Ahmad, Mudassar
572  results:
Search for persons X
?
2

Poker Face Defense: Countering Passive Circuit Fingerprinti..:

, In: 2023 International Conference on IT and Industrial Technologies (ICIT),
 
?
4

Emotional States Detection Model from Handwriting by using ..:

, In: 2022 International Conference on Frontiers of Information Technology (FIT),
 
?
5

Digital Forensics as Advanced Ransomware Pre-Attack Detecti..:

Du, Jian ; Raza, Sajid Hussain ; Ahmad, Mudassar...
Security and Communication Networks.  2022 (2022)  - p. 1-16 , 2022
 
?
7

Development of a Machine Learning Model for Prediction of C..:

, In: 2022 International Conference on Frontiers of Information Technology (FIT),
Nadeem, Khadija ; Ahmad, Mudassar ; Javed, Zafar. - p. 296-301 , 2022
 
?
8

Effect of Encryption Delay on FTP and VoIP Traffic Based on..:

, In: Lecture Notes in Networks and Systems; Proceedings of International Conference on Information Technology and Applications,
 
?
11

Cyber Automated Network Resilience Defensive Approach again..:

, In: 2022 International Conference on Frontiers of Information Technology (FIT),
 
?
13

Evaluation of Selective Reactive Routing Protocols of Mobil..:

, In: Lecture Notes in Networks and Systems; Proceedings of International Conference on Information Technology and Applications,
 
?
14

Development of An Automated Accessibility Evaluation Plugin..:

, In: 2022 3rd International Conference on Innovations in Computer Science & Software Engineering (ICONICS),
 
?
15

Dynamic Naming Scheme and Lookup Method Based on Trie for V..:

Ashraf, M. Wasim Abbas ; Huang, Chuanhe ; Khalid, Shehzad...
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-13 , 2022
 
1-15