default search action
Shahzad Saleem
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]David Samuel Bhatti, Shahzad Saleem, Zulfiqar Ali, Tae-Jin Park, Beomkyu Suh, Ali Kamran, William J. Buchanan, Ki-Il Kim:
Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access 12: 41499-41516 (2024) - [j20]David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim:
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives. EURASIP J. Wirel. Commun. Netw. 2024(1): 66 (2024) - 2023
- [j19]Nasir Ali, Shahzad Saleem:
Mean flow and Convective instability analysis of the BEK and related rotating boundary layer flows subject to a uniform static magnetic field. J. Comput. Sci. 71: 102076 (2023) - [j18]Mehdi Hussain, Qaiser Riaz, Shahzad Saleem, Abdul Ghafoor, Ki-Hyun Jung:
Correction to: Enhanced adaptive data hiding method using LSB and pixel value differencing. Multim. Tools Appl. 82(23): 36647 (2023) - 2022
- [j17]David Samuel Bhatti, Shahzad Saleem, Azhar Imran, Zafar Iqbal, Abdulkareem Alzahrani, HyunJung Kim, Ki-Il Kim:
A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy. Sensors 22(20): 7722 (2022) - 2021
- [j16]Saim Qureshi, Saif Ur Rehman Khan, Inayat ur-Rehman, Yasir Javed, Shahzad Saleem, Abid Iqbal:
A Conceptual Model to Address the Communication and Coordination Challenges During Requirements Change Management in Global Software Development. IEEE Access 9: 102290-102303 (2021) - [j15]Mehdi Hussain, Qaiser Riaz, Shahzad Saleem, Abdul Ghafoor, Ki-Hyun Jung:
Enhanced adaptive data hiding method using LSB and pixel value differencing. Multim. Tools Appl. 80(13): 20381-20401 (2021) - [i1]Shahid Alam, Muhammad Zain ul Abideen, Shahzad Saleem:
DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones? CoRR abs/2106.09218 (2021) - 2020
- [j14]David Samuel Bhatti, Shahzad Saleem:
Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication. IEEE Access 8: 24242-24257 (2020) - [j13]Waqas Rehan, Stefan Fischer, Omer Chughtai, Maaz Rehan, Mohamed Ahmed Hail, Shahzad Saleem:
A novel dynamic confidence interval based secure channel prediction approach for stream-based multichannel wireless sensor networks. Ad Hoc Networks 108: 102212 (2020) - [j12]Waqas Rehan, Stefan Fischer, Maaz Rehan, Yasser Mawad, Shahzad Saleem:
QCM2R: A QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks. J. Netw. Comput. Appl. 156: 102552 (2020) - [c13]Shaheryar Ehsan I Haque, Shahzad Saleem:
Augmented reality based criminal investigation system (ARCRIME). ISDFS 2020: 1-6
2010 – 2019
- 2019
- [j11]Qudsia Yousafi, Saba Kanwal, Hamid Rashid, Muhammad Saad Khan, Shahzad Saleem, Muhammad Aslam:
In silico structural and functional characterization and phylogenetic study of alkaline phosphatase in bacterium, Rhizobium leguminosarum (Frank 1879). Comput. Biol. Chem. 83 (2019) - [j10]Umara Noor, Zahid Anwar, Asad Waqar Malik, Sharifullah Khan, Shahzad Saleem:
A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories. Future Gener. Comput. Syst. 95: 467-487 (2019) - [j9]Muhammad Zain ul Abideen, Shahzad Saleem, Madiha Ejaz:
VPN Traffic Detection in SSL-Protected Channel. Secur. Commun. Networks 2019: 7924690:1-7924690:17 (2019) - [c12]Suneela Pasha, Shahzad Saleem:
Forensics Analysis of Wish-Shopping Made Fun Application on Android. FIT 2019: 144-149 - [c11]Muhammad Waheed Akram, Muhammad Zaid, Naveed Ahmed, Shahzad Saleem:
Security Against Compromised Servers: Verifiable DB Queries. FIT 2019: 233-238 - [c10]Muhammad Zaid, Muhammad Waheed Akram, Naveed Ahmed, Shahzad Saleem:
Web Server Integrity Protection Using Blockchain. FIT 2019: 239-244 - 2018
- [j8]M. A. K. Sudozai, Shahzad Saleem, William J. Buchanan, Nisar Habib, Haleemah Zia:
Forensics study of IMO call and chat app. Digit. Investig. 25: 5-23 (2018) - [c9]Yumna Ghazi, Zahid Anwar, Rafia Mumtaz, Shahzad Saleem, Ali Tahir:
A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources. FIT 2018: 129-134 - [c8]Usman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem, Asad Ullah:
Securing Insulin Pump System Using Deep Learning and Gesture Recognition. TrustCom/BigDataSE 2018: 1716-1719 - 2017
- [j7]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, S55-S64]. Digit. Investig. 21: 88 (2017) - [j6]M. A. K. Sudozai, Nisar Habib, Shahzad Saleem, A. A. Khan:
Signatures of Viber Security Traffic. J. Digit. Forensics Secur. Law 12(2): 109-120 (2017) - [j5]Makhdoom Shah, Shahzad Saleem, Roha Zulqarnain:
Protecting Digital Evidence Integrity and Preserving Chain of Custody. J. Digit. Forensics Secur. Law 12(2): 121-130 (2017) - [c7]Saba Mumtaz, Naima Mubariz, Shahzad Saleem, M. M. Fraz:
Weighted hybrid features for person re-identification. IPTA 2017: 1-6 - 2016
- [j4]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digit. Investig. 16 Supplement: S55-S64 (2016) - 2015
- [b1]Shahzad Saleem:
Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics. Stockholm University, Sweden, 2015 - 2014
- [j3]Maxwell Anobah, Shahzad Saleem, Oliver Popov:
Testing Framework for Mobile Device Forensics Tools. J. Digit. Forensics Secur. Law 9(2): 221-234 (2014) - [j2]Shahzad Saleem, Ibrahim M. Baggili, Oliver Popov:
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices. J. Digit. Forensics Secur. Law 9(3): 19-50 (2014) - [c6]Shahzad Saleem, Oliver Popov, Ibrahim Bagilli:
Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles. KES 2014: 812-821 - 2012
- [c5]Shahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi:
Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis. ICDF2C 2012: 264-282 - [c4]Christian Vogel, Matthias Hotz, Shahzad Saleem, Katharina Hausmair, Michael Soudan:
A review on low-complexity structures and algorithms for the correction of mismatch errors in time-interleaved ADCs. NEWCAS 2012: 349-352 - 2011
- [j1]Shahzad Saleem, Christian Vogel:
Adaptive Blind Background Calibration of Polynomial-Represented Frequency Response Mismatches in a Two-Channel Time-Interleaved ADC. IEEE Trans. Circuits Syst. I Regul. Pap. 58-I(6): 1300-1310 (2011) - 2010
- [c3]Shahzad Saleem, Oliver Popov:
Protecting Digital Evidence Integrity by Using Smart Cards. ICDF2C 2010: 110-119 - [c2]Shahzad Saleem, Christian Vogel:
Adaptive compensation of frequency response mismatches in high-resolution time-interleaved ADCs using a low-resolution ADC and a time-varying filter. ISCAS 2010: 561-564
2000 – 2009
- 2008
- [c1]Christian Vogel, Shahzad Saleem, Stefan Mendel:
Adaptive blind compensation of gain and timing mismatches in M-channel time-interleaved ADCs. ICECS 2008: 49-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint