Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Junaid
    Last name: Arshad
    DBLP: 21/8344
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 17 of 17  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Anum Ali, Ghalib A. Shah, Junaid Arshad.
    Energy efficient techniques for M2M communication: A survey.
    J. Network and Computer Applications 2016, Volume 68 (0) 2016
    Conference paper
    Junaid Arshad, Alexander Hoffmann, Sandra Gesing, Richard Grunzke, Jens Krüger 0002, Tamás Kiss, Sonja Herres-Pawlis, Gábor Terstyánszky.
    Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry.
    J. Cheminformatics 2016, Volume 8 (0) 2016
    Conference paper
    Junaid Arshad, Gábor Terstyánszky, Tamás Kiss, Noam Weingarten, Giuliano Taffoni.
    A Formal Approach to Support Interoperability in Scientific Meta-workflows.
    J. Grid Comput. 2016, Volume 14 (0) 2016
    Conference paper
    Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah.
    Clustering VoIP caller for SPIT identification.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Gabriele Pierantoni, Dermot Frost, Sandra Gesing, Sílvia Delgado Olabarriaga, Mohammad Mahdi Jaghoori, Gábor Terstyanszky, Junaid Arshad.
    A Model for Information and Action Flows Connecting Science Gateways to Distributed Computing Infrastructures.
    Proceedings of the 8th International Workshop on Science Gateways, IWSG 2016, Rome, Italy, June 8-10, 2016 2017 (0) 2016
    Conference paper
    Junaid Arshad, Aneela Zameer, Asifullah Khan.
    Wind Power Prediction Using Genetic Programming Based Ensemble of Artificial Neural Networks (GPeANN).
    12th International Conference on Frontiers of Information Technology, FIT 2014, Islamabad, Pakistan, December 17-19, 2014 2014 (0) 2014
    Conference paper
    Junaid Arshad, Paul Townend, Jie Xu.
    A novel intrusion severity analysis approach for Clouds.
    Future Generation Comp. Syst. 2013, Volume 29 (0) 2013
    Conference paper
    Junaid Arshad, Muhammad Ajmal Azad, Imran Ali Jokhio, Paul Townend.
    Intrusion damage assessment for multi-stage attacks for clouds.
    IET Communications 2013, Volume 7 (0) 2013
    Journal article
    Junaid Arshad, Paul Townend, Jie Xu, Wei Jie.
    Cloud Computing Security: Opportunities and Pitfalls.
    IJGHPC 2012, Volume 4 (0) 2012
    Conference paper
    Wei Jie, Junaid Arshad, Richard O. Sinnott, Paul Townend, Zhou Lei.
    A review of grid authentication and authorization technologies and support for federated access control.
    ACM Comput. Surv. 2010, Volume 43 (0) 2011
    Journal article
    Junaid Arshad, Paul Townend, Jie Xu.
    An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds.
    IJCAC 2011, Volume 1 (0) 2011
    Conference paper
    Christopher Bayliss, Richard O. Sinnott, Wei Jie, Junaid Arshad.
    The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research.
    E-Technologies: Transformation in a Connected World - 5th International Conference, MCETECH 2011, Les Diablerets, Switzerland, January 23-26, 2011, Revised Selected Papers 2011 (0) 2011
    Conference paper
    Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, Wantao Liu.
    A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.
    Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings 2010 (0) 2010
    Journal article
    Wei Jie, Junaid Arshad, Pascal Ekin.
    Authentication and authorization infrastructure for Grids - issues, technologies, trends and experiences.
    The Journal of Supercomputing 2010, Volume 52 (0) 2010
    Conference paper
    Junaid Arshad, Paul Townend, Jie Xu.
    Quantification of Security for Compute Intensive Workloads in Clouds.
    15th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2009, Shenzhen, China, December 8-11, 2009 2009 (0) 2009
    Conference paper
    Wei Jie, Alistair Young, Junaid Arshad, June Finch, Rob Procter, A. Turner.
    A Guanxi Shibboleth based Security Infrastructure.
    Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, ECOCW 2008, 16 September 2008, Munich, Germany 2008 (0) 2008
    Conference paper
    Junaid Arshad, Mohammad Ajmal Azad.
    Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
    Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2006, September 25-28, 2006, Reston, VA, USA 2006 (0) 2006
    Show item 1 to 17 of 17  

    Your query returned 17 matches in the database.