Maaz Bin Ahmad
Maaz Bin Ahmad
Associate Professor, PAF-KIET
Verified email at pafkiet.edu.pk
Title
Cited by
Cited by
Year
Effect of feeding leaves of Morus alba and Morus leavigata on larval growth and silk yield of silk worm, Bombyx mori
K Mahmood, M Ahmad, AH Gilani
Pakistan Journal of Zoology (Pakistan), 1987
131987
A short survey on distributed in-network query processing in wireless sensor networks
MB Ahmad, M Asif, MH Islam, S Aziz
2009 First International Conference on Networked Digital Technologies, 541-543, 2009
122009
A security framework for wireless body area network based smart healthcare system
M Khan, MT Jilani, MK Khan, MB Ahmed
International conference for Young Researchers in Informatics, Mathematics …, 2017
92017
Using genetic algorithm to minimize false alarms in insider threats detection of information misuse in windows environment
M Bin Ahmad, A Akram, M Asif, S Ur-Rehman
Mathematical Problems in Engineering 2014, 2014
72014
Exploiting MB level parallelism in H. 264/AVC encoder for multi-core platform
M Asif, S Majeed, IA Taj, MB Ahmed, SM Ziauddin
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
62014
Multifocal primary lymphoma of the cranial vault in a non-immunocompromised adolescent
M Khalid, MA Siddiqui, SM Qaseem, M Ahmad, S Khalid
JBR-BTR 93 (6), 296-298, 2010
62010
An efficient scheme for intra prediction block size and mode selection in advanced video coding
M Asif, IA Taj, SM Ziauddin, MB Ahmad, M Tahir
2015 13th International Conference on Frontiers of Information Technology …, 2015
52015
Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment.
MB Ahmad, A Akram, M Asif, S Ur-Rehman
Mathematical Problems in Engineering, 2014
52014
Implementation of a behavior driven methodology for insider threats detection of misuse of information in windows environment
MB Ahmad, A Akram, H Islam
International Information Institute (Tokyo). Information 16 (11), 8121, 2013
42013
Implementation of insider threat detection system using honeypot based sensors and threat analytics
MM Yamin, B Katt, K Sattar, MB Ahmad
Future of Information and Communication Conference, 801-829, 2019
32019
A generalized multi-layer framework for video coding to select prediction parameters
M Asif, MB Ahmad, IA Taj, M Tahir
IEEE Access 6, 25277-25291, 2018
22018
An efficient inter prediction mode selection scheme for advanced video coding based on motion homogeneity and residual complexity
M Asif, IA Taj, SM Ziauddin, MB Ahmad, A Raza
IEEJ Transactions on Electrical and Electronic Engineering 11 (6), 760-767, 2016
22016
Impact of HVDC grid segmentation topology on transient stability of HVDC-segmented electric grid
R Naeem, MS Cheema, M Ahmad, SA Haider, UT Shami
2015 International Conference on Open Source Systems & Technologies (ICOSST …, 2015
22015
Towards a Realistic Risk Assessment Methodology for Insider Threats of Information Misuse
MB Ahmad, A Akram, M Asif
2014 12th International Conference on Frontiers of Information Technology …, 2014
22014
DoS/DDoS Detection for E-Healthcare in Internet of Things
I ul Sami, MB Ahmad, M Asif, R Ullah
2
Towards Reducing the Damage of Fire through Firefighting Autonomous Robot
UB Abad, M Asif, MB Ahmad, T Mahmood, A Hashmi, MA Cheema
Technical Journal 24 (02), 2019
12019
An Automatic Accident Detection System: A Hybrid Solution
A Hassan, MS Abbas, M Asif, MB Ahmad, MZ Tariq
2019 4th International Conference on Information Systems Engineering (ICISE …, 2019
12019
A Comparison of Detection Techniques for Attacks on MANETs
H Gul, MB Ahmad, M Asif
2019 4th International Conference on Information Systems Engineering (ICISE …, 2019
12019
A hybrid scheme based on pipelining and multitasking in mobile application processors for advanced video coding
M Asif, IA Taj, SM Ziauddin, MB Ahmad, M Tahir
Scientific Programming 2015, 2015
12015
A novel application to secure misuse of information in critical organizations for windows environment
MB Ahmad, M Asif, SMM Gilani, MH Islam
Fifth International Conference on Computing, Communications and Networking …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20