1 | AAAA: SSO and MFA Implementation in Multi-Cloud to Mitigate Rising Threats and Concerns Related to User Metadata Applied Science. 11, 3012, 2021 (IF=2.474) | Hussain, M.I.; He, J.; Zhu, N.; Sabah, F.; Zardari, Z.A.; Hussain, S.; Razque, |
2 | A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANET, 2019, EI, ESCI, Future Internet, 11(3), 61, 2019 (EI) | Z.A. Zardari, J. He, N. Zhu, K.H. Mohammadani, M.S. Pathan, M.I.
Hussain, M.Q. Hussain, |
3 | A lightweight technique for detection and prevention of wormhole attack in MANET, EAI Endorsed Transactions on Scalable Information Systems, 8 July, 2020 | Z.A. Zardari, K. Ali Memon, R. Ali Shah, S. Dehraj, I. Ahmed |
4 | A Scheme for Finding and Blocking Black Hole Nodes in Mobile Ad Hoc Networks, International Journal of Network Security, Vol.21, No.6, PP.1021-1030, Nov. 2019 (ESCI) | Z.A Zardari, J. He, N. Zhu, M.S Pathan, M.Q Memon, M.I Hussain, P. He, C. Chang, |
5 | Detection and prevention of jellyfish attack using kNN algorithm and trusted routing scheme in MANET, International Journal of Network Security, (ESCI), | Z.A Zardari, J. He, M.S Pathan, S. Qureshi, M. I Hussain, F. Razaque, |
6 | A Hybrid Technique for Tunneling Mechanism of IPv6 using Teredo and 6RD to enhance the Network Performance. International journal of advanced computer science and applications, 9(11), 100-105, 2018 (Scopus) | Zardari, Z. A., Ali, M., Shah, R. A., & Zardari, L. H. |
7 | Distributed management of permission for access control model, Journal of Intelligent & Fuzzy Systems, vol. 38, no. 2, pp. 1539-1548, 2020 (IF= 1.637) | C. Fangbo, H. Jingsha, Z.A. Zardari, H. Song, |
8 | An ensemble clustering approach for topic discovery using implicit text segmentation, Journal of Information Science, pp.1-27, 2020 (IF=2.327) | M.Q.Memon, Y. Lu, P. Chen, A. Memon, M.S Pathan, Z.A. Zardari, |
9 | Assessment of IPv4 and IPv6 Networks with Different Modified Tunneling Techniques using OPNET, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 9, 2019 (Scopus) | Asif K. Babar, Zulfiqar A. Zardari, Nazish N. Hussaini, S. Qureshi, S.Han |
10 | Novel Joint Subcarrier and Power Allocation Method in SWIPT for WSNs Employing OFDM System, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 5, 2019 (Scopus) | S. Memon, K. Ali Memon, Z. A. Zardari, Muhammad A. Panhwar, Sijjad A. Khuhro, A. Siddiqui |
11 | An efficient trust-based scheme for secure and quality of service routing in MANETs, Future Internet, pp.10, vol. 16, 2018 (ESCI) | M.S. Pathan, N. Zhu, J. He, Z.A. Zardari, M.Q. Memon, M.I. Hussain, |
12 | M.S. Pathan, J. He, N. Zhu, , Z.A. Zardari, M.Q. Memon, A. Azmat, An efficient scheme for detecting and isolating gray-hole attacks in AODV based mobile ad hoc networks, International Journal of Communication Networks and Distributed Systems 24(1), 2018 (EI) | M.S. Pathan, J. He, N. Zhu, , Z.A. Zardari, M.Q. Memon, A. Azmat, |
13 | An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs, International Journal of Advanced Computer Science and Applications, vol. 10, No. 1, 2019 (Scopus) | M.S. Pathan, J. He, N. Zhu, Z. A. Zardari, M. Q. Memon, A. Azmat, |
14 | Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet, Mehran University Research Journal of Engineering and Technology vol. 32 no. 3 pp. 519-528 (2013) | Khanzada, Tariq Jamil Saifullah, Naveed Ahmed Jaffari, and Zulfiqar Ali Zardari, |