default search action
Ayesha Altaf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j15]Maida Shahid, Muhammad Awais Hassan, Faiza Iqbal, Ayesha Altaf, Sayyed Wajihul Husnain Shah, Ana Visiers Elizaincin, Imran Ashraf:
Enhancing movie recommendations using quantum support vector machine (QSVM). J. Supercomput. 81(1): 78 (2025) - 2024
- [j14]Khadija Aslam, Faiza Iqbal, Ayesha Altaf, Naveed Hussain, Mónica Gracia Villar, Emmanuel Soriano Flores, Isabel de la Torre Díez, Imran Ashraf:
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network. IEEE Access 12: 15651-15661 (2024) - [j13]Hira Zaheer, Muhammad Shoaib, Faiza Iqbal, Shazia Arshad, Ayesha Altaf, Eduardo Garcia Villena, Isabel de la Torre Díez, Imran Ashraf:
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain. J. Netw. Syst. Manag. 32(4): 100 (2024) - 2023
- [j12]Naveed Hussain, Hamid Turab Mirza, Faiza Iqbal, Ayesha Altaf, Ahtsham Shoukat, Mónica Gracia Villar, Emmanuel Soriano Flores, Marco Antonio Rojo Gutiérrez, Imran Ashraf:
PRUS: Product Recommender System Based on User Specifications and Customers Reviews. IEEE Access 11: 81289-81297 (2023) - [j11]Aiman Almas, Waseem Iqbal, Ayesha Altaf, Kashif Saleem, Shynar Mussiraliyeva, Muhammad Wajahat Iqbal:
Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems. IEEE Internet Things J. 10(12): 10575-10586 (2023) - [j10]Faiza Iqbal, Ayesha Altaf, Zeest Waris, Daniel Gavilanes Aray, Miguel Angel López Flores, Isabel de la Torre Díez, Imran Ashraf:
Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. Sensors 23(11): 5263 (2023) - [j9]Sana Farooq, Ayesha Altaf, Faiza Iqbal, Ernesto Bautista Thompson, Debora Libertad Ramírez Vargas, Isabel de la Torre Díez, Imran Ashraf:
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. Sensors 23(12): 5379 (2023) - [j8]Hamza Farooq, Ayesha Altaf, Faiza Iqbal, Juan Castanedo Galán, Daniel Gavilanes Aray, Imran Ashraf:
DrunkChain: Blockchain-Based IoT System for Preventing Drunk Driving-Related Traffic Accidents. Sensors 23(12): 5388 (2023) - [j7]Mahrukh Ramzan, Muhammad Shoaib, Ayesha Altaf, Shazia Arshad, Faiza Iqbal, Ángel Gabriel Kuc Castilla, Imran Ashraf:
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm. Sensors 23(20): 8642 (2023) - [j6]Reeba Zahid, Ayesha Altaf, Tauqir Ahmad, Faiza Iqbal, Yini Airet Miró Vera, Miguel Angel López Flores, Imran Ashraf:
Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective. Syst. 11(8): 380 (2023) - 2021
- [j5]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Farrukh Aslam Khan, Saddaf Rubab, Abdelouahid Derhab:
Context-oriented trust computation model for industrial Internet of Things. Comput. Electr. Eng. 92: 107123 (2021) - [j4]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Malik Muhammad Zaki Murtaza Khan, Mahmoud Daneshmand:
Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings. IEEE Internet Things J. 8(9): 7497-7509 (2021) - [j3]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Malik Muhammad Zaki Murtaza Khan, Abdul Rauf, Tehsin Kanwal:
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks. J. Syst. Archit. 115: 102028 (2021) - 2019
- [j2]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab:
Trust models of internet of smart things: A survey, open issues, and future directions. J. Netw. Comput. Appl. 137: 93-111 (2019) - 2009
- [j1]Ayesha Altaf, M. Younus Javed, Sheraz Naseer, Aisha Latif:
Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005. J. Digit. Content Technol. its Appl. 3(1): 103-109 (2009)
Conference and Workshop Papers
- 2019
- [c3]Ayesha Altaf, Haider Abbas, Faiza Iqbal:
Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT). CloudCom 2019: 424-430 - 2008
- [c2]Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed:
A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. SECURWARE 2008: 238-242 - [c1]Ayesha Altaf, M. Younus Javed, Attiq Ahmed:
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. SNPD 2008: 335-339
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint