Cryptographically generated addresses (CGAs): A survey and an analysis of performance for use in mobile environment S Qadir, MU Siddiqi IJCSNS Int. J. Comput. Sci. Netw. Secur 11 (2), 24-31, 2011 | 28 | 2011 |
Forensic analysis of tor browser on windows 10 and android 10 operating systems MR Arshad, M Hussain, H Tahir, S Qadir, FIA Memon, Y Javed IEEE Access 9, 141273-141294, 2021 | 20 | 2021 |
Applications of machine learning in digital forensics S Qadir, B Noor 2021 International Conference on Digital Futures and Transformative …, 2021 | 20 | 2021 |
Performance evaluation of a secure low level reader protocol (LLRP) connection S Qadir, MU Siddiqi IJCSNS 9 (3), 40, 2009 | 9 | 2009 |
An investigation of the Merkle signature scheme for cryptographically generated address signatures in mobile IPv6 S Qadir, MU Siddiqi, WFM Al-Khateeb International Journal of Network Security 17 (3), 311-321, 2015 | 5 | 2015 |
A study of CGA-(cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node S Qadir, MU Siddiqi, F Anwar 2012 International Conference on Computer and Communication Engineering …, 2012 | 4 | 2012 |
Securing a Low level reader protocol connection and a study of its performance S Qadir, MU Siddiqi 2009 International Conference on Future Computer and Communication, 513-517, 2009 | 4 | 2009 |
An Evaluation Framework For Digital Image Forensics Tools Z Khalid, S Qadir Journal of Digital Forensics, Security and Law 17 (2), 4, 2022 | 1 | 2022 |
Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset M Waheed, S Qadir Security and Communication Networks 2024, 2024 | | 2024 |
Machine Learning and Deep Learning Based Model for the Detection of Rootkits Using Memory Analysis B Noor, S Qadir Applied Sciences 13 (19), 10730, 2023 | | 2023 |
Security and Usability Analysis of Online Banking Applications in Pakistan M Darwaish, S Qadir 2022 19th International Bhurban Conference on Applied Sciences and …, 2022 | | 2022 |
Machine Learning-based Detection of IoT Malware using System Call Data I Tahir, S Qadir | | 2022 |
Forensic Data Analysis of Delivery and Transport Applications SS Zehra, S Qadir 2022 International Conference on Cyber Warfare and Security (ICCWS), 62-68, 2022 | | 2022 |
Enhanced Cryptographically Generated Address (CGA) Algorithms for Mobile IPV6 S Qadir Kulliyyah of Engineering, International Islamic University Malaysia, 2016 | | 2016 |
Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks. S Qadir, MU Siddiqi, WFM Al-Khateeb Int. J. Netw. Secur. 17 (5), 535-547, 2015 | | 2015 |
An Investigation of Cryptographically Generated Address (CGA) Based Authentication for Mobile IPv6 S Qadir, MU Siddiqi 2014 International Conference on Computer and Communication Engineering, 300-303, 2014 | | 2014 |
Securing a Low Level Reader Protocol (LLRP) Connection and an Evaluation of Its Performance S Qadir Kulliyyah of Engineering, International Islamic University Malaysia, 2010 | | 2010 |