Statistical fingerprint‐based intrusion detection system (SF‐IDS) L Boero, M Cello, M Marchese, E Mariconti, T Naqash, S Zappatore International Journal of Communication Systems 30 (10), e3225, 2017 | 29 | 2017 |
Android (Nougats) security issues and solutions S Iqbal, A Yasin, T Naqash 2018 IEEE International Conference on Applied System Invention (ICASI), 1152 …, 2018 | 13 | 2018 |
Edge sharpening in grayscale images using modified Sobel technique T Naqash, I Shafi 2011 IEEE 14th International Multitopic Conference, 132-136, 2011 | 11 | 2011 |
Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed Software Defined Network T Naqash, SH Shah, MNU Islam International Journal of Parallel Programming 50 (1), 89-114, 2022 | 8 | 2022 |
Anti-theft cloud application for android operating system (Nougats) O Sohail, T Naqash 2018 IEEE International Conference on Applied System Invention (ICASI), 321-324, 2018 | 8 | 2018 |
Secure DNS from amplification attack by using modified bloom filters U Sattar, T Naqash, MR Zafar, K Razzaq, F bin Ubaid Eighth International Conference on Digital Information Management (ICDIM …, 2013 | 7 | 2013 |
Mutual authentication protocol for LTE based mobile networks T Naqash, A Yasin, MA Hasan, U Mujhaid, A Ishfaq, M Najam-ul-Islam, ... 2012 International Conference on Open Source Systems and Technologies, 1-4, 2012 | 6 | 2012 |
Protecting DNS from cache poisoning attack by using secure proxy T Naqash, FB Ubaid, A Ishfaq 2012 International Conference on Emerging Technologies, 1-5, 2012 | 6 | 2012 |
Efficient implementation of 1024-bit symmetric encryption and decryption algorithm for real time communication systems A Ishfaq, T Naqash, MA Hasan, A Mukhtar, MAA Ch, U Mujahid, ... 2012 IEEE Student Conference on Research and Development (SCOReD), 188-192, 2012 | 4 | 2012 |
Encryption and decryption of mobile security using AES and gost algorithms I Yaqoob, T Naqash, SH Shah 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018 | 3 | 2018 |
Review on safe reversible image data hiding T Naqash, A Iqbal, SH Shah 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 2 | 2019 |
Statistical analysis-based intrusion detection for software defined network T Naqash, MH Tanveer, SH Shah, M Salman Smart Trends in Computing and Communications: Proceedings of SmartCom 2021 …, 2022 | 1 | 2022 |
Efficient implementation of 1024-Bit symmetric encryption protocol for low range devices A Jahangee, T Naqash 2018 International Conference on Computing, Mathematics and Engineering …, 2018 | 1 | 2018 |
Techniques for Reduction of False Alarms in Signature-Based Intrusion Detection Systems T Naqash, H Waraich published in IEEE 13th International Forum on Strategic Technology (IFOST 2018), 0 | 1 | |
Secure DNS from amplification attack by using modified bloom filters T Naqash, MR Zafar, K Razzaq, F bin Ubaid Eighth International Conference on Digital Information Management (ICDIM 2013), 0 | 1* | |
Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System T Naqash, M Asfand-e-Yar, MH Tanveer | | 2024 |
Quantitative Analysis of Self-Regulation in Engineering and Mathematics Education O Lawanto, A Minichiello, Z ul Abideen, T Naqash, A Iqbal 2023 ASEE Annual Conference & Exposition, 2023 | | 2023 |
Board 383: Self-Regulation of Cognition and Self-Regulation of Motivation in Problem Solving O Lawanto, A Minichiello, Z ul Abideen, T Naqash, A Iqbal 2023 ASEE Annual Conference & Exposition, 2023 | | 2023 |
C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks O Mustafa, K Ali, T Naqash 2023 International Conference on Communication, Computing and Digital …, 2023 | | 2023 |
Rule based Intrusion Detection System by Using Statistical Flow Analysis Technique for Software Defined Network M Ejaz, O Sohail, T Naqash, Z ul Abideen, SH Shah | | 2019 |