default search action
Baber Aslam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Raja Zeeshan Haider, Baber Aslam, Haider Abbas, Zafar Iqbal:
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks. Int. J. Inf. Sec. 23(4): 2531-2545 (2024) - 2023
- [c18]Muhammad Sharjeel Zareen, Shahzaib Tahir, Baber Aslam:
Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. IFIPIoT (1) 2023: 442-453 - 2022
- [j7]Waleed Bin Shahid, Baber Aslam, Haider Abbas, Hammad Afzal, Saad Bin Khalid:
A deep learning assisted personalized deception system for countering web application attacks. J. Inf. Secur. Appl. 67: 103169 (2022) - [j6]Waleed Bin Shahid, Baber Aslam, Haider Abbas, Saad Bin Khalid, Hammad Afzal:
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling. J. Netw. Comput. Appl. 198: 103270 (2022) - [c17]Waleed Bin Shahid, Baber Aslam, Haider Abbas, Hammad Afzal, Imran Rashid:
An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks. ACIIDS (1) 2022: 183-195 - 2021
- [c16]Waleed Bin Shahid, Haider Abbas, Baber Aslam, Hammad Afzal, Saad Bin Khalid:
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization. EUC 2021: 95-101
2010 – 2019
- 2017
- [j5]Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem, Haider Abbas, Mehmet A. Orgun, Mian Muhammad Waseem Iqbal, Baber Aslam:
A Survey of Authentication Schemes in Telecare Medicine Information Systems. J. Medical Syst. 41(1): 14:1-14:26 (2017) - 2016
- [j4]Muhammad Faisal Amjad, Baber Aslam, Afraa Attiah, Cliff C. Zou:
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks. Wirel. Networks 22(3): 781-797 (2016) - 2015
- [c15]Faisal Nasim, Baber Aslam, Waseem Ahmed, Talha Naeem:
Uncovering Self Code Modification in Android. C2SI 2015: 297-313 - [c14]Muhammad Sharjeel Zareen, Baber Aslam, Monis Akhlaq:
Criteria for Validating Secure Wiping Tools. IFIP Int. Conf. Digital Forensics 2015: 321-339 - [c13]Waqas Ahmed, Baber Aslam:
A comparison of windows physical memory acquisition tools. MILCOM 2015: 1292-1297 - [p2]Ping Wang, Lei Wu, Baber Aslam, Cliff C. Zou:
Analysis of Peer-to-Peer Botnet Attacks and Defenses. Propagation Phenomena in Real World Networks 2015: 183-214 - 2013
- [j3]Baber Aslam, Ping Wang, Cliff Changchun Zou:
Extension of internet access to VANET via satellite receive-only terminals. Int. J. Ad Hoc Ubiquitous Comput. 14(3): 172-190 (2013) - [j2]Soyoung Park, Baber Aslam, Damla Turgut, Cliff Changchun Zou:
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Networks 6(4): 523-538 (2013) - [c12]M. Faisal Amjad, Baber Aslam, Cliff Changchun Zou:
Transparent cross-layer solutions for throughput boost in Cognitive Radio Networks. CCNC 2013: 580-586 - [c11]M. Faisal Amjad, Baber Aslam, Cliff C. Zou:
DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack. GLOBECOM 2013: 1149-1154 - [c10]Baber Aslam, M. Faisal Amjad, Cliff C. Zou:
PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks. MILCOM 2013: 882-887 - [c9]Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou:
Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks. MILCOM 2013: 951-956 - 2012
- [c8]Baber Aslam, M. Faisal Amjad, Cliff Changchun Zou:
Optimal roadside units placement in urban areas for vehicular networks. ISCC 2012: 423-429 - 2011
- [c7]Soyoung Park, Baber Aslam, Cliff C. Zou:
Long-term reputation system for vehicular networking based on vehicle's daily commute routine. CCNC 2011: 436-441 - [c6]Baber Aslam, Cliff C. Zou:
One-way-linkable blind signature security architecture for VANET. CCNC 2011: 745-750 - [c5]Baber Aslam, Cliff C. Zou:
Optimal roadside units placement along highways. CCNC 2011: 814-815 - 2010
- [j1]Baber Aslam, Soyoung Park, Cliff Changchun Zou, Damla Turgut:
Secure traffic data propagation in Vehicular Ad Hoc Networks. Int. J. Ad Hoc Ubiquitous Comput. 6(1): 24-39 (2010) - [c4]Baber Aslam, Lei Wu, Cliff Changchun Zou:
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. NCA 2010: 198-203 - [p1]Ping Wang, Baber Aslam, Cliff Changchun Zou:
Peer-to-Peer Botnets. Handbook of Information and Communication Security 2010: 335-350
2000 – 2009
- 2009
- [c3]Monis Akhlaq, Baber Aslam, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor:
Empowered Certification Authority in VANETs. AINA Workshops 2009: 181-186 - [c2]Baber Aslam, Ping Wang, Cliff Changchun Zou:
Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals. ICCCN 2009: 1-6 - [c1]Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou:
A Systematic Study on Peer-to-Peer Botnets. ICCCN 2009: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint