default search action
Zeeshan Afzal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Sotirios Katsikeas, Andrei Buhaiu, Mathias Ekstedt, Zeeshan Afzal, Simon Hacks, Preetam Mukherjee:
Development and validation of coreLang: A threat modeling language for the ICT domain. Comput. Secur. 146: 104057 (2024) - [j9]Zeeshan Afzal, Timo Balz, Aamir Asghar:
Non-Linear PSInSAR Analysis of Deformation Patterns in Islamabad/Rawalpindi Region: Unveiling Tectonics and Earthquake-Driven Changes. Remote. Sens. 16(7): 1194 (2024) - [j8]Muhammad Ali, Gilda Schirinzi, Zeeshan Afzal, Alessandra Budillon, Muhammad Saleem Mughal, Sajid Hussain, Giampaolo Ferraioli:
Estimation of Co-Seismic Surface Deformation Induced by 24 September 2019 Mirpur, Pakistan Earthquake along an Active Blind Fault Using Sentinel-1 TOPS Interferometry. Remote. Sens. 16(8): 1457 (2024) - [c11]Muhammad Ali, Zeeshan Afzal, Sajid Hussain, Alessandra Budillon, Gilda Schirinzi:
Surface Deformation Estimation Along the Coastal Area of Pakistan. IGARSS 2024: 1628-1631 - 2023
- [j7]Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. Int. J. Inf. Sec. 22(6): 1713-1729 (2023) - [j6]Adeel Ahmad Nadeem, Yuanyuan Zha, Liangsheng Shi, Shoaib Ali, Xi Wang, Zeeshan Zafar, Zeeshan Afzal, Muhammad Atiq Ur Rehman Tariq:
Spatial Downscaling and Gap-Filling of SMAP Soil Moisture to High Resolution Using MODIS Surface Variables and Machine Learning Approaches over ShanDian River Basin, China. Remote. Sens. 15(3): 812 (2023) - [j5]Meer Muhammad Sajjad, Juanle Wang, Zeeshan Afzal, Sajid Hussain, Aboubakar Siddique, Rehan Khan, Muhammad Ali, Javed Iqbal:
Assessing the Impacts of Groundwater Depletion and Aquifer Degradation on Land Subsidence in Lahore, Pakistan: A PS-InSAR Approach for Sustainable Urban Development. Remote. Sens. 15(22): 5418 (2023) - [c10]Zeeshan Afzal, Timo Balz, Muhammad Ali, Aamer Asghar, Sajid Hussain, Ousaha Sunantha:
Geological Interpretation of the Deformation Obtained by PSInSAR in Islamabad and Rawalpindi. IGARSS 2023: 8170-8173 - 2022
- [j4]Muhammad Afaq Hussain, Zhanlong Chen, Ying Zheng, Muhammad Shoaib, Safeer Ullah Shah, Nafees Ali, Zeeshan Afzal:
Landslide Susceptibility Mapping Using Machine Learning Algorithm Validated by Persistent Scatterer In-SAR Technique. Sensors 22(9): 3119 (2022) - [c9]Oliver Kraft, Oliver Pohl, Ulf Häger, Kai Heussen, Nils Müller, Zeeshan Afzal, Mathias Ekstedt, Hossein Farahmand, Dmytro Ivanko, Ankit Singh, Sasiphong Leksawat, Andreas Kubis:
Development and Implementation of a Holistic Flexibility Market Architecture. ISGT 2022: 1-5 - 2021
- [j3]Rehan Khan, Huan Li, Zeeshan Afzal, Muhammad Basir, Muhammad Arif, Waqas Hassan:
Monitoring Subsidence in Urban Area by PSInSAR: A Case Study of Abbottabad City, Northern Pakistan. Remote. Sens. 13(9): 1651 (2021) - [c8]Andreas Gylling, Mathias Ekstedt, Zeeshan Afzal, Per Eliasson:
Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs. CSR 2021: 304-311 - [i1]Nils Müller, Zeeshan Afzal, Per Eliasson, Mathias Ekstedt, Kai Heussen:
Threat Scenarios and Monitoring Requirements for Cyber-Physical Systems of Energy Flexibility Markets. CoRR abs/2111.03300 (2021) - 2020
- [c7]Zeeshan Afzal, Anna Brunström, Stefan Lindskog:
Using Features of Encrypted Network Traffic to Detect Malware. NordSec 2020: 37-53
2010 – 2019
- 2019
- [j2]Zeeshan Afzal, Yongsheng Rao, Yousaf Bhatti, Naima Amin:
Emergence of Persistent Activity States in a Two-Population Neural Field Model for Smooth $\alpha$ -Type External Input. IEEE Access 7: 59081-59090 (2019) - [j1]Zeeshan Afzal, Muhammad Yousaf Bhatti, Naima Amin, Asif Mushtaq, Chahn Yong Jung:
Effect of Alpha-Type External Input on Annihilation of Self-Sustained Activity in a Two Population Neural Field Model. IEEE Access 7: 108411-108418 (2019) - [c6]Zeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunström:
Using Partial Signatures in Intrusion Detection for Multipath TCP. NordSec 2019: 71-86 - 2018
- [c5]Zeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunström:
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications. NTMS 2018: 1-5 - 2016
- [c4]Zeeshan Afzal, Stefan Lindskog:
IDS rule management made easy. ECAI 2016: 1-8 - [c3]Zeeshan Afzal, Stefan Lindskog, Anna Brunström, Anders Liden:
Towards Multipath TCP Aware Security Technologies. NTMS 2016: 1-8 - 2015
- [c2]Zeeshan Afzal, Stefan Lindskog:
Automated testing of IDS rules. ICST Workshops 2015: 1-2 - [c1]Zeeshan Afzal, Stefan Lindskog:
Multipath TCP IDS Evasion and Mitigation. ISC 2015: 265-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint