqash
2023 International Conference on Communication, Computing and Digital …, 2023
2023
Rule based Intrusion Detection System by Using Statistical Flow Analysis Technique for Software Defined Network
M Ejaz, O Sohail, T Naqash, Z ul Abideen, SH Shah
2019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20