​
Login / Signup
Atif Ali
ORCID
Publication Activity (10 Years)
Years Active: 2019-2024
Publications (10 Years): 12
Top Topics
Cognitive Radio Networks
Identity Management
Attack Detection
Deformable Template
Top Venues
ICCR
Inf. Technol. Control.
WTS
CBI (2)
</>
Publications
</>
Atif Ali
,
Awais Zia
,
Abdul Razzaque
,
Hina Shahid
,
Haroon Tariq Sheikh
,
Muhammad Saleem
,
Farhan Yousaf
,
Salman Muneer
Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies.
ICCR
(2024)
Atif Ali
,
Abdul Razzaque
,
Usama Munir
,
Hina Shahid
,
Furqan Wali Khattak
,
Zain Rajpoot
,
Muhammad Kamran
,
Zulqarnain Farid
AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning.
ICCR
(2024)
Shujah Ur Rehman
,
Sania Safdar
,
Yasir Aawais Butt
,
Muhamad Intisar Ullah Khan Sumbal
,
Atif Ali
,
Muhammad Adnan Khan
,
Muhammad Asif
Smart Exact String Matching Algorithm Specifically for DNA Sequencing.
ICCR
(2024)
Atif Ali
,
Furqan Wali Khattak
,
Zulqarnain Farid
,
Hina Shahid
,
Usama Munir
,
Hamza Muneer
,
Ali Raza
The Hidden Ledger: Understanding Bitcoin's Pseudonymity in Dark Web Transactions.
ICCR
(2024)
Atif Ali
,
Shahzad Ahmed
,
Muhammad Hussain
,
Talat Ahmad Bhutta
,
Ali Raza
,
Muhammad Waqas Nadeem
,
Yasir Khan Jadoon
,
Farman Ali
The Synergy of Artificial Intelligence and Cybersecurity.
ICCR
(2024)
Atif Ali
,
Nafees Ahmed Somroo
,
Umer Farooq
,
Muhammad Asif
,
Iman Akour
,
Wathiq Mansoor
Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation.
ICCR
(2022)
Atif Ali
,
Yasir Khan Jadoon
,
Zulqarnain Farid
,
Munir Ahmad
,
Naseem Abidi
,
Haitham M. Alzoubi
,
Ali A. Alzoubi
The Threat of Deep Fake Technology to Trusted Identity Management.
ICCR
(2022)
Atif Ali
,
Khushboo Farid Khan Ghouri
,
Hina Naseem
,
Tariq Rahim Soomro
,
Wathiq Mansoor
,
Alaa M. Momani
Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security.
ICCR
(2022)
Atif Ali
,
Yaser Hafeez
,
Sadia Ali
,
Shariq Hussain
,
Shunkun Yang
,
Arif Jamal Malik
,
Aaqif Afzaal Abbasi
A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study.
Inf. Technol. Control.
50 (3) (2021)
Atif Ali
,
Yaser Hafeez
,
Shariq Hussain
,
Shunkun Yang
Role of Requirement Prioritization Technique to Improve the Quality of Highly-Configurable Systems.
IEEE Access
8 (2020)
Syed Muzammil Hussain
,
M. Hasan Islam
,
Atif Ali
,
Muhammad Usama Nazir
Threat Modeling Framework For Security Of Unified Storages In Private Data Centers.
CBI (2)
(2020)
Abdulsahib Albehadili
,
Atif Ali
,
Farha Jahan
,
Ahmad Y. Javaid
,
Jared Oluoch
,
Vijay Kumar Devabhaktuni
Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS).
WTS
(2019)