default search action
Yawar Abbas Bangash
Person information
- affiliation: Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Arusa Kanwal, Mohammad Nizamuddin, Waseem Iqbal, Waqas Aman, Yawar Abbas Bangash, Shynar Mussiraliyeva:
Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications. IEEE Access 12: 56517-56553 (2024) - [j18]Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva, Saddaf Rubab, Bilal Rauf:
Reliability through an optimal SDS controller's placement in a SDDC and smart city. Clust. Comput. 27(6): 7219-7240 (2024) - [j17]Burhan Sher, Mustafeez Ahmad, Khwaja Mansoor, Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva:
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system. Clust. Comput. 27(9): 12267-12282 (2024) - [j16]Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas Bangash, Shynar Mussiraliyeva, Abdellah Chehri:
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems. Internet Things 27: 101228 (2024) - [c4]Syed Muhammad Waqas, Yazhe Tang, Fakhar Abbas, Mehboob Hussain, Yawar Abbas Bangash:
FGNN-Based Improved Resource Distribution Framework for V2X Wireless Networks. VTC Spring 2024: 1-6 - 2023
- [j15]Anique Azhar, Saddaf Rubab, Malik Murtaza Khan, Yawar Abbas Bangash, Mohammad Dahman Alshehri, Fizza Illahi, Ali Kashif Bashir:
Detection and prediction of traffic accidents using deep learning techniques. Clust. Comput. 26(1): 477-493 (2023) - [j14]Yawar Abbas Bangash, Waseem Iqbal, Saddaf Rubab, Abdul Waheed Khan, Waqas Aman:
BSLPSDN: Base station location privacy via software-defined networking (SDN) in wireless sensor networks. Int. J. Commun. Syst. 36(17) (2023) - [c3]Muhammad Shoaib, Muhammad Faisal Amjad, Yawar Abbas Bangash:
Vadsec-a Lightweight Protection Scheme for Secure Topology Discovery in SDN. ICNCC 2023: 46-51 - 2022
- [j13]Bilal Rauf, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas Bangash, Hammad Afzal:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. ACM Comput. Surv. 54(6): 121:1-121:36 (2022) - [j12]Bilal Rauf, Haider Abbas, Ahmad Muqeem Sheri, Waseem Iqbal, Yawar Abbas Bangash, Mahmoud Daneshmand, Muhammad Faisal Amjad:
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN. IEEE Internet Things J. 9(14): 11725-11736 (2022) - [j11]Chen Yang, Peng Liang, Liming Fu, Guorui Cui, Fei Huang, Feng Teng, Yawar Abbas Bangash:
Using 5G in smart cities: A systematic mapping study. Intell. Syst. Appl. 14: 200065 (2022) - [i1]Chen Yang, Peng Liang, Liming Fu, Guorui Cui, Fei Huang, Feng Teng, Yawar Abbas Bangash:
Using 5G in Smart Cities: A Systematic Mapping Study. CoRR abs/2202.04312 (2022) - 2021
- [j10]Syed Wasif Abbas Hamdani, Abdul Waheed Khan, Naima Iltaf, Javed Iqbal Bangash, Yawar Abbas Bangash, Asfandyar Khan:
Dynamic distributed trust management scheme for the Internet of Things. Turkish J. Electr. Eng. Comput. Sci. 29(2): 796-815 (2021) - [j9]Waseem Iqbal, Haider Abbas, Pan Deng, Jiafu Wan, Bilal Rauf, Yawar Abbas Bangash, Imran Rashid:
ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes. IEEE Internet Things J. 8(12): 9622-9633 (2021) - 2020
- [j8]Kaleem Ullah, Imran Rashid, Hammad Afzal, Mian Muhammad Waseem Iqbal, Yawar Abbas Bangash, Haider Abbas:
SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks. IEEE Commun. Surv. Tutorials 22(2): 1337-1371 (2020) - [j7]Mian Muhammad Waseem Iqbal, Haider Abbas, Mahmoud Daneshmand, Bilal Rauf, Yawar Abbas Bangash:
An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security. IEEE Internet Things J. 7(10): 10250-10276 (2020) - [j6]Tauseef Rana, Yawar Abbas Bangash, Abdullah Baz, Toqir Ahmad Rana, Muhammad Ali Imran:
Incremental Composition Process for the Construction of Component-Based Management Systems. Sensors 20(5): 1351 (2020) - [j5]Yawar Abbas Bangash, Haider Abbas, Mian Muhammad Waseem Iqbal, Malik Muhammad Zaki Murtaza Khan, Bilal Rauf, Hammad Afzal:
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC. IEEE Syst. J. 14(3): 4489-4499 (2020)
2010 – 2019
- 2019
- [j4]Yawar Abbas Bangash, Tauseef Rana, Haider Abbas, Muhammad Ali Imran, Adnan Ahmed Khan:
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy. IEEE Access 7: 10718-10733 (2019) - [j3]Tauseef Rana, Yawar Abbas Bangash, Haider Abbas:
Flow Constraint Language for Coordination by Exogenous Connectors. IEEE Access 7: 138341-138352 (2019) - [j2]Muhammad Yaseen, Mian Muhammad Waseem Iqbal, Imran Rashid, Haider Abbas, Mujahid Mohsin, Kashif Saleem, Yawar Abbas Bangash:
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. J. Medical Syst. 43(11): 324:1-324:18 (2019) - 2017
- [j1]Yawar Abbas Bangash, Lingfang Zeng, Dan Feng:
MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks. J. Comput. Sci. Technol. 32(5): 991-1007 (2017) - 2016
- [c2]Yawar Abbas Bangash, Lingfang Zeng, Shijun Deng, Dan Feng:
Lpsdn: Sink-Node Location Privacy in WSNs via SDN Approach. NAS 2016: 1-10 - 2015
- [c1]Yawar Abbas Bangash, Lingfang Zeng, Dan Feng:
MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks. NAS 2015: 158-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint