Follow
Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
Junaid CHAUDHRY PhD (Cyber Security), P.E., Senior Member IEEE, MACS-CP, MKISS, MESA, AMAMC, MSCP
College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, Arizona
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Encyclopedia of multimedia technology and networking
M Pagani
IGI Global, 2008
1062008
A survey of information security risk analysis methods
A Behnia, R Abd Rashid, JA Chaudhry
SmartCR 2 (1), 79-94, 2012
932012
A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network
S Wang, H Wang, J Li, H Wang, J Chaudhry, M Alazab, H Song
IEEE Transactions on Industry Applications 56 (4), 4467-4477, 2020
572020
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
562018
Security and privacy based access control model for internet of connected vehicles
MA Habib, M Ahmad, S Jabbar, S Khalid, J Chaudhry, K Saleem, ...
Future Generation Computer Systems 97, 687-696, 2019
372019
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74, 5171-5186, 2018
302018
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
292018
Security in graphical authentication
RG Rittenhouse, JA Chaudry, M Lee
International Journal of Security and Its Applications 7 (3), 347-356, 2013
272013
A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion
F Riaz, S Khadim, R Rauf, M Ahmad, S Jabbar, J Chaudhry
Computer Networks 143, 62-73, 2018
252018
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE
R Arul, G Raja, AK Bashir, J Chaudry, A Ali
IEEE Transactions on Industrial Informatics 14 (6), 2677-2689, 2018
252018
U-kitchen: application scenario
JA Ali, WS Yoon, JH Kim, WD Cho
Software Technologies for Future Embedded and Ubiquitous Systems, 2004 …, 2004
252004
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures
W Yang, S Wang, G Zheng, J Chaudhry, C Valli
The Journal of Supercomputing, 1-17, 2018
242018
Entity data management in OKKAM
T Palpanas, J Chaudhry, P Andritsos, Y Velegrakis
2008 19th International Workshop on Database and Expert Systems Applications …, 2008
242008
Application of machine learning and image processing for detection of breast cancer
M Kashif, KR Malik, S Jabbar, J Chaudhry
Innovation in health informatics, 145-162, 2020
232020
Network performance enhancement of multi-sink enabled low power lossy networks in SDN based Internet of Things
G Shabbir, A Akram, MM Iqbal, S Jabbar, M Alfawair, J Chaudhry
International Journal of Parallel Programming 48 (2), 367-398, 2020
172020
A review on wireless sensor networks routing protocol: Challenge in energy perspective
I Ahmedy, MA Ngadi, SN Omar, J Chaudhry
Scientific Research and Essays, 2011
162011
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems
U Qidwai, J Chaudhry, S Jabbar, HMA Zeeshan, N Janjua, S Khalid
Journal of Ambient Intelligence and Humanized Computing 10, 4085-4097, 2019
152019
Designing an energy-aware mechanism for lifetime improvement of wireless sensor networks: a comprehensive study
S Jabbar, M Ahmad, KR Malik, S Khalid, J Chaudhry, O Aldabbas
Mobile Networks and Applications 23, 432-445, 2018
152018
Sinkhole vulnerabilities in wireless sensor networks
A Dhabi
International Journal of Security and Its Applications 8 (1), 401-410, 2014
142014
A survey of big data security solutions in healthcare
M Siddique, MA Mirza, M Ahmad, J Chaudhry, R Islam
Security and Privacy in Communication Networks: 14th International …, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20