Success stories of ICT implementation in Saudi Arabia S Muzafar, NZ Jhanjhi Employing Recent Technologies for Improved Digital Governance, 151-163, 2020 | 48 | 2020 |
Health hazards linked to using mobile cellular phones AR Khan, N Zaman, S Muzafar Journal of Information & Communication Technology (JICT) 2 (2), 8, 2008 | 18 | 2008 |
Ddos attack detection approaches in on software defined network S Muzafar, NZ Jhanjhi, NA Khan, F Ashfaq 2022 14th International conference on mathematics, actuarial science …, 2022 | 14 | 2022 |
DDoS attacks on software defined network: challenges and issues S Muzafar, NZ Jhanjhi 2022 International Conference on Business Analytics for Technology and …, 2022 | 12 | 2022 |
Emerging Cybersecurity Threats in the Eye of E-Governance in the Current Era S Muzafar, M Humayun, SJ Hussain Cybersecurity Measures for E-Government Frameworks, 43-60, 2022 | 8 | 2022 |
Energy harvesting models and techniques for green IoT: A review S Muzafar Role of IoT in Green Energy Systems, 117-143, 2021 | 5 | 2021 |
Secured Software Development and Importance of Secure Software Development Life Cycle TJ Chun, LJ En, MTY Xuen, YM Xuan, S Muzafar Authorea Preprints, 2023 | 1 | 2023 |
Secure Software Development: Issues and Challenges SW Ping, JCJ Wah, LW Jie, JBY Han, S Muzafar arXiv preprint arXiv:2311.11021, 2023 | 1 | 2023 |
A Comprehensive Exploration of DDoS Attacks and Cybersecurity Imperatives in the Digital Age H Ashraf, NZ Jhanjhi, SN Brohi, S Muzafar Navigating Cyber Threats and Cybersecurity in the Logistics Industry, 236-257, 2024 | | 2024 |
From On-Premises to Cloud: Crafting Your Pathway for Migration Success JSA Koshy, SW Ping, CY Hui, TQ Hui, S Muzafar Preprints, 2023 | | 2023 |
Cloud Computing Migration: A Thoughtful Decision YM Xuan, MTY Xuen, S Muzafar Preprints, 2023 | | 2023 |
Energy Harvesting Models and Techniques: A Review S Muzafar Sensor Technology: Concepts, Methodologies, Tools, and Applications, 22-38, 2020 | | 2020 |