default search action
Zeeshan Pervez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Yusuf Bozkurt, Alexander Rossmann, Zeeshan Pervez:
A Reference Model for Urban Data Governance and its Design Principles. HICSS 2024: 2213-2222 - 2023
- [j30]Zeeshan Pervez, Zaheer Khan, Abdul Ghafoor, Kamran Soomro:
SIGNED: Smart cIty diGital twiN vErifiable Data Framework. IEEE Access 11: 29430-29446 (2023) - [j29]Yusuf Bozkurt, Alexander Rossmann, Ashwini Konanahalli, Zeeshan Pervez:
Toward Urban Data Governance: Status-Quo, Challenges, and Success Factors. IEEE Access 11: 85656-85677 (2023) - [j28]Raman Singh, Zeeshan Pervez, Hitesh Tewari:
Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload. Future Internet 15(5): 173 (2023) - [j27]Austine Onwubiko, Raman Singh, Shahid Awan, Zeeshan Pervez, Naeem Ramzan:
Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS. Sensors 23(14): 6641 (2023) - 2022
- [j26]Otuekong Umoren, Raman Singh, Zeeshan Pervez, Keshav P. Dahal:
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors 22(10): 3956 (2022) - [j25]Otuekong Umoren, Raman Singh, Shahid Awan, Zeeshan Pervez, Keshav P. Dahal:
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors 22(22): 8969 (2022) - [c35]Yusuf Bozkurt, Alexander Rossmann, Zeeshan Pervez:
A Literature Review of Data Governance and Its Applicability to Smart Cities. HICSS 2022: 1-10 - 2021
- [j24]Fatma Elsafoury, Stamos Katsigiannis, Zeeshan Pervez, Naeem Ramzan:
When the Timeline Meets the Pipeline: A Survey on Automated Cyberbullying Detection. IEEE Access 9: 103541-103563 (2021) - [j23]Shehzad Ahmed, Tahera Kalsoom, Naeem Ramzan, Zeeshan Pervez, Muhammad Azmat, Bassam Zeb, Masood Ur Rehman:
Towards Supply Chain Visibility Using Internet of Things: A Dyadic Analysis Review. Sensors 21(12): 4158 (2021) - [c34]Baseer Ahmad, Bhupesh Kumar Mishra, Muhammad Ghufran, Zeeshan Pervez, Naeem Ramzan:
Intelligent Predictive Maintenance Model for Rolling Components of a Machine based on Speed and Vibration. ICAIIC 2021: 459-464 - 2020
- [j22]Zaheer Abbas Khan, Abdul Ghafoor Abbasi, Zeeshan Pervez:
Blockchain and edge computing-based architecture for participatory smart city applications. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j21]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal, Ali Kashif Bashir, Rao Mumtaz, Jonathan González:
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Gener. Comput. Syst. 111: 763-779 (2020) - [j20]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
X-BAND : Expiration Band for Anonymizing Varied Data Streams. IEEE Internet Things J. 7(2): 1438-1450 (2020)
2010 – 2019
- 2019
- [j19]Ana Serrano Mamolar, Pablo Salva-Garcia, Enrique Chirivella-Perez, Zeeshan Pervez, José M. Alcaraz Calero, Qi Wang:
Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks. J. Netw. Comput. Appl. 145 (2019) - [c33]Ana Serrano Mamolar, Zeeshan Pervez, Qi Wang, José M. Alcaraz-Calero:
Towards the Detection of Mobile DDoS Attacks in 5G Multi-Tenant Networks. EuCNC 2019: 273-277 - [c32]Hussien Saleh Altwassi, Zeeshan Pervez, Keshav P. Dahal:
A Burst and Congestion-Aware Routing Metric for RPL Protocol in IoT Network. SKIMA 2019: 1-6 - [c31]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
Partitioning based incremental marginalization algorithm for anonymizing missing data streams. SKIMA 2019: 1-7 - [c30]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal:
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. SKIMA 2019: 1-8 - 2018
- [j18]Carlos Hoyos-Barcelo, Jesus Monge-Alvarez, Zeeshan Pervez, Luis M. San-José-Revuelta, Pablo Casaseca-de-la-Higuera:
Efficient computation of image moments for robust cough detection using smartphones. Comput. Biol. Medicine 100: 176-185 (2018) - [j17]Ana Serrano Mamolar, Zeeshan Pervez, José M. Alcaraz Calero, Asad Masood Khattak:
Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks. Comput. Secur. 79: 132-147 (2018) - [j16]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal, Steve Eager:
K-VARP: K-anonymity for varied data streams via partitioning. Inf. Sci. 467: 238-255 (2018) - [c29]Ana Serrano Mamolar, Zeeshan Pervez, José M. Alcaraz Calero:
An Experimentation Framework for Mobile Multi- Tenant 5G Networks Integrated with CORE Network Emulator. DS-RT 2018: 155-162 - [c28]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal:
Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. HPCC/SmartCity/DSS 2018: 915-920 - [c27]Bhupesh Kumar Mishra, Tek Narayan Adhikari, Keshav P. Dahal, Zeeshan Pervez:
Priority-Index Based Multi-Priority Relief Logistics Scheduling with Greedy Heuristic Search. ICT-DM 2018: 1-8 - [c26]Martins Olaleye, Keshav P. Dahal, Zeeshan Pervez:
A Fuzzy-based Throughput Prediction For Wireless Communication Systems. INISTA 2018: 1-7 - [c25]Nasser Alsharif, Keshav P. Dahal, Zeeshan Pervez, Pradorn Sureephong:
Multi-Dimensional E-commerce Trust Evaluation Method. SKIMA 2018: 1-7 - [c24]Hussien Saleh Altwassi, Zeeshan Pervez, Keshav P. Dahal, Baraq Ghaleb:
The RPL Load Balancing in IoT Network with Burst Traffic Scenarios. SKIMA 2018: 1-7 - 2017
- [j15]Ryan M. Gibson, Abbes Amira, Naeem Ramzan, Pablo Casaseca-de-la-Higuera, Zeeshan Pervez:
Matching pursuit-based compressive sensing in a wearable biomedical accelerometer fall diagnosis device. Biomed. Signal Process. Control. 33: 96-108 (2017) - [j14]Heiko Angermann, Zeeshan Pervez, Naeem Ramzan:
Taxo-Semantics: Assessing similarity between multi-word expressions for extending e-catalogs. Decis. Support Syst. 98: 10-25 (2017) - [j13]Zaheer Abbas Khan, Zeeshan Pervez, Abdul Ghafoor Abbasi:
Towards a secure service provisioning framework in a Smart city environment. Future Gener. Comput. Syst. 77: 112-135 (2017) - [c23]Pampa Sadhukhan, Keshav P. Dahal, Zeeshan Pervez:
Impact of beacon coverage on clustering strategies for fingerprinting localization system. ICNC 2017: 184-188 - [c22]Bhupesh Kumar Mishra, Keshav P. Dahal, Zeeshan Pervez:
Dual-mode round-robin greedy search with fair factor algorithm for relief logistics scheduling. ICT-DM 2017: 1-7 - [c21]Arindam Giri, Subrata Dutta, Sarmistha Neogy, Keshav P. Dahal, Zeeshan Pervez:
Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges. IML 2017: 7:1-7:12 - [c20]Muhammad Umer, Tahir Azim, Zeeshan Pervez:
Reducing communication cost of encrypted data search with compressed bloom filters. NCA 2017: 31-34 - 2016
- [j12]Ryan M. Gibson, Abbes Amira, Naeem Ramzan, Pablo Casaseca-de-la-Higuera, Zeeshan Pervez:
Multiple comparator classifier framework for accelerometer-based fall detection and diagnostic. Appl. Soft Comput. 39: 94-103 (2016) - [j11]Asad Masood Khattak, Wajahat Ali Khan, Zeeshan Pervez, Farkhund Iqbal, Sungyoung Lee:
Towards A Self Adaptive System for Social Wellness. Sensors 16(4): 531 (2016) - [c19]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
Toward Anonymizing IoT Data Streams via Partitioning. MASS 2016: 331-336 - [c18]Martins Olaleye, Keshav P. Dahal, Zeeshan Pervez:
Cognitive radio engine learning adaptation. SKIMA 2016: 325-332 - 2015
- [j10]Asad Masood Khattak, Zeeshan Pervez, Wajahat Ali Khan, Adil Mehmood Khan, Khalid Latif, Sungyoung Lee:
Mapping evolution of dynamic web ontologies. Inf. Sci. 303: 101-119 (2015) - [j9]Mahmood Ahmad, Zeeshan Pervez, TaeChoong Chung, Sungyoung Lee:
Oblivious user management for cloud-based data synchronization. J. Supercomput. 71(4): 1378-1400 (2015) - [c17]Mahmood Ahmad, Zeeshan Pervez, Byeong Ho Kang, Sungyoung Lee:
O-Bin: Oblivious Binning for Encrypted Data over Cloud. AINA 2015: 352-357 - [c16]Mahmood Ahmad, Zeeshan Pervez, Sungyoung Lee, Byeong Ho Kang:
Task-oriented access model for secure data sharing over cloud. IMCOM 2015: 97:1-97:7 - [c15]Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez:
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. InfoSec 2015: 28-34 - 2014
- [c14]Naeem Ramzan, Zeeshan Pervez, Abbes Amira:
Quality of experience evaluation of H.265/MPEG-HEVC and VP9 comparison efficiency. ICM 2014: 220-223 - [c13]Ryan M. Gibson, Abbes Amira, Pablo Casaseca-de-la-Higuera, Naeem Ramzan, Zeeshan Pervez:
An efficient user-customisable multiresolution classifier fall detection and diagnostic system. ICM 2014: 228-231 - [c12]Mahmood Ahmad, Zeeshan Pervez, Sungyoung Lee:
Dual Locks: Partial Sharing of Health Documents in Cloud. ICOST 2014: 187-194 - [c11]Zaheer Abbas Khan, Zeeshan Pervez, Abdul Ghafoor Abbasi:
Towards Cloud Based Smart Cities Data Security and Privacy Management. UCC 2014: 806-811 - 2013
- [j8]Asad Masood Khattak, Rabia Batool, Zeeshan Pervez, Adil Mehmood Khan, Sungyoung Lee:
Ontology Evolution and Challenges. J. Inf. Sci. Eng. 29(5): 851-871 (2013) - [j7]Zeeshan Pervez, Ammar Ahmad Awan, Asad Masood Khattak, Sungyoung Lee, Eui-Nam Huh:
Privacy-aware searching with oblivious term matching for cloud storage. J. Supercomput. 63(2): 538-560 (2013) - [c10]Asad Masood Khattak, Nabeel Ahmad, Jibran Mustafa, Zeeshan Pervez, Khalid Latif, Sungyoung Lee:
Context-Aware Search in Dynamic Repositories of Digital Documents. CSE 2013: 338-345 - [c9]Mahmood Ahmad, Zeeshan Pervez, Yongik Yoon, Byeong Ho Kang, Sungyoung Lee:
Reflection: A Lightweight Protocol for Private Matching. SITIS 2013: 673-678 - 2012
- [j6]Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee, Eui-Nam Huh:
Oblivious access control policies for cloud based data sharing systems. Computing 94(12): 915-938 (2012) - [j5]Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee:
Achieving Dynamic and Distributed Session Management with Chord for Software as a Service Cloud. J. Softw. 7(6): 1403-1412 (2012) - [j4]Asad Masood Khattak, Zeeshan Pervez, Khalid Latif, Sungyoung Lee:
Time efficient reconciliation of mappings in dynamic web ontologies. Knowl. Based Syst. 35: 369-374 (2012) - [j3]Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee:
SAPDS: self-healing attribute-based privacy aware data sharing in cloud. J. Supercomput. 62(1): 431-460 (2012) - [c8]Asad Masood Khattak, Zeeshan Pervez, Manhyung Han, Chris D. Nugent, Sungyoung Lee:
DDSS: Dynamic decision support system for elderly. CBMS 2012: 1-6 - 2011
- [j2]Asad Masood Khattak, Zeeshan Pervez, Sungyoung Lee, Young-Koo Lee:
Intelligent Healthcare Service Provisioning Using Ontology with Low-Level Sensory Data. KSII Trans. Internet Inf. Syst. 5(11): 2016-2034 (2011) - [j1]Asad Masood Khattak, Phan Tran Ho Truc, Le Xuan Hung, La The Vinh, Viet-Hung Dang, Donghai Guan, Zeeshan Pervez, Manhyung Han, Sungyoung Lee, Young-Koo Lee:
Towards Smart Homes Using Low Level Sensory Data. Sensors 11(12): 11581-11604 (2011) - [c7]Asad Masood Khattak, Zeeshan Pervez, Khalid Latif, A. M. Jehad Sarkar, Sungyoung Lee, Young-Koo Lee:
Reconciliation of Ontology Mappings to Support Robust Service Interoperability. IEEE SCC 2011: 298-305 - [c6]Asad Masood Khattak, Khalid Latif, Zeeshan Pervez, Iram Fatima, Sungyoung Lee, Young-Koo Lee:
Change Tracer: A Protégé Plug-In for Ontology Recovery and Visualization. APWeb 2011: 386-387 - [c5]Asad Masood Khattak, Zeeshan Pervez, Wajahat Ali Khan, Sungyoung Lee, Young-Koo Lee:
A Self Evolutionary Rule-Base. FGIT-UNESST 2011: 1-9 - [c4]Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee:
CSMC: chord based session management framework for software as a service cloud. ICUIMC 2011: 30 - 2010
- [c3]Asad Masood Khattak, Zeeshan Pervez, Koo Kyo Ho, Sungyoung Lee, Young-Koo Lee:
Intelligent Manipulation of Human Activities Using Cloud Computing for u-Life Care. SAINT 2010: 141-144 - [c2]Asad Masood Khattak, Zeeshan Pervez, A. M. Jehad Sarkar, Young-Koo Lee:
Service Level Semantic Interoperability. SAINT 2010: 387-390 - [c1]Il Kon Kim, Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee:
Chord Based Identity Management for e-Healthcare Cloud Applications. SAINT 2010: 391-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint