default search action
Jawwad Shamsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Anam Qureshi, Jawwad Shamsi, Murk Marvi:
An Efficient Framework for Security of Internet-of-Things Devices against Malicious Software Updates. J. Comput. Networks Commun. 2024 (2024) - 2023
- [j20]Sonia Salman, Jawwad Ahmed Shamsi, Rizwan Qureshi:
Deep Fake Generation and Detection: Issues, Challenges, and Solutions. IT Prof. 25(1): 52-59 (2023) - [j19]Sana Alam, Shehnila Zardari, Jawwad Shamsi:
Comprehensive three-phase bibliometric assessment on the blockchain (2012-2020). Libr. Hi Tech 41(2): 287-308 (2023) - [i1]Muhammad Ahmed, Anam Qureshi, Jawwad Ahmed Shamsi, Murk Marvi:
Sequential Embedding-based Attentive (SEA) classifier for malware classification. CoRR abs/2302.05728 (2023) - 2022
- [j18]Mir Murtaza, Yamna Ahmed, Jawwad Ahmed Shamsi, Fahad Sherwani, Mariam Usman:
AI-Based Personalized E-Learning Systems: Issues, Challenges, and Solutions. IEEE Access 10: 81323-81342 (2022) - [j17]Muhammad Hassam, Jawwad A. Shamsi, Ajmal Khan, Ahmed Al-Harrasi, Reaz Uddin:
Prediction of inhibitory activities of small molecules against Pantothenate synthetase from Mycobacterium tuberculosis using Machine Learning models. Comput. Biol. Medicine 145: 105453 (2022) - [j16]Anam Qureshi, Murk Marvi, Jawwad Ahmed Shamsi, Adnan Aijaz:
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part A): 5456-5467 (2022) - [c21]Humdah Shakir Khan, Farooque Hassan Kumbhar, Jawwad Ahmed Shamsi:
Let's Prevent Spectre Attacks in the Docker Containers Too. FIT 2022: 243-248 - 2021
- [j15]Hafiza Anisa Ahmed, Narmeen Zakaria Bawany, Jawwad Ahmed Shamsi:
CaPBug-A Framework for Automatic Bug Categorization and Prioritization Using NLP and Machine Learning Algorithms. IEEE Access 9: 50496-50512 (2021) - [j14]Shahzeb Khan, Jawwad Ahmed Shamsi:
Health Quest: A generalized clinical decision support system with multi-label classification. J. King Saud Univ. Comput. Inf. Sci. 33(1): 45-53 (2021) - [j13]Shazia Usmani, Jawwad A. Shamsi:
News sensitive stock market prediction: literature review and suggestions. PeerJ Comput. Sci. 7: e490 (2021) - 2020
- [j12]Jawwad A. Shamsi:
Resilience in Smart City Applications: Faults, Failures, and Solutions. IT Prof. 22(6): 74-81 (2020) - [p1]Jawwad A. Shamsi, Muhammad Hanif, Sherali Zeadally:
Fog Computing: Data Analytics for Time-Sensitive Applications. Convergence of Artificial Intelligence and the Internet of Things 2020: 1-13
2010 – 2019
- 2019
- [j11]Nausheen Shoaib, Jawwad A. Shamsi:
Understanding Network Requirements for Smart City Applications: Challenges and Solutions. IT Prof. 21(3): 33-40 (2019) - [j10]Narmeen Zakaria Bawany, Jawwad A. Shamsi:
SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. J. Netw. Comput. Appl. 145 (2019) - [c20]Tania Iram, Jawwad Shamsi, Usama Alvi, Saif Ur Rahman, Muhammad Maaz:
Controlling Smart-City Traffic using Machine Learning. FIT 2019: 203-208 - 2018
- [j9]Jawwad A. Shamsi, Muhammad Ali Khojaye:
Understanding Privacy Violations in Big Data Systems. IT Prof. 20(3): 73-81 (2018) - [c19]Tooba Siddiqui, Jawwad Ahmed Shamsi:
Generating Abstractive Summaries Using Sequence to Sequence Attention Model. FIT 2018: 212-217 - [c18]Jawwad Ahmed Shamsi, Syed Zain ul Hassan, Narmeen Zakaria Bawany, Nausheen Shoaib:
A Comprehensive Course on Big Data for Undergraduate Students. IPDPS Workshops 2018: 353-360 - 2017
- [c17]Jawwad Ahmed Shamsi:
A Laboratory Based Course on GPU Programming: Methods, Practices, and Lessons. IPDPS Workshops 2017: 367-374 - 2016
- [j8]Muhammad Nouman Durrani, Feroz Zahid, Jawwad A. Shamsi:
PAVM: a framework for policy-aware virtual machine management. Int. J. Netw. Manag. 26(6): 515-536 (2016) - [j7]Jawwad A. Shamsi, Sherali Zeadally, Zafar Nasir:
Interventions in Cyberspace: Status and Trends. IT Prof. 18(1): 18-25 (2016) - [j6]Jawwad A. Shamsi, Zafar Nasir:
Unleashing the Pakistan Software Industry: Growth Prospects and Challenges. IT Prof. 18(5): 12-14 (2016) - [j5]Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers:
Attribution in cyberspace: techniques and legal implications. Secur. Commun. Networks 9(15): 2886-2900 (2016) - [c16]Arhum Savera, Ahmed Zia, Muhammad Salman Edhi, Muhammad Tauseen, Jawwad Ahmed Shamsi:
BUMPSTER: A Mobile Cloud Computing System for Speed Breakers and Ditches. LCN Workshops 2016: 65-71 - 2015
- [c15]Wajeeta Lohana, Jawwad A. Shamsi, Tahir Q. Syed, Farrukh Hasan:
Towards Context-Aware DNA Sequence Compression for Efficient Data Exchange. IPDPS Workshops 2015: 357-366 - [c14]Jawwad A. Shamsi, Nouman M. Durrani, Nadeem Kafi Khan:
Novelties in Teaching High Performance Computing. IPDPS Workshops 2015: 772-778 - [c13]Muhammad Nouman Durrani, Tasmiyah Iqbal, Jawwad Ahmed Shamsi, Nadeem Kafi Khan:
Towards Real-Time Result Verification Using Checkpointing in Volunteer Computing Systems. ISORC 2015: 218-227 - [c12]Fareha Sheikh, Habiba Fazal, Fatima Taqvi, Jawwad Shamsi:
Power-aware server selection in nano data center. LCN Workshops 2015: 776-782 - 2014
- [j4]Muhammad Nouman Durrani, Jawwad A. Shamsi:
Volunteer computing: requirements, challenges, and solutions. J. Netw. Comput. Appl. 39: 369-380 (2014) - [c11]Jawwad A. Shamsi, Syed Ali Raza, Hassan Farid, Abbas Mehdi, S. Taha Munir:
MACNET: Mobile Adhoc Collaborative NETworks. CollaborateCom 2014: 407-416 - [c10]Jawwad A. Shamsi, Sufian Hameed, Waleed Rahman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad:
Clicksafe: Providing Security against Clickjacking Attacks. HASE 2014: 206-210 - 2013
- [j3]Jawwad Shamsi, Muhammad Ali Khojaye, Mohammad Ali Qasmi:
Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions. J. Grid Comput. 11(2): 281-310 (2013) - [c9]Nouman M. Durrani, Nadeem Kafi Khan, Jawwad Shamsi, Waleej Haider, Asad M. Abbsi:
Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions. ICDIM 2013: 41-48 - 2012
- [j2]Jawwad Shamsi, Monica Brockmeyer:
Predictable service overlay networks: Predictability through adaptive monitoring and efficient overlay construction and management. J. Parallel Distributed Comput. 72(1): 70-82 (2012) - 2010
- [c8]Jawwad Shamsi, Monica Brockmeyer:
Evaluation of QoS-compliant overlays under denial of service attacks. SpringSim 2010: 102
2000 – 2009
- 2009
- [c7]Jawwad Shamsi, Monica Brockmeyer:
QoSMap: Achieving Quality and Resilience through Overlay Construction. ICIW 2009: 58-67 - 2008
- [c6]Jawwad Shamsi, Monica Brockmeyer:
Efficient and dependable overlay networks. IPDPS 2008: 1-8 - 2007
- [j1]Jawwad Shamsi, Monica Brockmeyer:
PSON: predictable service overlay networks. SIGMETRICS Perform. Evaluation Rev. 35(3): 72-74 (2007) - [c5]Jawwad Shamsi, Monica Brockmeyer:
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths. HASE 2007: 187-196 - [c4]Jawwad Shamsi, Monica Brockmeyer, Chunbo Chu:
PSON: predictable service overlay networks. QSHINE 2007: 16 - 2005
- [c3]Jawwad Shamsi, Chunbo Chu, Monica Brockmeyer:
Towards Partially Synchronous Overlays: Issues and Challenges. AAA-IDEA 2005: 10-17 - [c2]Jawwad Shamsi, Monica Brockmeyer, Liya Abebe:
TACON: tactical construction of overlay networks. GLOBECOM 2005: 6 - 2003
- [c1]Jawwad Shamsi, Hasina Abdu:
Foundations of a Generic Framework for Distributed Applications. CATA 2003: 130-133
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint