Security and privacy challenges in smart cities T Braun, BCM Fung, F Iqbal, B Shah Sustainable cities and society 39, 499-507, 2018 | 127 | 2018 |
Security analysis of IoT protocols: A focus in CoAP RA Rahman, B Shah 2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016 | 109 | 2016 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 55 | 2019 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 32 | 2020 |
A survey on three-dimensional wireless ad hoc and sensor networks B Shah, KI Kim International Journal of Distributed Sensor Networks 10 (7), 616014, 2014 | 30 | 2014 |
Wireless sensor networks for big data systems BS Kim, KI Kim, B Shah, F Chow, KH Kim Sensors 19 (7), 1565, 2019 | 25 | 2019 |
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks B Shah, F Iqbal, A Abbas, KI Kim Sensors 15 (8), 20373-20391, 2015 | 23 | 2015 |
Towards enhanced searching architecture for unstructured peer-to-peer over mobile ad hoc networks B Shah, KI Kim Wireless personal communications 77 (2), 1167-1189, 2014 | 23 | 2014 |
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, Á Rocha, S Anwar International Journal of Information Management 46, 304-319, 2019 | 17 | 2019 |
Just-in-time customer churn prediction: With and without data transformation A Amin, B Shah, AM Khattak, T Baker, S Anwar 2018 IEEE congress on evolutionary computation (CEC), 1-6, 2018 | 14 | 2018 |
Real-time routing protocols for (m, k)-firm streams based on multi-criteria in wireless sensor networks MA Azim, BS Kim, B Shah, KI Kim Wireless Networks 23 (4), 1233-1248, 2017 | 11 | 2017 |
Android malware detection through generative adversarial networks M Amin, B Shah, A Sharif, T Ali, KL Kim, S Anwar Transactions on Emerging Telecommunications Technologies, e3675, 2019 | 10 | 2019 |
Enhancing the teaching and learning process using video streaming servers and forecasting techniques R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker Sustainability 11 (7), 2049, 2019 | 10 | 2019 |
Just-in-time customer churn prediction in the telecommunication sector A Amin, F Al-Obeidat, B Shah, M Al Tae, C Khan, HUR Durrani, S Anwar The Journal of Supercomputing 76 (6), 3924-3948, 2020 | 9 | 2020 |
Compromised user credentials detection in a digital enterprise using behavioral analytics S Shah, B Shah, A Amin, F Al-Obeidat, F Chow, FJL Moreira, S Anwar Future Generation Computer Systems 93, 407-417, 2019 | 9 | 2019 |
Context mining of sedentary behaviour for promoting self-awareness using a smartphone M Fahim, T Baker, AM Khattak, B Shah, S Aleem, F Chow Sensors 18 (3), 874, 2018 | 9 | 2018 |
Bloom filters optimized Wu-Manber for intrusion detection M Aldwairi, K Al-Khamaiseh, F Alharbi, B Shah Journal of Digital Forensics, Security and Law 11 (4), 5, 2016 | 9 | 2016 |
Comparative study of conventional and fuzzy based power system stabilizer B Shah Communication Systems and Network Technologies (CSNT), 2013 International …, 2013 | 8 | 2013 |
An enhanced mobility and temperature aware routing protocol through multi-criteria decision making method in wireless body area networks BS Kim, B Shah, F Al-Obediat, S Ullah, KH Kim, KI Kim Applied Sciences 8 (11), 2245, 2018 | 7 | 2018 |
A prudent based approach for compromised user credentials detection A Amin, B Shah, S Anwar, F Al-Obeidat, AM Khattak, A Adnan Cluster Computing 21 (1), 423-441, 2018 | 7 | 2018 |