Babar Shah
Babar Shah
Associate Professor, College of Technological Innovation, Zayed Universiity
Verified email at
Cited by
Cited by
Security and privacy challenges in smart cities
T Braun, BCM Fung, F Iqbal, B Shah
Sustainable cities and society 39, 499-507, 2018
Security analysis of IoT protocols: A focus in CoAP
RA Rahman, B Shah
2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016
Customer churn prediction in telecommunication industry using data certainty
A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar
Journal of Business Research 94, 290-301, 2019
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
T Baker, M Asim, ┴ MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ...
Software: Practice and Experience 50 (5), 503-518, 2020
A survey on three-dimensional wireless ad hoc and sensor networks
B Shah, KI Kim
International Journal of Distributed Sensor Networks 10 (7), 616014, 2014
Wireless sensor networks for big data systems
BS Kim, KI Kim, B Shah, F Chow, KH Kim
Sensors 19 (7), 1565, 2019
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks
B Shah, F Iqbal, A Abbas, KI Kim
Sensors 15 (8), 20373-20391, 2015
Towards enhanced searching architecture for unstructured peer-to-peer over mobile ad hoc networks
B Shah, KI Kim
Wireless personal communications 77 (2), 1167-1189, 2014
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods
A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, ┴ Rocha, S Anwar
International Journal of Information Management 46, 304-319, 2019
Just-in-time customer churn prediction: With and without data transformation
A Amin, B Shah, AM Khattak, T Baker, S Anwar
2018 IEEE congress on evolutionary computation (CEC), 1-6, 2018
Real-time routing protocols for (m, k)-firm streams based on multi-criteria in wireless sensor networks
MA Azim, BS Kim, B Shah, KI Kim
Wireless Networks 23 (4), 1233-1248, 2017
Just-in-time customer churn prediction in the telecommunication sector
A Amin, F Al-Obeidat, B Shah, M Al Tae, C Khan, HUR Durrani, S Anwar
The Journal of Supercomputing 76 (6), 3924-3948, 2020
Android malware detection through generative adversarial networks
M Amin, B Shah, A Sharif, T Ali, KL Kim, S Anwar
Transactions on Emerging Telecommunications Technologies, e3675, 2019
Enhancing the teaching and learning process using video streaming servers and forecasting techniques
R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker
Sustainability 11 (7), 2049, 2019
Compromised user credentials detection in a digital enterprise using behavioral analytics
S Shah, B Shah, A Amin, F Al-Obeidat, F Chow, FJL Moreira, S Anwar
Future Generation Computer Systems 93, 407-417, 2019
Context mining of sedentary behaviour for promoting self-awareness using a smartphone
M Fahim, T Baker, AM Khattak, B Shah, S Aleem, F Chow
Sensors 18 (3), 874, 2018
Bloom filters optimized Wu-Manber for intrusion detection
M Aldwairi, K Al-Khamaiseh, F Alharbi, B Shah
Journal of Digital Forensics, Security and Law 11 (4), 5, 2016
Comparative study of conventional and fuzzy based power system stabilizer
B Shah
Communication Systems and Network Technologies (CSNT), 2013 Internationalá…, 2013
An enhanced mobility and temperature aware routing protocol through multi-criteria decision making method in wireless body area networks
BS Kim, B Shah, F Al-Obediat, S Ullah, KH Kim, KI Kim
Applied Sciences 8 (11), 2245, 2018
A prudent based approach for compromised user credentials detection
A Amin, B Shah, S Anwar, F Al-Obeidat, AM Khattak, A Adnan
Cluster Computing 21 (1), 423-441, 2018
The system can't perform the operation now. Try again later.
Articles 1–20