-
1
-
2by Zhen Ying, Iftikhar Ahmad, Saima Mateen, Asad Zia, null Ambreen, Shah Nazir, Neelam Mukhtar“...Hindawi-Wiley...”
Published 2021-01-01
Get full text
Article -
3
-
4
-
5Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication“...Hindawi-Wiley...”
Get full text
Article -
6
-
7
-
8by Hao Qinxia, Shah Nazir, Ma Li, Habib Ullah Khan, Wang Lianlian, Sultan Ahmad“...Hindawi-Wiley...”
Published 2021-01-01
Get full text
Article -
9by Guan Wang, Farhad Ali, Jonghoon Yang, Shah Nazir, Ting Yang, Abdullah Khan, Muhammad Imtiaz“...Hindawi-Wiley...”
Published 2021-01-01
Get full text
Article -
10by Asad Ullah, Jing Wang, M. Shahid Anwar, Arshad Ahmad, Shah Nazir, Habib Ullah Khan, Zesong Fei“...Hindawi-Wiley...”
Published 2021-01-01
Get full text
Article -
11
-
12
-
13
-
14
-
15by Juanjuan Huang, Ihtisham Ul Haq, Chaolan Dai, Sulaiman Khan, Shah Nazir, Muhammad Imtiaz“...Hindawi-Wiley...”
Published 2021-01-01
Get full text
Article -
16
-
17by Arshad Ahmad, Chong Feng, Muzammil Khan, Asif Khan, Ayaz Ullah, Shah Nazir, Adnan Tahir“...Hindawi-Wiley...”
Published 2020-01-01
Get full text
Article -
18
-
19
-
20