default search action
Sabah Suhail
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Sabah Suhail, Mubashar Iqbal, Raja Jurdak:
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers. Commun. ACM 67(1): 39-42 (2024) - [j13]Sabah Suhail, Mubashar Iqbal, Kieran McLaughlin:
Digital-Twin-Driven Deception Platform: Vision and Way Forward. IEEE Internet Comput. 28(4): 40-47 (2024) - [c5]Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius:
DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain. ARES 2024: 161:1-161:11 - [c4]Mubashar Iqbal, Muhammad Zubair, Sabah Suhail, Faiz Ali Shah, Fredrik Milani:
Blockchain-Driven Secure Auditing of Timber-to-Charcoal Supply Chain. DB&IS 2024: 123-140 - 2023
- [j12]Sabah Suhail, Mubashar Iqbal, Rasheed Hussain, Raja Jurdak:
ENIGMA: An explainable digital twin security solution for cyber-physical systems. Comput. Ind. 151: 103961 (2023) - [c3]Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius, Rasheed Hussain:
Towards Healthcare Digital Twin Architecture. BIR 2023: 45-60 - 2022
- [j11]Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins. Comput. Ind. 141: 103699 (2022) - [j10]Sabah Suhail, Rasheed Hussain, Raja Jurdak, Alma Oracevic, Khaled Salah, Choong Seon Hong, Raimundas Matulevicius:
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges. ACM Comput. Surv. 54(11s): 240:1-240:34 (2022) - [j9]Sabah Suhail, Rasheed Hussain, Raja Jurdak, Choong Seon Hong:
Trustworthy Digital Twins in the Industrial Internet of Things With Blockchain. IEEE Internet Comput. 26(3): 58-67 (2022) - [i8]Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Raimundas Matulevicius:
Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins. CoRR abs/2201.07765 (2022) - [i7]Sabah Suhail, Sherali Zeadally, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Security Attacks and Solutions for Digital Twins. CoRR abs/2202.12501 (2022) - 2021
- [j8]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
Corrigendum to "Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) (2020) 103334]. Comput. Ind. 128: 103392 (2021) - [j7]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. IEEE Internet Things J. 8(1): 1-17 (2021) - [i6]Sabah Suhail, Rasheed Hussain, Raja Jurdak, Alma Oracevic, Khaled Salah, Choong Seon Hong:
Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges. CoRR abs/2103.11585 (2021) - [i5]Sabah Suhail, Raja Jurdak, Raimundas Matulevicius, Choong Seon Hong:
Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence. CoRR abs/2105.08886 (2021) - 2020
- [j6]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space. Comput. Ind. 123: 103334 (2020) - [j5]Sabah Suhail, Rasheed Hussain, Mohammad M. Abdellatif, Shashi Raj Pandey, Abid Khan, Choong Seon Hong:
Provenance-enabled packet path tracing in the RPL-based internet of things. Comput. Networks 173: 107189 (2020) - [i4]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. CoRR abs/2004.10435 (2020) - [i3]Sabah Suhail, Rasheed Hussain, Raja Jurdak, Choong Seon Hong:
Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain. CoRR abs/2010.12168 (2020)
2010 – 2019
- 2019
- [i2]Sabah Suhail, Choong Seon Hong, Abid Khan:
Orchestrating Product Provenance Story: When IOTA ECOSYSTEM Meets The Electronics Supply Chain Space. CoRR abs/1902.04314 (2019) - 2018
- [c2]Sabah Suhail, Choong Seon Hong, M. Ali Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain:
Data trustworthiness in IoT. ICOIN 2018: 414-419 - [i1]Sabah Suhail, Mohammad M. Abdellatif, Shashi Raj Pandey, Abid Khan, Choong Seon Hong:
Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things. CoRR abs/1811.06143 (2018) - 2017
- [j4]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j3]Faheem Zafar, Abid Khan, Sabah Suhail, Idrees Ahmed, Khizar Hameed, Hayat Mohammad Khan, Farhana Jabeen, Adeel Anjum:
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94: 50-68 (2017) - 2016
- [j2]Abid Khan, Farhana Jabeen, Farah Naz, Sabah Suhail, Mansoor Ahmed, Sarfraz Nawaz:
Buyer seller watermarking protocols issues and challenges - A survey. J. Netw. Comput. Appl. 75: 317-334 (2016) - [c1]Sabah Suhail, Choong Seong Hong, Zuhaib Uddin Ahmad, Faheem Zafar, Abid Khan:
Introducing Secure Provenance in IoT: Requirements and Challenges. SIoT 2016: 39-46 - 2013
- [j1]Muhammad Kamran, Sabah Suhail, Muddassar Farooq:
A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints. IEEE Trans. Knowl. Data Eng. 25(12): 2694-2707 (2013)
Coauthor Index
aka: Choong Seong Hong
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint