
Sherali Zeadally
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j289]Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - 2020
- [j288]Sherali Zeadally
, Erwin Adi
, Zubair A. Baig
, Imran A. Khan
:
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access 8: 23817-23837 (2020) - [j287]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j286]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j285]Mohammad Aazam
, Sherali Zeadally, Khaled A. Harras:
Health Fog for Smart Healthcare. IEEE Consumer Electron. Mag. 9(2): 96-102 (2020) - [j284]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo
:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j283]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Networks 183: 107593 (2020) - [j282]Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. Comput. Commun. 151: 395-418 (2020) - [j281]Tejasvi Alladi, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 155: 1-8 (2020) - [j280]Sherali Zeadally, Muhammad Awais Javed, Elyes Ben Hamida:
Vehicular Communications for ITS: Standardization and Challenges. IEEE Commun. Stand. Mag. 4(1): 11-17 (2020) - [j279]Gerasimos Razis
, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. ACM Comput. Surv. 53(1): 7:1-7:38 (2020) - [j278]Max Ismailov, Michail Tsikerdekis
, Sherali Zeadally
:
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Future Internet 12(9): 148 (2020) - [j277]Sherali Zeadally
, Michail Tsikerdekis:
Securing Internet of Things (IoT) with machine learning. Int. J. Commun. Syst. 33(1) (2020) - [j276]Sudeep Tanwar
, Shriya Kaneriya, Neeraj Kumar
, Sherali Zeadally
:
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems. Int. J. Commun. Syst. 33(15) (2020) - [j275]Kayhan Zrar Ghafoor
, Linghe Kong, Sherali Zeadally, Ali Safaa Sadiq, Gregory Epiphaniou, Mohammad Hammoudeh
, Ali Kashif Bashir
, Shahid Mumtaz
:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j274]SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. J. Inf. Secur. Appl. 54: 102540 (2020) - [j273]Michail Tsikerdekis, Sherali Zeadally:
Detecting Online Content Deception. IT Prof. 22(2): 35-44 (2020) - [j272]Hai Lin, Sherali Zeadally, Zhihong Chen, Houda Labiod, Lusheng Wang:
A survey on computation offloading modeling for edge computing. J. Netw. Comput. Appl. 169: 102781 (2020) - [j271]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao
, Victor C. M. Leung
:
Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads. IEEE J. Sel. Areas Commun. 38(6): 1118-1132 (2020) - [j270]Erwin Adi, Adnan Anwar, Zubair A. Baig
, Sherali Zeadally:
Machine learning and data analytics for the IoT. Neural Comput. Appl. 32(20): 16205-16233 (2020) - [j269]Adnan Akhunzada, Saif ul Islam, Sherali Zeadally:
Securing Cyberspace of Future Smart Cities with 5G Technologies. IEEE Netw. 34(4): 336-342 (2020) - [j268]Umair Sarfraz
, Sherali Zeadally
, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. Secur. Priv. 3(2) (2020) - [j267]Badis Hammi
, Achraf Fayad, Rida Khatoun, Sherali Zeadally
, Youcef Begriche:
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 14(3): 3440-3450 (2020) - [j266]Sherali Zeadally
, Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo:
A tutorial survey on vehicle-to-vehicle communications. Telecommun. Syst. 73(3): 469-489 (2020) - [j265]Sehrish Shafeeq
, Sherali Zeadally
, Masoom Alam
, Abid Khan
:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020) - [j264]Qi Feng, Debiao He
, Sherali Zeadally
, Kaitai Liang
:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j263]Honggang Wang
, Shui Yu
, Sherali Zeadally
, Danda B. Rawat
, Yue Gao
:
Introduction to the Special Section on Network Science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7(1): 237-238 (2020) - [j262]Hesham El-Sayed, Sherali Zeadally, Deepak Puthal:
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh. Commun. 24: 100227 (2020) - [j261]D. Manivannan, Shafika Showkat Moni, Sherali Zeadally:
Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 25: 100247 (2020) - [p1]Jawwad A. Shamsi, Muhammad Hanif, Sherali Zeadally:
Fog Computing: Data Analytics for Time-Sensitive Applications. Convergence of Artificial Intelligence and the Internet of Things 2020: 1-13 - [i9]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications. CoRR abs/2007.01052 (2020) - [i8]Erwin Adi, Adnan Anwar, Zubair A. Baig, Sherali Zeadally:
Machine learning and data analytics for the IoT. CoRR abs/2007.04093 (2020) - [i7]Jacques Bou Abdo, Sherali Zeadally:
Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development. CoRR abs/2007.07096 (2020) - [i6]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
Survey on Congestion Detection and Control in Connected Vehicles. CoRR abs/2007.14896 (2020)
2010 – 2019
- 2019
- [j260]Zhiwei Yan
, Hongtao Li, Sherali Zeadally, Yu Zeng, Guanggang Geng
:
Is DNS Ready for Ubiquitous Internet of Things? IEEE Access 7: 28835-28846 (2019) - [j259]Hesham El-Sayed
, Moumena Chaqfeh, Sherali Zeadally, Deepak Puthal:
A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios. IEEE Access 7: 86297-86305 (2019) - [j258]Leila Ismail
, Huned Materwala
, Sherali Zeadally:
Lightweight Blockchain for Healthcare. IEEE Access 7: 149935-149951 (2019) - [j257]Sherali Zeadally
, Teodora Sanislav
, George Dan Mois
:
Self-Adaptation Techniques in Cyber-Physical Systems (CPSs). IEEE Access 7: 171126-171139 (2019) - [j256]Shidrokh Goudarzi, Nazri Kama, Mohammad Hossein Anisi
, Sherali Zeadally, Shahid Mumtaz
:
Data collection using unmanned aerial vehicles for Internet of Things platforms. Comput. Electr. Eng. 75: 1-15 (2019) - [j255]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das
:
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. IEEE Consumer Electron. Mag. 8(2): 56-60 (2019) - [j254]Alfredo J. Perez, Sherali Zeadally:
A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios. IEEE Commun. Mag. 57(4): 54-60 (2019) - [j253]Umair Sarfraz
, Masoom Alam, Sherali Zeadally, Abid Khan
:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Networks 148: 361-372 (2019) - [j252]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally:
Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Networks 165 (2019) - [j251]Rasheed Hussain
, Sherali Zeadally
:
Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutorials 21(2): 1275-1313 (2019) - [j250]Teodora Sanislav
, Sherali Zeadally, George Dan Mois, Hacène Fouchal:
Reliability, failure detection and prevention in cyber-physical systems (CPSs) with agents. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j249]Badis Hammi
, Sherali Zeadally, Rida Khatoun:
An empirical investigation of botnet as a service for cyberattacks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j248]Oladayo Bello, Sherali Zeadally:
Toward efficient smartification of the Internet of Things (IoT) services. Future Gener. Comput. Syst. 92: 663-673 (2019) - [j247]Rasheed Hussain, Fatima Hussain, Sherali Zeadally:
Integration of VANET and 5G Security: A review of design and implementation issues. Future Gener. Comput. Syst. 101: 843-864 (2019) - [j246]Sherali Zeadally, Farhan Siddiqui, Zubair A. Baig
:
25 Years of Bluetooth Technology. Future Internet 11(9): 194 (2019) - [j245]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao:
Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing. IEEE Commun. Lett. 23(1): 4-7 (2019) - [j244]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7 (2019) - [j243]Rajat Chaudhary
, Gagangeet Singh Aujla
, Neeraj Kumar
, Sherali Zeadally
:
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions. IEEE Internet Things J. 6(3): 4897-4909 (2019) - [j242]Sherali Zeadally
, Jacques Bou Abdo:
Blockchain: Trends and future opportunities. Internet Technol. Lett. 2(6) (2019) - [j241]Fidel Paniagua Diez
, Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally:
Lightweight Access Control System for Wearable Devices. IT Prof. 21(1): 50-58 (2019) - [j240]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
Autonomous Cars: Challenges and Opportunities. IT Prof. 21(6): 6-13 (2019) - [j239]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j238]Maxim Chernyshev
, Sherali Zeadally, Zubair Ahmed Baig
:
Healthcare Data Breaches: Implications for Digital Forensic Readiness. J. Medical Syst. 43(1): 7:1-7:12 (2019) - [j237]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar
:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j236]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. Secur. Commun. Networks 2019: 4836016:1-4836016:12 (2019) - [j235]Qi Feng, Debiao He
, Sherali Zeadally
, Neeraj Kumar
, Kaitai Liang
:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j234]Mohammad Aazam
, Khaled A. Harras
, Sherali Zeadally
:
Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model. IEEE Trans. Ind. Informatics 15(5): 3085-3092 (2019) - [j233]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao, Victor C. M. Leung
:
MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence. IEEE Trans. Ind. Informatics 15(7): 4216-4224 (2019) - [j232]Shama Naz Islam
, Zubair A. Baig
, Sherali Zeadally
:
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures. IEEE Trans. Ind. Informatics 15(12): 6522-6530 (2019) - [j231]Muhammad Awais Javed
, Sherali Zeadally, Elyes Ben Hamida:
Data analytics for Cooperative Intelligent Transport Systems. Veh. Commun. 15: 63-72 (2019) - [c52]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - [c51]Ting-Mei Li, Wei-Xiang Shen, Han-Chieh Chao, Sherali Zeadally:
Analysis of Students' Learning Emotions Using EEG. ICITL 2019: 498-504 - [i5]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model. CoRR abs/1906.04219 (2019) - [i4]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A Survey on Hardware-based Security Mechanisms for Internet of Things. CoRR abs/1907.12525 (2019) - 2018
- [j230]Yi Yang, Debiao He
, Neeraj Kumar
, Sherali Zeadally:
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks. IEEE Access 6: 40128-40136 (2018) - [j229]Mohammad Zaeri-Amirani, Fatemeh Afghah
, Sherali Zeadally:
A Hierarchical Spectrum Access Scheme for TV White Space Coexistence in Heterogeneous Networks. IEEE Access 6: 78992-79004 (2018) - [j228]Nafaâ Jabeur, Ahmed Nait-Sidi-Moh
, Sherali Zeadally:
Crowd social media computing: Applying crowd computing techniques to social media. Appl. Soft Comput. 66: 495-505 (2018) - [j227]Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally:
Structural analysis and classification of search interfaces for the deep web. Comput. J. 61(3): 386-398 (2018) - [j226]Syed Adeel Ali Shah
, Ejaz Ahmed, Muhammad Imran, Sherali Zeadally:
5G for Vehicular Communications. IEEE Commun. Mag. 56(1): 111-117 (2018) - [j225]Mohammad Aazam
, Sherali Zeadally, Khaled A. Harras:
Fog Computing Architecture, Evaluation, and Future Research Directions. IEEE Commun. Mag. 56(5): 46-52 (2018) - [j224]Kübra Kalkan, Sherali Zeadally:
Securing Internet of Things with Software Defined Networking. IEEE Commun. Mag. 56(9): 186-192 (2018) - [j223]Furqan Jameel, Shurjeel Wyne
, Muhammad Awais Javed, Sherali Zeadally:
Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges. IEEE Commun. Mag. 56(10): 36-42 (2018) - [j222]Muhammad Awais Javed
, Sherali Zeadally, Zara Hamid:
Trust-based security adaptation mechanism for Vehicular Sensor Networks. Comput. Networks 137: 27-36 (2018) - [j221]Furqan Jameel
, Zara Hamid, Farhana Jabeen
, Sherali Zeadally
, Muhammad Awais Javed
:
A Survey of Device-to-Device Communications: Research Issues and Challenges. IEEE Commun. Surv. Tutorials 20(3): 2133-2168 (2018) - [j220]Muhammad Awais Javed, Sherali Zeadally:
RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles. IEEE Commun. Stand. Mag. 2(4): 81-87 (2018) - [j219]Salim Bitam, Sherali Zeadally, Abdelhamid Mellouk:
Fog computing job scheduling optimization based on bees swarm. Enterp. Inf. Syst. 12(4): 373-397 (2018) - [j218]Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener. Comput. Syst. 84: 239-251 (2018) - [j217]Mohammad Aazam
, Sherali Zeadally, Khaled A. Harras:
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities. Future Gener. Comput. Syst. 87: 278-289 (2018) - [j216]Ashok Kumar Das
, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89: 110-125 (2018) - [j215]Stephanie Winkler, Sherali Zeadally, Katrine Evans:
Privacy and Civilian Drone Use: The Need for Further Regulation. IEEE Secur. Priv. 16(5): 72-80 (2018) - [j214]Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. IET Networks 7(1): 1-13 (2018) - [j213]Fatemeh Afghah
, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks. Int. J. Wirel. Inf. Networks 25(2): 117-129 (2018) - [j212]Maxim Chernyshev
, Zubair A. Baig
, Oladayo Bello, Sherali Zeadally
:
Internet of Things (IoT): Research, Simulators, and Testbeds. IEEE Internet Things J. 5(3): 1637-1647 (2018) - [j211]Juan Contreras-Castillo
, Sherali Zeadally
, Juan Antonio Guerrero Ibáñez
:
Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet Things J. 5(5): 3701-3709 (2018) - [j210]Yudi Zhang
, Debiao He
, Sherali Zeadally
, Ding Wang
, Kim-Kwang Raymond Choo
:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [j209]Nikolai Hampton, Zubair A. Baig
, Sherali Zeadally:
Ransomware behavioural analysis on windows platforms. J. Inf. Secur. Appl. 40: 44-51 (2018) - [j208]Ngoc-Tu Nguyen
, Ming C. Leu, Sherali Zeadally, Bing-Hong Liu, Shao-I Chu:
Optimal solution for data collision avoidance in radio frequency identification networks. Internet Technol. Lett. 1(3) (2018) - [j207]Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig
, Andrew Woodward:
Internet of Things Forensics: The Need, Process Models, and Open Issues. IT Prof. 20(3): 40-49 (2018) - [j206]Alfredo J. Perez, Sherali Zeadally:
Privacy Issues and Solutions for Consumer Wearables. IT Prof. 20(4): 46-56 (2018) - [j205]Rasheed Hussain
, JooYoung Lee, Sherali Zeadally
:
Autonomous Cars: Social and Economic Implications. IT Prof. 20(6): 70-77 (2018) - [j204]Alfredo J. Perez, Sherali Zeadally, Nafaâ Jabeur:
Security and Privacy in Ubiquitous Sensor Networks. J. Inf. Process. Syst. 14(2): 286-308 (2018) - [j203]Talal H. Noor, Sherali Zeadally, Abdullah Alfazi, Quan Z. Sheng
:
Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 115: 70-85 (2018) - [j202]Teodora Sanislav, Sherali Zeadally, George Dan Mois, Silviu C. Folea:
Wireless energy harvesting: Empirical results and practical considerations for Internet of Things. J. Netw. Comput. Appl. 121: 149-158 (2018) - [j201]Alfredo J. Perez
, Sherali Zeadally, Jonathan Cochran:
A review and an empirical analysis of privacy policy and notices for consumer Internet of things. Secur. Priv. 1(3) (2018) - [j200]Juan Antonio Guerrero Ibáñez, Sherali Zeadally, Juan Contreras-Castillo
:
Sensor Technologies for Intelligent Transportation Systems. Sensors 18(4): 1212 (2018) - [j199]George Dan Mois
, Teodora Sanislav
, Silviu C. Folea
, Sherali Zeadally:
Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT). Sensors 18(6): 1709 (2018) - [j198]Debiao He, Sherali Zeadally, Libing Wu:
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 12(1): 64-73 (2018) - [j197]Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He
:
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22(23): 7685-7696 (2018) - [j196]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das
, Mohammad Wazid
, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j195]Debiao He
, Neeraj Kumar
, Sherali Zeadally
, Huaqun Wang
:
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems. IEEE Trans. Ind. Informatics 14(3): 1232-1241 (2018) - [j194]Debiao He
, Mimi Ma
, Sherali Zeadally
, Neeraj Kumar
, Kaitai Liang
:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [j193]Mohammad Aazam
, Sherali Zeadally
, Khaled A. Harras:
Deploying Fog Computing in Industrial Internet of Things and Industry 4.0. IEEE Trans. Ind. Informatics 14(10): 4674-4682 (2018) - [j192]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He
:
Privacy-preserving auditing scheme for shared data in public clouds. J. Supercomput. 74(11): 6156-6183 (2018) - [c50]Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos
:
Approaches for Preventing Honeypot Detection and Compromise. GIIS 2018: 1-6 - 2017
- [b1]Jesús Téllez Isaac, Sherali Zeadally:
Mobile Payment Systems - Secure Network Architectures and Protocols. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-23032-0, pp. 1-117 - [j191]Zhiwei Yan
, Guanggang Geng, Sherali Zeadally, Yong-Jin Park
:
Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay. IEEE Access 5: 243-251 (2017) - [j190]Xiaoying Jia, Debiao He
, Sherali Zeadally, Li Li:
Efficient Revocable ID-Based Signature With Cloud Revocation Server. IEEE Access 5: 2945-2954 (2017) - [j189]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He
:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j188]Zhenjiang Zhang
, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao:
Multiple Attributes Decision Fusion for Wireless Sensor Networks Based on Intuitionistic Fuzzy Set. IEEE Access 5: 12798-12809 (2017) - [j187]Oladayo Bello, Sherali Zeadally, Mohamad Badra:
Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT). Ad Hoc Networks 57: 52-62 (2017) - [j186]Mohamad Badra, Sherali Zeadally:
Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid. Ad Hoc Networks 64: 32-40 (2017) - [j185]Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid
:
Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63: 196-208 (2017) - [j184]Rida Khatoun, Sherali Zeadally:
Cybersecurity and Privacy Solutions in Smart Cities. IEEE Commun. Mag. 55(3): 51-59 (2017) - [j183]Aditya K. Sood, Sherali Zeadally, Rohit Bansal:
Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels. IEEE Commun. Mag. 55(7): 22-28 (2017) - [j182]Rajat Chaudhary, Neeraj Kumar
, Sherali Zeadally:
Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges. IEEE Commun. Mag. 55(11): 114-122 (2017) - [j181]Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Comput. Networks 128: 154-163 (2017)