default search action
Maqsood Mahmud
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad Bajwa:
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. Inf. Comput. Secur. 31(5): 635-654 (2023) - 2022
- [c12]Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohamed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. MILCOM 2022: 577-582 - 2020
- [c11]Sultan Daud Khan, Maqsood Mahmud, Habib Ullah, Mohib Ullah, Faouzi Alaya Cheikh:
Crowd Congestion Detection in Videos. IRIACV 2020: 1-7 - [c10]Mohib Ullah, Maqsood Mahmud, Habib Ullah, Kashif Ahmad, Ali Shariq Imran, Faouzi Alaya Cheikh:
Head based tracking. IRIACV 2020: 1-6 - [c9]Habib Ullah, Sultan Daud Khan, Mohib Ullah, Maqsood Mahmud, Faouzi Alaya Cheikh:
Generative Adversarial Networks: A Short Review. Image Processing: Algorithms and Systems 2020 - [i1]Mohib Ullah, Maqsood Mahmud, Habib Ullah, Kashif Ahmad, Ali Shariq Imran, Faouzi Alaya Cheikh:
Kalman Filter Based Multiple Person Head Tracking. CoRR abs/2006.06134 (2020)
2010 – 2019
- 2018
- [j5]Atta-ur-Rahman, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani, Maqsood Mahmud:
Reversible and Fragile Watermarking for Medical Images. Comput. Math. Methods Medicine 2018: 3461382:1-3461382:7 (2018) - [c8]Yara AlHumaidan, Lama AlAjmi, Moudhi Aljamea, Maqsood Mahmud:
Analysis of Cloud Computing Security in Perspective of Saudi Arabia. HealthCom 2018: 1-4 - 2016
- [j4]Hossein Javedani Sadaei, Rasul Enayatifar, Muhammad Hisyam Lee, Maqsood Mahmud:
A hybrid model based on differential fuzzy logic relationships and imperialist competitive algorithm for stock market forecasting. Appl. Soft Comput. 40: 132-149 (2016) - [j3]Fatemeh Mirzaei Talarposhti, Hossein Javedani Sadaei, Rasul Enayatifar, Frederico Gadelha Guimarães, Maqsood Mahmud, Tayyebeh Eslami:
Stock market forecasting by using a hybrid model of exponential fuzzy time series. Int. J. Approx. Reason. 70: 79-98 (2016) - [j2]Hossein Javedani Sadaei, Rasul Enayatifar, Frederico Gadelha Guimarães, Maqsood Mahmud, Zakarya A. Alzamil:
Combining ARFIMA models and fuzzy time series for the forecast of long memory time series. Neurocomputing 175: 782-796 (2016) - 2015
- [c7]Maqsood Mahmud, Pranavkumar Pathak, Vaishalibahen Pathak, Zahra Afridi:
Detection of Criminally Convicted Email Users by Behavioral Dissimilarity. NaBIC 2015: 429-439 - 2014
- [c6]Sk. Md. Mizanur Rahman, Mohammad Anwar Hossain, Maqsood Mahmud, Muhammad Imran Chaudry, Ahmad Almogren, Mohammed Abdullah Alnuem, Atif Alamri:
A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network. ISM 2014: 387-392 - 2012
- [j1]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. Int. Arab J. Inf. Technol. 9(4): 336-342 (2012) - [c5]Maqsood Mahmud, Muhammad Waqar, Abdulrahman Abdulkarim Mirza, Abdul Hanan Bin Abdullah:
Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method. ITNG 2012: 635-639 - 2010
- [c4]Maqsood Mahmud, Abdulrahman Abdulkarim Mirza, Ihsan Ullah, Naveed Khan, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris:
Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy Conservation. FGIT 2010: 376-382 - [c3]Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56
2000 – 2009
- 2009
- [c2]Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan:
Bio-chaotic Stream Cipher-Based Iris Image Encryption. CSE (2) 2009: 739-744 - [c1]Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar:
Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding). FGIT-BSBT 2009: 97-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint