Ali Sajjad
Ali Sajjad
BT Applied Research
Verified email at
Cited by
Cited by
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
A cloud-edge based data security architecture for sharing and analysing cyber threat information
DW Chadwick, W Fan, G Costantino, R De Lemos, F Di Cerbo, I Herwono, ...
Future generation computer systems 102, 710-722, 2020
Effect of planting density on phenology, growth and yield of maize (Zea mays L.)
M Shafi, J Bakht, S Ali, H Khan, MA Khan, M Sharif
Pak. J. Bot 44 (2), 691-696, 2012
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
U Zia, M McCartney, B Scotney, J Martinez, M AbuTair, J Memon, A Sajjad
International Journal of Information Security 21 (4), 917-935, 2022
Method and system for secure communication with shared cloud services
F El-Moussa, A Sajjad
US Patent 10,594,659, 2020
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
Phytochemical and biological investigation of chloroform and ethylacetate fractions of Euphorbia heterophylla leaf (Euphorbiaceae)
A Falodun, S Ali, IM Quadir, IMI Choudhary
J. Med. Plants Res 2 (12), 365-369, 2008
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
Security-as-a-service in multi-cloud and federated cloud environments
PS Pawar, A Sajjad, T Dimitrakos, DW Chadwick
Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015 …, 2015
The factors affecting employee turnover in an organization: The case of Overseas Pakistanis foundation
SA Khan
African Journal of Business Management 8 (1), 25, 2014
Automagi-an autonomic middleware for enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, SM Han, YK Lee, S Lee
Joint International Conference on Autonomic and Autonomous Systems and …, 2005
Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study
M Abu-Tair, S Djahel, P Perry, B Scotney, U Zia, JM Carracedo, A Sajjad
Sensors 20 (21), 6131, 2020
Data protection as a service in the multi-cloud environment
M Colombo, R Asal, QH Hieu, FA El-Moussa, A Sajjad, T Dimitrakos
2019 IEEE 12th International Conference on Cloud Computing (CLOUD), 81-85, 2019
Fuzzy keywords enabled ranked searchable encryption scheme for a public cloud environment
S Tahir, S Ruj, A Sajjad, M Rajarajan
Computer Communications 133, 102-114, 2019
Privacy-preserving COVID-19 contact tracing using blockchain
S Tahir, H Tahir, A Sajjad, M Rajarajan, F Khan
Journal of Communications and Networks 23 (5), 360-373, 2021
A parallelized disjunctive query based searchable encryption scheme for big data
S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad
Future Generation Computer Systems 109, 583-592, 2020
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Secure virtualized data volumes
T Dimitrakos, A Sajjad
US Patent 10,505,721, 2019
A component-based architecture for an autonomic middleware enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
A novel pseudo-random number generator for IoT based on a coupled map lattice system using the generalised symmetric map
U Zia, M McCartney, B Scotney, J Martinez, A Sajjad
SN Applied Sciences 4, 1-17, 2022
The system can't perform the operation now. Try again later.
Articles 1–20