[go: up one dir, main page]

Follow
Adnan Akhunzada, PhD (Senior Member, IEEE)
Adnan Akhunzada, PhD (Senior Member, IEEE)
Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% Scientist
Verified email at dtu.dk - Homepage
Title
Cited by
Cited by
Year
A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks
S Haider, A Akhunzada, I Mustafa, TB Patel, A Fernandez, KKR Choo, ...
Ieee Access 8, 53972-53983, 2020
3122020
Securing software defined networks: taxonomy, requirements, and open issues
A Akhunzada, E Ahmed, A Gani, MK Khan, M Imran, S Guizani
IEEE Communications Magazine 53 (4), 36-44, 2015
2492015
Secure and dependable software defined networks
A Akhunzada, A Gani, NB Anuar, A Abdelaziz, MK Khan, A Hayat, ...
Journal of Network and Computer Applications 61, 199-221, 2016
1652016
Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues
M Sookhak, A Gani, H Talebian, A Akhunzada, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 47 (4), 1-34, 2015
1542015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
A Akhunzada, M Sookhak, NB Anuar, A Gani, E Ahmed, M Shiraz, ...
Journal of Network and Computer Applications 48, 44-57, 2015
1462015
Fake news outbreak 2021: Can we stop the viral spread?
T Khan, A Michalas, A Akhunzada
Journal of Network and Computer Applications 190, 103112, 2021
1442021
Network-centric performance analysis of runtime application migration in mobile cloud computing
E Ahmed, A Akhunzada, M Whaiduzzaman, A Gani, SH Ab Hamid, ...
Simulation Modelling Practice and Theory 50, 42-56, 2015
1422015
Hybrid deep learning: An efficient reconnaissance and surveillance detection mechanism in SDN
J Malik, A Akhunzada, I Bibi, M Imran, A Musaddiq, SW Kim
IEEE Access 8, 134695-134706, 2020
1302020
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
S Liaqat, A Akhunzada, FS Shaikh, A Giannetsos, MA Jan
Computer Communications 160, 697-705, 2020
1262020
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)
S Khan, A Akhunzada
Computer Communications 170, 209-216, 2021
1242021
A comprehensive analysis of congestion control protocols in wireless sensor networks
MA Jan, SRU Jan, M Alam, A Akhunzada, IU Rahman
Mobile networks and applications 23 (3), 456-468, 2018
972018
Impact analysis and change propagation in service-oriented enterprises: A systematic review
KA Alam, R Ahmad, A Akhunzada, MHNM Nasir, SU Khan
Information Systems 54, 43-73, 2015
972015
Distributed controller clustering in software defined networks
A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ...
PloS one 12 (4), e0174715, 2017
962017
A novel intrusion detection framework for optimizing IoT security
A Qaddos, MU Yaseen, AS Al-Shamayleh, M Imran, A Akhunzada, ...
Scientific Reports 14 (1), 21789, 2024
922024
An approach towards IoT-based predictive service for early detection of diseases in poultry chickens
G Ahmed, RAS Malick, A Akhunzada, S Zahid, MR Sagri, A Gani
Sustainability 13 (23), 13396, 2021
892021
Energy and performance aware fog computing: A case of DVFS and green renewable energy
A Toor, S ul Islam, N Sohail, A Akhunzada, J Boudjadar, HA Khattak, ...
Future Generation Computer Systems 101, 1112-1121, 2019
872019
A dynamic DL-driven architecture to combat sophisticated Android malware
I Bibi, A Akhunzada, J Malik, J Iqbal, A Musaddiq, S Kim
IEEE Access 8, 129600-129612, 2020
782020
Trust and reputation management in healthcare systems: taxonomy, requirements and open issues
F Jabeen, Z Hamid, A Akhunzada, W Abdul, S Ghouzali
IEEE Access 6, 17246-17263, 2018
762018
QoS-aware service provisioning in fog computing
F Murtaza, A Akhunzada, S ul Islam, J Boudjadar, R Buyya
Journal of Network and Computer Applications 165, 102674, 2020
732020
A cross tenant access control (CTAC) model for cloud computing: formal specification and verification
Q Alam, SUR Malik, A Akhunzada, KKR Choo, S Tabbasum, M Alam
IEEE Transactions on Information Forensics and Security 12 (6), 1259-1268, 2016
672016
The system can't perform the operation now. Try again later.
Articles 1–20