Machine learning-data mining integrated approach for premature ventricular contraction prediction
Mastoi, Qurat-ul-ain, Memon, Muhammad Suleman, Lakhan, Abdullah, Mohammed, Mazin Abed, Qabulio, Mumtaz, Al-Turjman, Fadi, Abdulkareem, Karrar Hameed
Published in Neural computing & applications (01.09.2021)
Published in Neural computing & applications (01.09.2021)
Get full text
Journal Article
On Node Replication Attack in Wireless Sensor Networks
MUMTAZ QABULIO, YASIR ARFAT MALKANI, AYAZ AHMED KEERIO
Published in Mehran University Research Journal of Engineering and Technology (01.10.2015)
Get full text
Published in Mehran University Research Journal of Engineering and Technology (01.10.2015)
Journal Article
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network
Lakhan, Abdullah, Memon, Muhammad Suleman, Mastoi, Qurat-ul-ain, Elhoseny, Mohamed, Mohammed, Mazin Abed, Qabulio, Mumtaz, Abdel-Basset, Mohamed
Published in Cluster computing (01.06.2022)
Published in Cluster computing (01.06.2022)
Get full text
Journal Article
On Node Replication Attack in Wireless Sensor Networks
Mumtaz Qabulio, Yasir Arfat Malkani, Ayaz Ahmed Keerio
Published in Mehran University research journal of engineering and technology (01.04.2016)
Get full text
Published in Mehran University research journal of engineering and technology (01.04.2016)
Journal Article
A framework for securing mobile wireless sensor networks against physical attacks
Qabulio, Mumtaz, Malkani, Yasir Arfat, Keerio, Ayaz
Published in 2016 International Conference on Emerging Technologies (ICET) (01.10.2016)
Published in 2016 International Conference on Emerging Technologies (ICET) (01.10.2016)
Get full text
Conference Proceeding
Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
Qabulio, Mumtaz, Malkani, Yasir Arfat, Keerio, Ayaz
Published in 2015 Conference on Information Assurance and Cyber Security (CIACS) (01.12.2015)
Published in 2015 Conference on Information Assurance and Cyber Security (CIACS) (01.12.2015)
Get full text
Conference Proceeding