
Muhammad Yousaf
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]Syed Muhammad Sajjad, Muhammad Yousaf
, Humaira Afzal, Muhammad Rafiq Mufti
:
eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers. IEEE Access 8: 164200-164213 (2020) - [j10]Iftikhar Ahmad, Muhammad Yousaf, Suhail Yousaf, Muhammad Ovais Ahmad
:
Fake News Detection Using Machine Learning Ensemble Methods. Complex. 2020: 8885861:1-8885861:11 (2020) - [j9]Safdar Hussain Shaheen, Muhammad Yousaf, Mudassar Jalil:
A smart card oriented secure electronic voting machine built on NTRU. Int. Arab J. Inf. Technol. 17(3): 386-393 (2020)
2010 – 2019
- 2019
- [j8]Jia-Bao Liu
, Muhammad Younas, Mustafa Habib
, Muhammad Yousaf, Waqas Nazeer
:
M-Polynomials and Degree-Based Topological Indices of VC5C7[p, q] and HC5C7[p, q] Nanotubes. IEEE Access 7: 41125-41132 (2019) - [j7]Humaira Afzal, Muhammad Rafiq Mufti, Irfan Awan, Muhammad Yousaf
:
Performance analysis of radio spectrum for cognitive radio wireless networks using discrete time Markov chain. J. Syst. Softw. 151: 1-7 (2019) - [j6]Zeeshan Kaleem
, Muhammad Yousaf, Aamir Qamar, Ayaz Ahmad, Trung Q. Duong, Wan Choi
, Abbas Jamalipour:
UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication. IEEE Netw. 33(6): 124-132 (2019) - [c19]Muhammad Yousaf, Naeem Abbas, Farooq Ali, Muhammad Munwar Iqbal, Yasar Amin, Adeel Akram:
Miniaturized High Gain Antenna for Biomedical Application. ICFNDS 2019: 48:1-48:7 - [c18]Naeem Abbas, Bilal Manzoor, Muhammad Yousaf, Muhammad Zahid
, Zubair Bashir, Adeel Akram, Yasar Amin:
A Compact Wide Band Implantable Antenna for Biotelemetry. INTELLECT 2019: 1-5 - [c17]Zubair Bashir, Muhammad Zahid
, Naeem Abbas, Muhammad Yousaf, Sultan Shoaib, Muhammad Adeel Asghar, Yasar Amin
:
A Miniaturized Wide Band Implantable Antenna for Biomedical Application. UCET 2019: 1-4 - 2018
- [c16]Muhammad Zeeshan Sabir, Muhammad Yousaf
:
Design and Implementation of an End-to-End Web based Trusted Email System. EUSPN/ICTH 2018: 231-238 - [c15]Abdullah Sadam, Nadeem Javaid, Muhammad Usman Sharif, Abdul Wasi Zia, Muhammad Yousaf, Syed Muhammad Saleh Arfi:
Effective Resource Allocation in Fog for Efficient Energy Distribution. NBiS 2018: 248-259 - [c14]Zeeshan Kaleem
, Muhammad Yousaf, Syed Ali Hassan, Nguyen-Son Vo, Trung Quang Duong:
Priority-Based Device Discovery in Public Safety D2D Networks with Full Duplexing. QSHINE 2018: 102-108 - [c13]Syed Muhammad Sajjad
, Muhammad Yousaf
:
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets. TrustCom/BigDataSE 2018: 1547-1550 - [i2]Zeeshan Kaleem, Muhammad Yousaf, Aamir Qamar, Ayaz Ahmad, Trung Quang Duong, Wan Choi, Abbas Jamalipour:
Public-Safety LTE: Communication Services, Standardization Status, and Disaster-Resilient Architecture. CoRR abs/1809.09617 (2018) - 2015
- [c12]Syed Muhammad Sajjad
, Safdar Hussain Bouk, Muhammad Yousaf
:
Neighbor Node Trust based Intrusion Detection System for WSN. EUSPN/ICTH 2015: 183-188 - 2014
- [c11]Sheneela Naz, Tariq Siraj, Muhammad Sajjad Akbar, Muhammad Yousaf
, Amir Qayyum, Mudassir Tufail:
Performance Analysis of IPv6 QoS for Multimedia Applications Using Real Testbed. ANT/SEIT 2014: 182-189 - [c10]Muhammad Sajjad Akbar, Muhammad Saleem Khan, Kishwer Abdul Khaliq
, Amir Qayyum, Muhammad Yousaf
:
Evaluation of IEEE 802.11n for Multimedia Application in VANET. ANT/SEIT 2014: 953-958 - [c9]Tariq Saraj, Muhammad Yousaf
, Muhammad Sajjad Akbar, Amir Qayyum, Mudassir Tufail:
ISP Independent Architecture (IIA) for IPv6 Packet Traversing and Inter-connectivity over Hybrid (IPv4/IPv6) Internet. ANT/SEIT 2014: 973-978 - [c8]Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf
:
Generation of AES-Like S-Boxes by Replacing Affine Matrix. FIT 2014: 159-164 - [c7]Safdar Hussain Shaheen, Muhammad Yousaf
:
Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication. FIT 2014: 165-169 - [c6]Tayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf
:
A Secure Architecture for Inter-cloud Virtual Machine Migration. SecureComm (1) 2014: 24-35 - 2013
- [j5]Shamsul Qamar, Muhammad Yousaf:
Application of a discontinuous Galerkin finite element method to special relativistic hydrodynamic models. Comput. Math. Appl. 65(8): 1220-1232 (2013) - 2012
- [j4]Shamsul Qamar, Muhammad Yousaf:
The space-time CESE method for solving special relativistic hydrodynamic equations. J. Comput. Phys. 231(10): 3928-3945 (2012) - [j3]Peer Azmat Shah
, Muhammad Yousaf
, Amir Qayyum, Halabi Hasbullah:
Performance comparison of end-to-end mobility management protocols for TCP. J. Netw. Comput. Appl. 35(6): 1657-1673 (2012) - [j2]Muhammad Yousaf
, Amir Qayyum, Shahzad A. Malik:
An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation. Wirel. Pers. Commun. 66(1): 57-79 (2012) - 2011
- [j1]Shamsul Qamar, Muhammad Yousaf, Sidrah Mudasser:
The space-time CE/SE method for solving ultra-relativistic Euler equations. Comput. Phys. Commun. 182(4): 994-1004 (2011) - [i1]Nadeem Javaid, Muhammad Yousaf, Aamir Ahmad, Arshad Naveed, Karim Djouani:
Evaluating Impact of Mobility on Wireless Routing Protocols. CoRR abs/1108.3708 (2011) - 2010
- [c5]Sadaf Yasmin, Muhammad Yousaf
, Amir Qayyum:
Security issues related with DNS dynamic updates for mobile nodes: a survey. FIT 2010: 17 - [c4]Ehsan Elahi
, Muhammad Yousaf
, Ambreen Sheikh, Muhammad Maaz Rehan, Muhammad Omer Chughtai, Amir Qayyum:
On the implementation of End-to-End Mobility Management Framework (EMF). WiMob 2010: 458-465
2000 – 2009
- 2009
- [c3]Muhammad Yousaf
, Sohail Bhatti, Maaz Rehan, Amir Qayyum, Shahzad A. Malik:
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH. ICIC (1) 2009: 413-422 - [c2]Peer Azmat Shah
, Muhammad Yousaf
, Amir Qayyum, Shahzad A. Malik:
An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. MoMM 2009: 360-364 - [c1]Maaz Rehan, Muhammad Yousaf
, Amir Qayyum, Shahzad A. Malik:
A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers. WMNC/PWC 2009: 359-369
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-30 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint