Zahid Anwar
Zahid Anwar
Fontbonne University USA; National University of Sciences and Technology, Pakistan
Verified email at fontbonne.edu - Homepage
Title
Cited by
Cited by
Year
A survey of peer-to-peer storage techniques for distributed file systems
R Hasan, Z Anwar, W Yurcik, L Brumbaugh, R Campbell
International Conference on Information Technology: Coding and Computing†…, 2005
1912005
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges
U Shaukat, E Ahmed, Z Anwar, F Xia
Journal of Network and Computer Applications 62, 18-40, 2016
882016
Semantic security against web application attacks
A Razzaq, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
772014
Ontology for attack detection: An intelligent approach to web application security
A Razzaq, Z Anwar, HF Ahmad, K Latif, F Munir
computers & security 45, 124-146, 2014
652014
Digital forensics for eucalyptus
F Anwar, Z Anwar
2011 Frontiers of Information Technology, 110-116, 2011
622011
RRW—a robust and reversible watermarking technique for relational data
S Iftikhar, M Kamran, Z Anwar
IEEE Transactions on knowledge and data engineering 27 (4), 1132-1145, 2014
542014
Design and deployment of a trusted eucalyptus cloud
I Khan, H Rehman, Z Anwar
2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011
522011
Data-driven analytics for cyber-threat intelligence and information sharing
S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu
Computers & Security 67, 35-58, 2017
502017
IoTSAT: A formal framework for security analysis of the internet of things (IoT)
M Mohsin, Z Anwar, G Husari, E Al-Shaer, MA Rahman
2016 IEEE Conference on Communications and Network Security (CNS), 180-188, 2016
482016
Real-time 3d video compression for tele-immersive environments
Z Yang, Y Cui, Z Anwar, R Bocchino, N Kiyanclar, K Nahrstedt, ...
Multimedia Computing and Networking 2006 6071, 607102, 2006
422006
Edos armor: a cost effective economic denial of sustainability attack mitigation framework for e-commerce applications in cloud environments
M Masood, Z Anwar, SA Raza, MA Hur
INMIC, 37-42, 2013
402013
Multiple design patterns for voice over IP (VoIP) security
Z Anwar, W Yurcik, RE Johnson, M Hafiz, RH Campbell
2006 IEEE International Performance Computing and Communications Conference†…, 2006
382006
IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things
M Mohsin, MU Sardar, O Hasan, Z Anwar
IEEE Access 5, 5494-5505, 2017
352017
Leveraging social-network infrastructure to improve peer-to-peer overlay performance: Results from orkut
Z Anwar, W Yurcik, V Pandey, A Shankar, I Gupta, RH Campbell
Arxiv preprint cs/0509095, 2005
322005
Automatic security assessment of critical cyber-infrastructures
Z Anwar, R Shankesi, RH Campbell
2008 IEEE International Conference on Dependable Systems and Networks With†…, 2008
312008
Can a DDoS attack meltdown my data center? A simulation study and defense strategies
Z Anwar, AW Malik
IEEE Communications Letters 18 (7), 1175-1178, 2014
282014
Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks
RU Rasool, U Ashraf, K Ahmed, H Wang, W Rafique, Z Anwar
IEEE Access 7, 34885-34899, 2019
242019
Swam: Stuxnet worm analysis in metasploit
R Masood, Z Anwar
2011 Frontiers of Information Technology, 142-147, 2011
232011
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations
M Mohsin, Z Anwar, F Zaman, E Al-Shaer
Computers & Security 70, 199-223, 2017
222017
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
U Noor, Z Anwar, T Amjad, KKR Choo
Future Generation Computer Systems 96, 227-242, 2019
192019
The system can't perform the operation now. Try again later.
Articles 1–20