default search action
Ajaz Hussain Mir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Shaiqa Nasreen, Ajaz Hussain Mir:
Cloud forensics: A centralized cloud provenance investigation system using MECC. Concurr. Comput. Pract. Exp. 36(6) (2024) - 2023
- [j26]Suhail Ahmad, Ajaz Hussain Mir:
Securing Centralized SDN control with Distributed Blockchain Technology. Comput. Sci. 24(1) (2023) - [j25]Ummer Iqbal, Ajaz Hussain Mir:
Practical and scalable access control mechanism for wireless sensor networks. Int. J. Internet Protoc. Technol. 16(1): 11-33 (2023) - [j24]Suhail Ahmad, Ajaz Hussain Mir:
Protection of centralized SDN control plane from high-rate Packet-In messages. Int. J. Inf. Sec. 22(5): 1197-1206 (2023) - [j23]Shaiqa Nasreen, Ajaz Hussain Mir:
Enhancing Cloud Forensic Investigation System in Distributed Cloud Computing Using DK-CP-ECC Algorithm and EK-ANFIS. J. Mobile Multimedia 19(3): 679-706 (2023) - 2022
- [j22]Shoaib Amin Banday, Rafia Nahvi, Ajaz Hussain Mir, Samiya Khan, Ahmad Saeed AlGhamdi, Sultan S. Alshamrani:
Ground glass opacity detection and segmentation using CT images: an image statistics framework. IET Image Process. 16(9): 2432-2445 (2022) - [j21]Sajaad Ahmed Lone, Ajaz Hussain Mir:
A novel OTP based tripartite authentication scheme. Int. J. Pervasive Comput. Commun. 18(4): 437-459 (2022) - [j20]Ummer Iqbal, Ajaz Hussain Mir:
Secure and practical access control mechanism for WSN with node privacy. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3630-3646 (2022) - [j19]Malik S. A., Ajaz Hussain Mir:
Synchronization of Fractional Order Neurons in Presence of Noise. IEEE ACM Trans. Comput. Biol. Bioinform. 19(3): 1887-1896 (2022) - [j18]Haider Mehraj, Ajaz Hussain Mir:
Robust Multimodal Biometric System Based on Feature Level Fusion of Optimiseddeepnet Features. Wirel. Pers. Commun. 127(3): 2461-2482 (2022) - 2021
- [j17]Haider Mehraj, Ajaz Hussain Mir:
A Survey of Biometric Recognition Using Deep Learning. EAI Endorsed Trans. Energy Web 8(33): e6 (2021) - [j16]Adil Bashir, Ajaz Hussain Mir:
Lightweight secure MQTT for mobility enabled e-health internet of things. Int. Arab J. Inf. Technol. 18(6): 773-781 (2021) - [j15]Suhail Ahmad, Ajaz Hussain Mir:
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers. J. Netw. Syst. Manag. 29(1): 9 (2021) - [j14]Malik S. A., Ajaz Hussain Mir:
Discrete Multiplierless Implementation of Fractional Order Hindmarsh-Rose Model. IEEE Trans. Emerg. Top. Comput. Intell. 5(5): 792-802 (2021) - 2020
- [j13]Haider Mehraj, Ajaz Hussain Mir:
Feature vector extraction and optimisation for multimodal biometrics employing face, ear and gait utilising artificial neural networks. Int. J. Cloud Comput. 9(2/3): 131-149 (2020) - [j12]Ummer Iqbal, Ajaz Hussain Mir:
Secure and scalable access control protocol for IoT environment. Internet Things 12: 100291 (2020) - [j11]Omar Rafique, Ajaz Hussain Mir:
A topological approach for cancer subtyping from gene expression data. J. Biomed. Informatics 102: 103357 (2020) - [j10]Omar Rafique, Ajaz Hussain Mir:
Weighted dimensionality reduction and robust Gaussian mixture model based cancer patient subtyping from gene expression data. J. Biomed. Informatics 112: 103620 (2020) - [j9]Bazila Hashia, Ajaz Hussain Mir:
Texture features' based classification of MR images of normal and herniated intervertebral discs. Multim. Tools Appl. 79(21-22): 15171-15190 (2020) - [j8]Malik S. A., Ajaz Hussain Mir:
Synchronization of Hindmarsh Rose Neurons. Neural Networks 123: 372-380 (2020)
2010 – 2019
- 2019
- [j7]Mahroosh Banday, Ajaz Hussain Mir:
Cancellable biometric system based on linear combination of trigonometric functions with special application to forensic dental biometrics. Int. J. Biom. 11(4): 342-371 (2019) - [j6]Adil Bashir, Ajaz Hussain Mir:
Secure Framework for Internet of Things Based e-Health System. Int. J. E Health Medical Commun. 10(4): 16-29 (2019) - [c9]Mahroosh Banday, Ajaz Hussain Mir:
Dental Biometric Identification System using AR Model. TENCON 2019: 2363-2369 - 2018
- [j5]Mahroosh Banday, Ajaz Hussain Mir:
Forensic dental biometry - a human identification system using panoramic dental radiographs based on shape of mandibular bone. Int. J. Biom. 10(4): 291-314 (2018) - [j4]Riaz A. Khan, Ajaz Hussain Mir:
A buffering mechanism for IP mobility support in 6LoWPAN-WSN under critical environment. Int. J. Internet Protoc. Technol. 11(4): 193-204 (2018) - [c8]Mohammad Ahsan Chishti, Shaima Qureshi, Ajaz Hussain Mir:
Performance Analysis of Payload Header Suppression (PHS) for Transmission of VoIP over MPLS based IPv4/IPv6 Network. IMCOM 2018: 21:1-21:6 - 2017
- [j3]Shoaib Amin Banday, Ajaz Hussain Mir:
Enhancement and segmentation of pituitary gland from MR brain images. Int. J. Medical Eng. Informatics 9(3): 201-219 (2017) - [j2]Shoaib Amin Banday, Ajaz Hussain Mir:
Statistical textural feature and deformable model based brain tumor segmentation and volume estimation. Multim. Tools Appl. 76(3): 3809-3828 (2017) - 2016
- [c7]Shoaib Amin Banday, Ajaz Hussain Mir:
Statistical textural feature and deformable model based MR brain tumor segmentation. ICACCI 2016: 657-663 - 2014
- [c6]Riaz A. Khan, Ajaz Hussain Mir:
Performance analysis of host based and network based IP mobility management schemes over IPv6 network. ICACCI 2014: 1798-1803 - [c5]Saba Mushtaq, Ajaz Hussain Mir:
Novel method for image splicing detection. ICACCI 2014: 2398-2403 - [i1]Riaz A. Khan, Ajaz Hussain Mir:
A Study of Network Based Mobility Management Schemes, 6LoWPAN Mobility, Open Issues and Proposed Solutions. CoRR abs/1408.2632 (2014) - 2013
- [c4]Mohammad Ahsan Chishti, Ashaq Majid Ahanger, Shaima Qureshi, Ajaz Hussain Mir:
Performance analysis of Source Specific Multicast over Internet Protocol version 6 with Internet Protocol version 4 in a test bed. CCNC 2013: 956-961 - 2011
- [c3]Suhail Ahmad, Ajaz Hussain Mir, Ghulam Rasool Beigh:
Latency evaluation of extensible authentication protocols in WLANs. IEEE ANTS 2011: 1-5 - 2010
- [j1]Arooj Nissar, Ajaz Hussain Mir:
Classification of steganalysis techniques: A study. Digit. Signal Process. 20(6): 1758-1770 (2010)
2000 – 2009
- 2009
- [c2]Gh. Rasool Begh, Ajaz Hussain Mir:
Quantification of the Effect of Security on Performance in Wireless LANs. SECURWARE 2009: 57-62 - [c1]Zahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab:
Fingerprint Texture Feature for Discrimination and Personal Verification. SECURWARE 2009: 230-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint