Ali Sajjad
Ali Sajjad
BT Applied Research
Verified email at
Cited by
Cited by
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
Effect of planting density on phenology, growth and yield of maize (Zea mays L.).
S Mohammad, B Jehan, A Sajjad, K Hamayoon, MA Khan, S Mohammad
Pakistan Journal of Botany 44 (2), 691-696, 2012
A cloud-edge based data security architecture for sharing and analysing cyber threat information
DW Chadwick, W Fan, G Costantino, R De Lemos, F Di Cerbo, I Herwono, ...
Future Generation Computer Systems 102, 710-722, 2020
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
International Workshop on Recent Advances in Intrusion Detection, 351-371, 2008
Phytochemical and biological investigation of chloroform and ethylacetate fractions of Euphorbia heterophylla leaf (Euphorbiaceae)
F Abiodun, A Sajjad, MQ Irfan, MIC Iqbal
Journal of Medicinal Plants Research 2 (12), 365-369, 2008
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
Security-as-a-service in multi-cloud and federated cloud environments
PS Pawar, A Sajjad, T Dimitrakos, DW Chadwick
IFIP international conference on trust management, 251-261, 2015
Automagi-an autonomic middleware for enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, SM Han, YK Lee, S Lee
Joint International Conference on Autonomic and Autonomous Systems andá…, 2005
Method and system for secure communication with shared cloud services
F El-Moussa, A Sajjad
US Patent 10,594,659, 2020
The factors affecting employee turnover in an organization: The case of Overseas Pakistanis foundation
AK Sajjad
African Journal of Business Management 8 (1), 25-34, 2014
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
A component-based architecture for an autonomic middleware enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
International Conference on Embedded and Ubiquitous Computing, 1225-1234, 2005
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
S Tahir, S Ruj, A Sajjad, M Rajarajan
Computer Communications 133, 102-114, 2019
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
A parallelized disjunctive query based searchable encryption scheme for big data
S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad
Future Generation Computer Systems 109, 583-592, 2020
Secure cloud storage: a framework for data protection as a service in the multi-cloud environment
QH Vu, M Colombo, R Asal, A Sajjad, FA El-Moussa, T Dimitrakos
2015 IEEE Conference on Communications and Network Security (CNS), 638-642, 2015
Seamless enablement of intelligent protection for enterprise cloud applications through service store
J Daniel, T Dimitrakos, F El-Moussa, G Ducatel, P Pawar, A Sajjad
2014 IEEE 6th International Conference on Cloud Computing Technology andá…, 2014
Data protection as a service in the multi-cloud environment
M Colombo, R Asal, QH Hieu, FA El-Moussa, A Sajjad, T Dimitrakos
2019 IEEE 12th International Conference on Cloud Computing (CLOUD), 81-85, 2019
Privacy-preserving COVID-19 contact tracing using blockchain
S Tahir, H Tahir, A Sajjad, M Rajarajan, F Khan
Journal of Communications and Networks 23 (5), 360-373, 2021
Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study
M Abu-Tair, S Djahel, P Perry, B Scotney, U Zia, JM Carracedo, A Sajjad
Sensors 20 (21), 6131, 2020
The system can't perform the operation now. Try again later.
Articles 1–20