Chaudhry, Junaid
99  results:
Search for persons X
?
 
?
3

Cyber Security in Operation Technologies:

Chaudhry, Junaid
IEEE Technology Policy and Ethics.  5 (2020)  6 - p. 1-4 , 2020
 
?
 
?
7

Correction to: A security review of local government using ..:

Ibrahim, Ahmed ; Valli, Craig ; McAteer, Ian.
The Journal of Supercomputing.  75 (2019)  9 - p. 6158-6158 , 2019
 
?
 
?
9

Securing Big Data from Eavesdropping Attacks in SCADA/ICS N..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Emerging Technologies in Computing,
 
?
10

Network Performance Enhancement of Multi-sink Enabled Low P..:

Shabbir, Ghulam ; Akram, Adeel ; Iqbal, Muhammad Munwar...
International Journal of Parallel Programming.  48 (2018)  2 - p. 367-398 , 2018
 
?
 
?
12

A Survey of Distributed Certificate Authorities in MANETs:

Chaudhry, Junaid ; Saleem, Kashif ; Haskell-Dowland, Paul.
Annals of Emerging Technologies in Computing.  2 (2018)  3 - p. 11-18 , 2018
 
?
13

Using casual reasoning for anomaly detection among ECG live..:

Qidwai, Uvais ; Chaudhry, Junaid ; Jabbar, Sohail...
Journal of Ambient Intelligence and Humanized Computing.  10 (2018)  10 - p. 4085-4097 , 2018
 
1-15