Follow
Sabah Suhail
Title
Cited by
Cited by
Year
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
F Zafar, A Khan, S Suhail, I Ahmed, K Hameed, HM Khan, F Jabeen, ...
Journal of network and computer applications 94, 50-68, 2017
1132017
Trustworthy digital twins in the industrial internet of things with blockchain
S Suhail, R Hussain, R Jurdak, CS Hong
IEEE Internet Computing 26 (3), 58-67, 2021
1042021
A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints
M Kamran, S Suhail, M Farooq
IEEE Transactions on Knowledge and Data Engineering 25 (12), 2694-2707, 2013
752013
Blockchain-based digital twins: research trends, issues, and future challenges
S Suhail, R Hussain, R Jurdak, A Oracevic, K Salah, CS Hong, ...
ACM Computing Surveys (CSUR) 54 (11s), 1-34, 2022
722022
On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions
S Suhail, R Hussain, A Khan, CS Hong
IEEE Internet of Things Journal 8 (1), 1-17, 2020
632020
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space
S Suhail, R Hussain, A Khan, CS Hong
Computers in Industry 123, 103334, 2020
482020
Introducing secure provenance in IoT: Requirements and challenges
S Suhail, CS Hong, ZU Ahmad, F Zafar, A Khan
2016 International Workshop on Secure Internet of Things (SIoT), 39-46, 2016
432016
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins
S Suhail, SUR Malik, R Jurdak, R Hussain, R Matulevičius, D Svetinovic
Computers in Industry 141, 103699, 2022
412022
ENIGMA: An explainable digital twin security solution for cyber–physical systems
S Suhail, M Iqbal, R Hussain, R Jurdak
Computers in Industry 151, 103961, 2023
33*2023
Data trustworthiness in IoT
S Suhail, CS Hong, MA Lodhi, F Zafar, A Khan, F Bashir
2018 International Conference on Information Networking (ICOIN), 414-419, 2018
272018
τ-safety: A privacy model for sequential publication with arbitrary updates
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
272017
Provenance-enabled packet path tracing in the RPL-based internet of things
S Suhail, R Hussain, M Abdellatif, SR Pandey, A Khan, CS Hong
Computer Networks 173, 107189, 2020
262020
Buyer seller watermarking protocols issues and challenges–a survey
A Khan, F Jabeen, F Naz, S Suhail, M Ahmed, S Nawaz
Journal of Network and Computer Applications 75, 317-334, 2016
162016
Towards trusted and intelligent cyber-physical systems: A security-by-design approach
S Suhail, R Jurdak
arXiv preprint arXiv:2105.08886, 2021
7*2021
Detection of malicious node in rpl-based internet of things through provenance
S Suhail, SR Pandey, CS Hong
한국정보과학회 학술발표논문집, 1171-1173, 2018
42018
A secure provenance-aware model for internet of things
S Suhail, CS Hong
한국정보과학회 학술발표논문집, 1154-1156, 2016
42016
Watermarking of relational databases with emphasis on re-watermarking attack
S Suhail, M Kamran, F Arif
International Journal of Computer Science 9 (1), 2012
42012
Detection of selective forwarding attack in RPL-based internet of things through provenance
S Suhail, SR Pandey, CS Hong
한국정보과학회 학술발표논문집, 965-967, 2018
22018
Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW)
S Suhail, CS Hong
한국정보과학회 학술발표논문집, 769-771, 2016
22016
Trust Evaluation of Blockchain-Based Cryptocurrencies: The Cases of Bitcoin and Diem
N Elsokkary, MH ur Rehman, S Suhail, H Kaindl, D Svetinovic
2022 International Balkan Conference on Communications and Networking …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20