


default search action
Humaira Arshad
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Muhammad Khalid Mehmood
, Humaira Arshad, Moatsum Alawida
, Abid Mehmood
:
Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives. IEEE Access 12: 137176-137193 (2024) - 2023
- [j17]Hira Nazir
, Muhammad Sami Ullah
, Salman Qadri
, Humaira Arshad, Mujtaba Husnain
, Abdul Razzaq
, Syed Ali Nawaz:
Protection-Enhanced Watermarking Scheme Combined With Non-Linear Systems. IEEE Access 11: 33725-33740 (2023) - 2022
- [j16]Waheed Ali H. M. Ghanem
, Sanaa Abduljabbar Ahmed Ghaleb
, Aman Jantan, Abdullah B. Nasser, Sami Abdulla Mohsen Saleh, Amir Ngah, Arifah Che Alhadi
, Humaira Arshad, Abdul-Malik H. Y. Saad
, Abiodun Esther Omolara, Yousef A. Baker El-Ebiary, Oludare Isaac Abiodun:
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks. IEEE Access 10: 76318-76339 (2022) - [j15]Israr Ahmad
, Saima Abdullah
, Muhammad Bukhsh
, Adeel Ahmed
, Humaira Arshad, Talha Farooq Khan
:
Message Scheduling in Blockchain Based IoT Environment With Additional Fog Broker Layer. IEEE Access 10: 97165-97182 (2022) - [j14]Sanaa Abduljabbar Ahmed Ghaleb
, Mumtazimah Mohamad
, Waheed Ali H. M. Ghanem
, Abdullah B. Nasser, Mohamed Ghetas
, Akibu Mahmoud Abdullahi
, Sami Abdulla Mohsen Saleh, Humaira Arshad, Abiodun Esther Omolara, Oludare Isaac Abiodun:
Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm. IEEE Access 10: 98475-98489 (2022) - [j13]Abiodun Esther Omolara, Abdullah A. Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdulatif Alabdulatif, Wafa' Hamdan Alshoura, Humaira Arshad:
The internet of things security: A survey encompassing unexplored areas and new insights. Comput. Secur. 112: 102494 (2022) - [j12]Humaira Arshad
, Saima Abdullah
, Moatsum Alawida, Abdulatif Alabdulatif
, Oludare Isaac Abiodun
, Omer Riaz
:
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks. Sensors 22(3): 1115 (2022) - 2021
- [j11]Muhammad Bukhsh
, Saima Abdullah
, Abdul Rahman, Mamoona Naveed Asghar, Humaira Arshad
, Abdulatif Alabdulatif
:
An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems. IEEE Access 9: 145363-145381 (2021) - [j10]Oludare Isaac Abiodun, Esther Omolara Abiodun
, Moatsum Alawida, Rami S. Alkhawaldeh
, Humaira Arshad:
A Review on the Security of the Internet of Things: Challenges and Solutions. Wirel. Pers. Commun. 119(3): 2603-2637 (2021) - 2020
- [j9]Humaira Arshad
, Aman Jantan, Gan Keng Hoon, Oludare Isaac Abiodun:
Formal knowledge model for online social network forensics. Comput. Secur. 89 (2020) - [j8]Humaira Arshad
, Esther Omolara
, Isaac Oludare Abiodun, Abdulhai Aminu
:
A semi-automated forensic investigation model for online social networks. Comput. Secur. 97: 101946 (2020) - [j7]Abiodun Esther Omolara
, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad, Kemi Victoria Dada, Etuh Emmanuel
:
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys. Health Informatics J. 26(3): 2083-2104 (2020) - [j6]Esther Omolara Abiodun
, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad:
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp. Wirel. Pers. Commun. 112(4): 2533-2556 (2020)
2010 – 2019
- 2019
- [j5]Abiodun Esther Omolara
, Aman Jantan, Oludare Isaac Abiodun
, Kemi Victoria Dada, Humaira Arshad, Etuh Emmanuel
:
A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems. IEEE Access 7: 100881-100898 (2019) - [j4]Oludare Isaac Abiodun
, Muhammad Ubale Kiru
, Aman Jantan, Abiodun Esther Omolara
, Kemi Victoria Dada, Abubakar Malah Umar, Okafor Uchenwa Linus, Humaira Arshad, Abdullahi Aminu Kazaure
, Usman Gana:
Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition. IEEE Access 7: 158820-158846 (2019) - [j3]Humaira Arshad, Aman Jantan
, Esther Omolara:
Evidence collection and forensics on social networks: Research challenges and directions. Digit. Investig. 28(Supplement): 126-138 (2019) - [j2]Humaira Arshad, Aman Jantan
, Gan Keng Hoon
, Anila Sahar Butt:
A multilayered semantic framework for integrated forensic acquisition on social media. Digit. Investig. 29: 147-158 (2019) - 2018
- [j1]Humaira Arshad
, Aman Bin Jantan, Oludare Isaac Abiodun:
Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence. J. Inf. Process. Syst. 14(2): 346-376 (2018)
Coauthor Index
aka: Isaac Oludare Abiodun

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 01:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint