Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks T Mumtaz, S Muhammad, MI Aslam, N Mohammad IEEE Access 8, 86495-86509, 2020 | 57 | 2020 |
Discovering man-in-the-middle attacks in authentication protocols RK Guha, Z Furqan, S Muhammad MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 51 | 2007 |
Formal Analysis of Human-Assisted Smart City Emergency Services N Mohammad, S Muhammad, B Abul, M Khan IEEE Access 7, 60376 - 60388, 2019 | 38 | 2019 |
Understanding the intruder through attacks on cryptographic protocols S Muhammad, Z Furqan, RK Guha Proceedings of the 44th annual Southeast regional conference, 667-672, 2006 | 27 | 2006 |
Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis E Shaikh, N Mohammad, S Muhammad International Conference on Communications, Signal Processing and their …, 2021 | 15 | 2021 |
Formal verification of 802.11 i using strand space formalism Z Furqan, S Muhammad, RK Guha International Conference on Networking, International Conference on Systems …, 2006 | 14 | 2006 |
Wireless sensor network security: a secure sink node architecture S Muhammad, Z Furqan, R Guha PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005 | 12 | 2005 |
Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking S Muhammad, N Mohammad, B Abul, MA Khan Journal of Intelligent & Robotic Systems 94 (3), 687-709, 2019 | 11 | 2019 |
Modeling and analyzing MAC frame aggregation techniques in 802.11 n using bi-dimensional Markovian model N Mohammad, S Muhammad Networked Digital Technologies: 4th International Conference, NDT 2012 …, 2012 | 11 | 2012 |
A logic-based verification framework for authentication protocols S Muhammad, Z Furqan, RK Guha International Journal of Internet Technology and Secured Transactions 1 (1/2 …, 2007 | 11 | 2007 |
Modeling and Analysis of MDP-based Security Risk Assessment System for Smart Grids A Bashar, S Muhammad, N Mohammad, M Khan 2020 Fourth International Conference on Inventive Systems and Control (ICISC …, 2020 | 10 | 2020 |
Modeling and Analysis of MDP-based Security Risk Assessment System for Smart Grids A Bashar, S Muhammad, N Mohammad, M Khan Proc. of 4th IEEE ICISC Conference (IEEE ICISC 2020), 08-10 Jan., 2020, 2020 | 10 | 2020 |
'Modeling and Evaluation of Pre-copy Live VM Migration using Probabilistic Model Checking B Abul, M Nazeeruddin, M Shahabuddin 12th International Conference on Signal Processing and Communication Systems …, 2018 | 9 | 2018 |
A Multi-agent Approach Toward the Security Analysis of the 802.11 i Handshake Protocol R Guha, Z Furqan, S Muhammad 2007 2nd International Symposium on Wireless Pervasive Computing, 2007 | 9 | 2007 |
Inter-slice resource management for 5G radio access network using Markov decision process T Mumtaz, S Muhammad, A Muhammad, I Ahmed Telecommunication Systems, 2022 | 8 | 2022 |
Designing authentication protocols: Trends and issues S Muhammad, Z Furqan, RK Guha International Conference on Networking, International Conference on Systems …, 2006 | 8 | 2006 |
Priority based channel assignment with pair-wise listen and sleep scheduling for wireless sensor networks Z Furqan, S Muhammad, R Guha 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004 …, 2004 | 8 | 2004 |
Modeling operator performance in human-in-the-loop autonomous systems S Muhammad IEEE Access 9, 102715 - 102731, 2021 | 6 | 2021 |
Logic-based formal analysis of cryptographic protocols S Muhammad, Z Furqan, RK Guha 2006 14th IEEE International Conference on Networks 2, 1-6, 2006 | 6 | 2006 |
Analysis of in-vehicle security system of smart vehicles N Mohammad, S Muhammad, E Shaikh Future Network Systems and Security: 5th International Conference, FNSS 2019 …, 2019 | 5 | 2019 |