Tanveer Zia
Cited by
Cited by
Vehicular ad-hoc networks (VANETs): an overview and challenges
SU Rehman, M Khan, T Zia, L Zheng
Journal of Wireless Networking and communications 3 (3), 29-38, 2013
Security issues in wireless sensor networks
T Zia, A Zomaya
2006 International Conference on Systems and Networks Communications (ICSNC …, 2006
Multimodal big data affective analytics: A comprehensive survey using text, audio, visual and physiological signals
NJ Shoumy, LM Ang, KP Seng, DMM Rahaman, T Zia
Journal of Network and Computer Applications 149, 102447, 2020
A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things
S Zhao, W Li, T Zia, AY Zomaya
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
Application-specific digital forensics investigative model in internet of things (iot)
T Zia, P Liu, W Han
Proceedings of the 12th International Conference on Availability …, 2017
A security framework for wireless sensor networks
T Zia, A Zomaya
LAP LAMBERT Academic Publishing, 2013
A lightweight hybrid security framework for wireless sensor networks
H Sedjelmaci, SM Senouci
2014 IEEE international conference on communications (ICC), 3636-3641, 2014
A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection
EUH Qazi, A Almorjan, T Zia
Applied Sciences 12 (16), 7986, 2022
A continuous change detection mechanism to identify anomalies in ECG signals for WBAN-based healthcare environments
FA Khan, NAH Haldar, A Ali, M Iftikhar, TA Zia, AY Zomaya
IEEE Access 5, 13531-13544, 2017
Deep learning-based digital image forgery detection system
EUH Qazi, T Zia, A Almorjan
Applied Sciences 12 (6), 2851, 2022
Threat models and security issues in wireless sensor networks
IS Kocher, CO Chow, H Ishii, T Zia
International Journal of Computer Theory and Engineering 5 (5), 830-835, 2013
A zero-watermarking algorithm for privacy protection in biomedical signals
Z Ali, M Imran, M Alsulaiman, T Zia, M Shoaib
Future Generation Computer Systems 82, 290-303, 2018
Reputation-based trust management in wireless sensor networks
TA Zia
2008 International conference on intelligent sensors, sensor networks and …, 2008
HDLNIDS: hybrid deep-learning-based network intrusion detection system
EUH Qazi, MH Faheem, T Zia
Applied Sciences 13 (8), 4921, 2023
A secure triple-key management scheme for wireless sensor networks
T Zia, A Zomaya
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on …, 2006
A synopsis of simulation and mobility modeling in vehicular ad-hoc networks (VANETs)
SU Rehman, M Khan, T Zia, R Khokhar
IOSR Journal of Computer Engineering (IOSR-JCE) 15 (2), 1-16, 2013
A novel secure key management module for hierarchical clustering wireless sensor networks
IS Gawdan, CO Chow, TA Zia, QI Sarhan
2011 Third International Conference on Computational Intelligence, Modelling …, 2011
A data mining framework to predict cyber attack for cyber security
MA Rahman, Y Al-Saggaf, T Zia
2020 15th IEEE Conference on industrial electronics and applications (ICIEA …, 2020
D2MAC: Dynamic delayed Medium Access Control (MAC) protocol with fuzzy technique for Wireless Body Area Networks
N Mouzehkesh, T Zia, S Shafigh, L Zheng
2013 IEEE International Conference on Body Sensor Networks, 1-6, 2013
A quantitative analysis into the economics of correcting software bugs
CS Wright, TA Zia
Computational Intelligence in Security for Information Systems: 4th …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20