Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 39 | 2019 |
Coverage and mobile sensor placement for vehicles on predetermined routes: A greedy heuristic approach J Ali, V Dyo SCITEPRESS–Science and Technology Publications, 2017 | 9 | 2017 |
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols J Ali, V Dyo 2021 International Conference on Information Networking (ICOIN), 181-185, 2021 | 8 | 2021 |
String similarity algorithms for a ticket classification system M Pikies, J Ali 2019 6th International Conference on Control, Decision and Information …, 2019 | 7 | 2019 |
Mechanism for the prevention of password reuse through anonymized hashes J Ali PeerJ PrePrints 5, e3322v1, 2017 | 6 | 2017 |
Practical hash-based anonymity for mac addresses J Ali, V Dyo arXiv preprint arXiv:2005.06580, 2020 | 5 | 2020 |
Mastering PHP Design Patterns J Ali Packt Publishing Ltd, 2016 | 4 | 2016 |
Analysis and safety engineering of fuzzy string matching algorithms M Pikies, J Ali ISA transactions 113, 1-8, 2021 | 1 | 2021 |
Battery-assisted Electric Vehicle Charging: Data Driven Performance Analysis J Ali, V Dyo, S Zhang 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 429-433, 2020 | 1 | 2020 |
Novel Keyword Extraction and Language Detection Approaches M Pikies, A Riyono, J Ali arXiv preprint arXiv:2009.11832, 2020 | | 2020 |
Password Authentication Attacks at Scale J Ali, M Pikies International Conference on Advanced Engineering Theory and Applications …, 2019 | | 2019 |
Object Oriented PHP J Ali Lulu. com, 2017 | | 2017 |