default search action
Mamoona Humayun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Maram Fahhad Almufareh, Muhammad Imran, Abdullah Khan, Mamoona Humayun, Muhammad Asim:
Automated Brain Tumor Segmentation and Classification in MRI Using YOLO-Based Deep Learning. IEEE Access 12: 16189-16207 (2024) - [j39]Mamoona Humayun, Noshina Tariq, Majed Alfayad, Muhammad Zakwan, Ghadah Alwakid, Mohammed Assiri:
Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey. IEEE Access 12: 25469-25490 (2024) - [j38]Fatima Al-Quayed, Zulfiqar Ahmad, Mamoona Humayun:
A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0. IEEE Access 12: 34800-34819 (2024) - [j37]Maram Fahaad Almufareh, Mamoona Humayun, Zulfiqar Ahmad, Asfandyar Khan:
An Intelligent LoRaWAN-Based IoT Device for Monitoring and Control Solutions in Smart Farming Through Anomaly Detection Integrated With Unsupervised Machine Learning. IEEE Access 12: 119072-119086 (2024) - [j36]Khulud Salem S. Alshudukhi, Farzeen Ashfaq, N. Z. Jhanjhi, Mamoona Humayun:
Blockchain-Enabled Federated Learning for Longitudinal Emergency Care. IEEE Access 12: 137284-137294 (2024) - [j35]Ghadah Alwakid, Mamoona Humayun, Walaa Gouda:
A Comparative Investigation of Transfer Learning Frameworks Using OCT Pictures for Retinal Disorder Identification. IEEE Access 12: 138510-138518 (2024) - [j34]Puneet Kumar, Dalwinder Singh, Mamoona Humayun, Ali Alqazzaz, Arun Malik, Ibrahim Alrashdi, Isha Batra, Ghadah Alwakid:
Enhanced Community Detection via Convolutional Neural Network: A Modified Approach Based on MRFasGCN Algorithm. IEEE Access 12: 146733-146748 (2024) - [j33]Ghadah Alwakid, Sidra Tahir, Mamoona Humayun, Walaa Gouda:
Improving Alzheimer's Detection With Deep Learning and Image Processing Techniques. IEEE Access 12: 153445-153456 (2024) - [j32]Attique Ur Rehman, Wasi Haider Butt, Tahir Muhammad Ali, Sabeen Javaid, Maram Fahhad Almufareh, Mamoona Humayun, Hameedur Rahman, Azka Mir, Momina Shaheen:
A Machine Learning-Based Framework for Accurate and Early Diagnosis of Liver Diseases: A Comprehensive Study on Feature Selection, Data Imbalance, and Algorithmic Performance. Int. J. Intell. Syst. 2024(1) (2024) - [j31]Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen, Ghadah Alwakid:
Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency. J. Cloud Comput. 13(1): 37 (2024) - [j30]Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani, Momina Shaheen:
A fog-edge-enabled intrusion detection system for smart grids. J. Cloud Comput. 13(1): 43 (2024) - [j29]Madhusmita Sahu, Rasmita Dash, Sambit Kumar Mishra, Mamoona Humayun, Majed Alfayad, Mohammed Assiri:
A deep transfer learning model for green environment security analysis in smart city. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101921 (2024) - [c4]Noshina Tariq, Rabia Khan, Maram Fahaad Almufareh, Mamoona Humayun, Momina Shaheen:
A Federated Learning Mechanism for Mitigating Selective Forwarding Attacks in RPL-Based Internet of Things. ICC Workshops 2024: 871-877 - 2023
- [j28]Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, Mamoona Humayun:
GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures. IEEE Access 11: 62697-62720 (2023) - [j27]Saurabh Adhikari, Tushar Kanti Gangopadhayay, Souvik Pal, D. Akila, Mamoona Humayun, Majed Alfayad, N. Z. Jhanjhi:
A Novel Machine Learning-Based Hand Gesture Recognition Using HCI on IoT Assisted Cloud Platform. Comput. Syst. Sci. Eng. 46(2): 2123-2140 (2023) - [j26]Mamoona Humayun, Danish Javed, N. Z. Jhanjhi, Maram Fahhad Almufareh, Saleh Naif Almuayqil:
Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis. Comput. Syst. Sci. Eng. 47(1): 575-591 (2023) - [j25]Mamoona Humayun, Mahmood Niazi, Noor Zaman Jhanjhi, Sajjad Mahmood, Mohammad R. Alshayeb:
Toward a readiness model for secure software coding. Softw. Pract. Exp. 53(4): 1013-1035 (2023) - 2022
- [j24]Muhammad Attaullah, Mushtaq Ali, Maram Fahhad Almufareh, Muneer Ahmad, Lal Hussain, NZ Jhanjhi, Mamoona Humayun:
Initial Stage COVID-19 Detection System Based on Patients' Symptoms and Chest X-Ray Images. Appl. Artif. Intell. 36(1) (2022) - [j23]Mamoona Humayun, Mohammed Saleh Alsaqer, NZ Jhanjhi:
Energy Optimization for Smart Cities Using IoT. Appl. Artif. Intell. 36(1) (2022) - [j22]Rao Nadeem, Rana M. Amir Latif, Khalid Hussain, N. Z. Jhanjhi, Mamoona Humayun:
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework. Open Comput. Sci. 12(1): 364-377 (2022) - [j21]Vasaki Ponnusamy, Aun Yichiet, N. Z. Jhanjhi, Mamoona Humayun, Maram Fahhad Almufareh:
IoT Wireless Intrusion Detection and Network Traffic Analysis. Comput. Syst. Sci. Eng. 40(3): 865-879 (2022) - [j20]Mamoona Humayun, Ahmed Alsayat:
Prediction Model for Coronavirus Pandemic Using Deep Learning. Comput. Syst. Sci. Eng. 40(3): 947-961 (2022) - [j19]Vasaki Ponnusamy, Mamoona Humayun, N. Z. Jhanjhi, Aun Yichiet, Maram Fahhad Almufareh:
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. Comput. Syst. Sci. Eng. 40(3): 1199-1215 (2022) - [j18]Sajid Latif, Mamoona Humayun, Abida Sharif, Seifedine Nimer Kadry:
Resource discovery and scalability-aware routing in cloud federation using distributed meta-brokering paradigm. Int. J. Web Grid Serv. 18(1): 34-61 (2022) - [j17]Ata Ullah, Muhammad Azeem, Humaira Ashraf, N. Z. Jhanjhi, Lewis Nkenyereye, Mamoona Humayun:
Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT-Enabled WSN. IEEE Internet Things J. 9(4): 2669-2677 (2022) - [j16]Sadia Ali, Yaser Hafeez, Mamoona Humayun, N. Z. Jhanjhi, Dac-Nhuong Le:
Towards aspect based requirements mining for trace retrieval of component-based software management process in globally distributed environment. Inf. Technol. Manag. 23(3): 151-165 (2022) - [j15]Mamoona Humayun, Noor Zaman Jhanjhi, Abdullah Almotilag, Maram Fahhad Almufareh:
Agent-Based Medical Health Monitoring System. Sensors 22(8): 2820 (2022) - [j14]Syeda Mariam Muzammal, Raja Kumar Murugesan, Noor Zaman Jhanjhi, Mamoona Humayun, Ashraf Osman Ibrahim, Abdelzahir Abdelmaboud:
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things. Sensors 22(18): 7052 (2022) - 2021
- [j13]Ata Ullah, Muhammad Azeem, Humaira Ashraf, Abdulellah A. Alaboudi, Mamoona Humayun, N. Z. Jhanjhi:
Secure Healthcare Data Aggregation and Transmission in IoT - A Survey. IEEE Access 9: 16849-16865 (2021) - [j12]Muhammad Azeem, Ata Ullah, Humaira Ashraf, N. Z. Jhanjhi, Mamoona Humayun, Sultan Aljahdali, Thamer A. Tabbakh:
FoG-Oriented Secure and Lightweight Data Aggregation in IoMT. IEEE Access 9: 111072-111082 (2021) - [j11]Ata Ullah, Nagina Ishaq, Muhammad Azeem, Humaira Ashraf, N. Z. Jhanjhi, Mamoona Humayun, Thamer A. Tabbakh, Zahrah A. Almusaylim:
A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks. IEEE Access 9: 126324-126336 (2021) - [j10]N. Z. Jhanjhi, Mamoona Humayun, Saleh Naif Almuayqil:
Cyber Security and Privacy Issues in Industrial Internet of Things. Comput. Syst. Sci. Eng. 37(3): 361-380 (2021) - [j9]Syed Jawad Hussain, Muhammad Irfan, N. Z. Jhanjhi, Khalid Hussain, Mamoona Humayun:
Performance Enhancement in Wireless Body Area Networks with Secure Communication. Wirel. Pers. Commun. 116(1): 1-22 (2021) - 2020
- [j8]Sadia Ali, Yaser Hafeez, N. Z. Jhanjhi, Mamoona Humayun, Muhammad Imran, Anand Nayyar, Saurabh Singh, In-Ho Ra:
Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based. IEEE Access 8: 148007-148020 (2020) - [j7]Sambit Kumar Mishra, Sonali Mishra, Ahmed Alsayat, N. Z. Jhanjhi, Mamoona Humayun, Kshira Sagar Sahoo, Ashish Kumar Luhach:
Energy-Aware Task Allocation for Multi-Cloud Networks. IEEE Access 8: 178825-178834 (2020) - [j6]Mamoona Humayun, N. Z. Jhanjhi, Madallah Alruwaili, Sagaya Sabestinal Amalathas, Venki Balasubramanian, Buvana Selvaraj:
Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things. IEEE Access 8: 183665-183677 (2020) - [j5]Azeem Khan, NZ Jhanjhi, Mamoona Humayun:
Secure Smart and Remote Multipurpose Attendance Monitoring System. EAI Endorsed Trans. Energy Web 7(30): e5 (2020) - [j4]Muneeb Ali Hamid, Yaser Hafeez, Bushra Hamid, Mamoona Humayun, N. Z. Jhanjhi:
Towards an effective approach for architectural knowledge management considering global software development. Int. J. Grid Util. Comput. 11(6): 780-791 (2020) - [j3]Mamoona Humayun, N. Z. Jhanjhi, Bushra Hamid, Ghufran Ahmed:
Emerging Smart Logistics and Transportation Using IoT and Blockchain. IEEE Internet Things Mag. 3(2): 58-62 (2020)
2010 – 2019
- 2016
- [j2]Syed Asad Ali Shah, Raja Khaim Shahzad, Syed Shafique Ali Bukhari, Nasir Mehmood Minhas, Mamoona Humayun:
A Review of Class Based Test Case Generation Techniques. J. Softw. 11(5): 464-480 (2016) - 2015
- [c3]Sajjad Rafique, Mamoona Humayun, Bushra Hamid, Ansar Abbas, Muhammad Akhtar, Kamil Iqbal:
Web application security vulnerabilities detection approaches: A systematic mapping study. SNPD 2015: 469-474 - 2013
- [j1]Mamoona Humayun, Gang Cui:
An Empirical Study of the Complex Relationship between KMR and Trust in GSD. J. Softw. 8(4): 776-784 (2013) - [c2]Mamoona Humayun, Gang Cui, Isma Masood:
An empirical study on investigating the role of KMS in promoting trust within GSD teams. EASE 2013: 207-211 - 2012
- [c1]Mamoona Humayun, Gang Cui:
An Empirical Study on Improving Trust among GSD Teams Using KMR. SEKE 2012: 131-134
Coauthor Index
aka: Maram Fahhad Almufareh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint