A closer look at intrusion detection system for web applications N Agarwal, SZ Hussain Security and Communication Networks 2018 (1), 9601357, 2018 | 82 | 2018 |
Performance analysis of AES and TwoFish encryption schemes SAM Rizvi, SZ Hussain, N Wadhwa 2011 International Conference on Communication Systems and Network …, 2011 | 53 | 2011 |
Analyzing real and fake users in Facebook network based on emotions N Agarwal, S Jabin, SZ Hussain 2019 11th International Conference on Communication Systems & Networks …, 2019 | 44 | 2019 |
User emotion analysis in conflicting versus non-conflicting regions using online social networks MA Wani, N Agarwal, SuraiyaJabin, SZ Hussain Telematics and Informatics 35 (8), 2326-2336, 2018 | 37 | 2018 |
Broadcast expenses controlling techniques in mobile ad-hoc networks: A survey N Ahmad, SZ Hussain Journal of king saud university-computer and information sciences 28 (3 …, 2016 | 29 | 2016 |
A Survey on Issues and Possible Solutions of Cross-Layer Design in Internet of Things S Parween, SZ Hussain, MA Hussain International Journal of Computer Networks and Applications 8 (4), 311-333, 2021 | 26 | 2021 |
A Review on Cross-Layer Design Approach in WSN by Different Techniques S Parween, SZ Hussain Advances in Science, Technology and Engineering Systems Journal, 5 (Issue 4 …, 2020 | 26 | 2020 |
Fuzzy attributed goal oriented software requirements analysis with multiple stakeholders CW Mohammad, M Shahid, SZ Hussain International Journal of Information Technology, 1-9, 2018 | 25 | 2018 |
Minimizing broadcast expenses in clustered ad-hoc networks SZ Hussain, N Ahmad Journal of King Saud University-Computer and Information Sciences 30 (1), 67-79, 2018 | 24 | 2018 |
Design and implementation of iMacros-based data crawler for behavioral analysis of Facebook users MA Wani, N Agarwal, S Jabin, SZ Hussai Computer Science: Social and Information Networks, 2018 | 20 | 2018 |
Cluster based controlling of route exploring packets in ad-hoc networks SZ Hussain, N Ahmad Advanced Computing, Networking and Informatics-Volume 2, 103-112, 2014 | 20 | 2014 |
A combined method for confidentiality, integrity, availability and authentication (CMCIAA) N Wadhwa, S Z Hussain, S Rizvi Proceedings of the World Congress on Engineering 2, 2013 | 17 | 2013 |
Comparative Study of TCP Congestion Control Algorithm in IoT SZ Hussain, S Parween 3rd International Conference on Advances in Computing, Communication Control …, 2022 | 11 | 2022 |
A comparative analysis of CoAP based congestion control in IoT S Parween, SZ Hussain 2021 4th international conference on recent trends in computer science and …, 2022 | 10 | 2022 |
Secured Key Agreement Schemes in Wireless Body Area Network — A Review SZ Hussain, M Kumar INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY 14 (24), pp 2005-2033, 2021 | 10 | 2021 |
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms. SAM Rizvi, SZ Hussain, N Wadhwa Proceedings of the International Conference on Security and Management (SAM), 1, 2011 | 9 | 2011 |
Dynamic software license key management using smart cards VK Sharma, SAM Rizvi, SZ Hussain, AS Chauhan 2010 International Conference on Advances in Computer Engineering, 244-246, 2010 | 8 | 2010 |
Survey on Intrusion Detection System in IoT Network SA Mehdi, SZ Hussain International Conference on Innovative Computing and Communications 2, 721-732, 2022 | 7 | 2022 |
Simulation model for wireless body area network using castalia M Kumar, SZ Hussain 2022 1st International Conference on Informatics (ICI), 204-207, 2022 | 6 | 2022 |
Analytical comparisons of query-broadcast repealing schemes in manets N Ahmad, SZ Hussain Telecommunication Systems 70 (1), 67-79, 2019 | 5 | 2019 |