Follow
Umair B. Chaudhry
Umair B. Chaudhry
Wireless Communication & Cyber Security
Verified email at northumbria.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cache-based transport protocols in wireless sensor networks: A survey and future directions
M Alipio, NM Tiglao, A Grilo, F Bokhari, U Chaudhry, S Qureshi
Journal of Network and Computer Applications 88, 29-49, 2017
232017
Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
UB Chaudhry, AKM Hydros
IET Blockchain 3 (2), 98-115, 2023
42023
Harnessing big data for business innovation and effective business decision making
UB Chaudhry, MA Chaudhry
Cybersecurity in the Age of Smart Societies: Proceedings of the 14th …, 2023
42023
Combating the Looping Behavior: A Result of Routing Layer Attack
David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
3*2018
Assembly, Deployment and Extension of Blockchain Based Decentralized Autonomous Organizations: A Framework Point of View
A Halvai, UB Chaudhry
Cybersecurity in the Age of Smart Societies: Proceedings of the 14th …, 2023
22023
UAV aided data collection for wildlife monitoring using cache-enabled mobile ad-hoc wireless sensor nodes
UB Chaudhry, CI Phillips
International Journal of Advanced Computer Science and Applications, 2021
22021
Digital Transformation, Leadership, and Markets
AKM Hydros, UB Chaudhry
Blockchain and Other Emerging Technologies for Digital Business Strategies …, 2022
12022
A Machine Learning Based Approach to Detect Cyber-Attacks on Connected and Autonomous Vehicles (CAVs)
SA Nazaruddin, UB Chaudhry
Wireless Networks: Cyber Security Threats and Countermeasures, 165-203, 2023
2023
‘HOAXIMETER’—An Effective Framework for Fake News Detection on the World Wide Web
IZ Chowdhary, UB Chaudhry
Cybersecurity in the Age of Smart Societies: Proceedings of the 14th …, 2023
2023
An Explanation on Social Media
R Ateeq, UB Chaudhry
Social Media Analytics, Strategies and Governance, 229-247, 2022
2022
Intelligent Security: Applying Artificial Intelligence to Detect Advanced Cyber Attacks
K Kallepalli, UB Chaudhry
Challenges in the IoT and Smart Environments: A Practitioners' Guide to …, 2021
2021
of Network and Computer Applications
M Alipio, NM Tiglao, A Grilo, F Bokhari, U Chaudhry, S Qureshi
2017
The system can't perform the operation now. Try again later.
Articles 1–12