default search action
Kashif Kifayat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Kashif Alam, Kashif Kifayat, Gabriel Avelino R. Sampedro, Vincent Karovic, Tariq Naeem:
SXAD: Shapely eXplainable AI-Based Anomaly Detection Using Log Data. IEEE Access 12: 95659-95672 (2024) - [j26]Hameedur Rahman, Uzair Muzamil Shah, Syed Morsleen Riaz, Kashif Kifayat, Syed Atif Moqurrab, Joon Yoo:
Digital twin framework for smart greenhouse management using next-gen mobile networks and machine learning. Future Gener. Comput. Syst. 156: 285-300 (2024) - [j25]Khush Bakhat, Kashif Kifayat, M. Shujah Islam, M. Mattah Islam:
Utilizing CPG-3D, graph theory anchored approach to recognize human action recognition. Multim. Tools Appl. 83(17): 51699-51714 (2024) - 2023
- [j24]Muhammad Aqib Anwar, Syed Fahad Tahir, Labiba Gillani Fahad, Kashif Kifayat:
Image forgery detection by transforming local descriptors into deep-derived features. Appl. Soft Comput. 147: 110730 (2023) - [j23]Muhammad Sangeen, Naveed Anwar Bhatti, Kashif Kifayat, Abeer Abdullah Alsadhan, Haoda Wang:
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks. Comput. Commun. 209: 359-367 (2023) - [j22]Ali Muhammad, Iqbal Murtza, Ayesha Saadia, Kashif Kifayat:
Cortex-inspired ensemble based network intrusion detection system. Neural Comput. Appl. 35(21): 15415-15428 (2023) - [j21]Khush Bakhat, Kashif Kifayat, M. Shujah Islam, M. Mattah Islam:
Katz centrality based approach to perform human action recognition by using OMKZ. Signal Image Video Process. 17(4): 1677-1685 (2023) - 2022
- [j20]Abdul Rehman Javed, Waqas Ahmed, Mamoun Alazab, Zunera Jalil, Kashif Kifayat, Thippa Reddy Gadekallu:
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions. IEEE Access 10: 11065-11089 (2022) - [j19]Khush Bakhat, Kashif Kifayat, M. Shujah Islam, M. Mattah Islam:
Human activity recognition based on an amalgamation of CEV & SGM features. J. Intell. Fuzzy Syst. 43(6): 7351-7362 (2022) - 2021
- [j18]Suleman Khan, Kashif Kifayat, Ali Kashif Bashir, Andrei V. Gurtov, Mehdi Hassan:
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j17]Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil, Kashif Kifayat:
A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76(1): 139-154 (2021) - 2020
- [j16]Hanaa Nafea, Kashif Kifayat, Qi Shi, Kashif Naseer Qureshi, Bob Askwith:
Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access 8: 1680-1690 (2020) - [j15]Syed Fahad Tahir, Labiba Gillani Fahad, Kashif Kifayat:
Key feature identification for recognition of activities performed by a smart-home resident. J. Ambient Intell. Humaniz. Comput. 11(5): 2105-2115 (2020) - [j14]Thomas Rose, Kashif Kifayat, Sohail Abbas, Muhammad Asim:
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. J. Parallel Distributed Comput. 145: 124-139 (2020)
2010 – 2019
- 2019
- [j13]Mehdi Hassan, Iqbal Murtza, Aysha Hira, Safdar Ali, Kashif Kifayat:
Robust spatial fuzzy GMM based MRI segmentation and carotid artery plaque detection in ultrasound images. Comput. Methods Programs Biomed. 175: 179-192 (2019) - [j12]Ghulam Abbas, Usman Raza, Zahid Halim, Kashif Kifayat:
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet. IET Networks 8(6): 372-380 (2019) - [j11]Sohail Abbas, Madjid Merabti, Kashif Kifayat, Thar Baker:
Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks. KSII Trans. Internet Inf. Syst. 13(12): 6214-6242 (2019) - [j10]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption. Sensors 19(7): 1695 (2019) - [c19]Haider Abbas, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan:
Security Safety and Trust Management (SSTM' 19). WETICE 2019: 196-197 - [e1]Zhigeng Pan, Adrian David Cheok, Wolfgang Müller, Mingmin Zhang, Abdennour El Rhalibi, Kashif Kifayat:
Transactions on Edutainment XV. Lecture Notes in Computer Science 11345, Springer 2019, ISBN 978-3-662-59350-9 [contents] - 2018
- [j9]Paul R. McWhirter, Kashif Kifayat, Qi Shi, Bob Askwith:
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel. J. Inf. Secur. Appl. 40: 199-216 (2018) - [c18]Ruqayah R. Al-Dahhan, Qi Shi, Gyu Myoung Lee, Kashif Kifayat:
Revocable, Decentralized Multi-Authority Access Control System. UCC Companion 2018: 220-225 - 2017
- [c17]Akeel A. Thlunoon, Kashif Kifayat:
Enforcing Access Control Models in System Applications by Using Aspect-Oriented Programming: A Literature Review. DeSE 2017: 100-105 - [c16]Áine MacDermott, Qi Shi, Kashif Kifayat:
Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. ICIC (3) 2017: 203-212 - [c15]Younis A. Younis, Kashif Kifayat, Abir Hussain:
Preventing and detecting cache side-channel attacks in cloud computing. ICC 2017: 83:1-83:8 - 2016
- [j8]Kirsty E. Lever, Kashif Kifayat:
Risk assessment and attack graph generation for collaborative infrastructures: a survey. Int. J. Crit. Comput. Based Syst. 6(3): 204-228 (2016) - [j7]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids. J. Sens. Actuator Networks 5(2): 9 (2016) - [c14]Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst:
A System for Intrusion Prediction in Cloud Computing. ICC 2016 2016: 35:1-35:9 - [c13]Bashar Ahmed Alohali, Kashif Kifayat, Qi Shi, William Hurst:
Replay Attack Impact on Advanced Metering Infrastructure (AMI). SmartGIFT 2016: 52-59 - 2015
- [j6]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Hosting critical infrastructure services in the cloud environment considerations. Int. J. Crit. Infrastructures 11(4): 365-381 (2015) - [c12]Younis A. Younis, Kashif Kifayat, Qi Shi, Bob Askwith:
A New Prime and Probe Cache Side-Channel Attack for Cloud Computing. CIT/IUCC/DASC/PICom 2015: 1718-1724 - [c11]Kirsty E. Lever, Áine MacDermott, Kashif Kifayat:
Evaluating Interdependencies and Cascading Failures Using Distributed Attack Graph Generation Methods for Critical Infrastructure Defence. DeSE 2015: 47-52 - [c10]Áine MacDermott, Qi Shi, Kashif Kifayat:
Detecting Intrusions in Federated Cloud Environments Using Security as a Service. DeSE 2015: 91-96 - 2014
- [j5]Younis A. Younis, Kashif Kifayat, Madjid Merabti:
An access control model for cloud computing. J. Inf. Secur. Appl. 19(1): 45-60 (2014) - [c9]Bashar Ahmed Alohali, Madjid Merabti, Kashif Kifayat:
A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid. NGMAST 2014: 326-330 - 2013
- [j4]Qi Shi, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [j3]Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. Secur. Commun. Networks 6(4): 461-472 (2013) - [j2]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [c8]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Misbehaviour monitoring on system-of-systems components. CRiSIS 2013: 1-6 - [c7]Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat:
Considering an elastic scaling model for cloud Security. ICITST 2013: 150-155 - [c6]Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat:
Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems. UIC/ATC 2013: 438-443 - 2011
- [c5]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - 2010
- [j1]Kashif Kifayat, Madjid Merabti, Qi Shi:
Future security challenges in cloud computing. Int. J. Multim. Intell. Secur. 1(4): 428-442 (2010) - [c4]Kashif Kifayat, Paul Fergus, Simon Cooper, Madjid Merabti:
Body Area Networks for Movement Analysis in Physiotherapy Treatments. AINA Workshops 2010: 866-872 - [c3]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [p1]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552
2000 – 2009
- 2009
- [c2]Paul Fergus, Kashif Kifayat, Simon Cooper, Madjid Merabti, Abdennour El Rhalibi:
A framework for physical health improvement using Wireless Sensor Networks and gaming. PervasiveHealth 2009: 1-4 - 2008
- [b1]Kashif Kifayat:
Group-based secure communication for wireless sensor networks. Liverpool John Moores University, UK, 2008 - 2007
- [c1]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint