Follow
Komal Batool
Title
Cited by
Cited by
Year
Towards a methodology for validation of centrality measures in complex networks
K Batool, MA Niazi
PloS one 9 (4), e90283, 2014
1352014
Modeling the internet of things: a hybrid modeling approach using complex networks and agent-based models
K Batool, MA Niazi
Complex Adaptive Systems Modeling 5, 1-19, 2017
752017
Prevalence of hepatitis B and c in university of the Punjab, Quaid-e-azam campus, Lahore
A Tanveer, K Batool, AW Qureshi
ARPN J Agri and Bio Sci 3, 30-32, 2008
252008
Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code
H Ali, K Batool, M Yousaf, M Islam Satti, S Naseer, S Zahid, AA Gardezi, ...
Security and Communication Networks 2022, 2022
102022
Self-organized power consumption approximation in the internet of things
K Batool, MA Niazi
2015 IEEE International Conference on Consumer Electronics (ICCE), 313-314, 2015
102015
Towards modeling complex wireless sensor networks using agents and networks: a systematic approach
K Batool, MA Niazi, S Sadik, ARR Shakil
TENCON 2014-2014 IEEE Region 10 Conference, 1-6, 2014
102014
Comparison of named entity recognition models based on neural network in biomedical
A Kishwar, K Batool
2021 International Bhurban Conference on Applied Sciences and Technologies …, 2021
42021
Detection of malicious servers for preventing client-side attacks
K Bux, M Yousaf, AH Jalbani, K Batool
Mehran University Research Journal Of Engineering & Technology 40 (1), 230-240, 2021
32021
A comparative analysis between General Data Protection Regulations and California Consumer Privacy Act
SKH Naqvi, K Batool
Journal of Computer Science, Information Technology and Telecommunication …, 2023
2023
Research Article Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code
H Ali, K Batool, M Yousaf, MI Satti, S Naseer, S Zahid, AA Gardezi, ...
2022
Level of Awareness of Women Protection Laws among Public and Private University Teachers in Lahore (Pakistan).
NA Abdullah, MA Malik, K Batool
Journal of Educational Sciences & Research 8 (2), 2021
2021
Exploratory and validated agent-based modeling levels case study: Internet of Things
KBMA niazi
Modeling and Simulation of Complex Communication Networks, 209 –238 (30), 2019
2019
Hawk eye security-security IOT deveices from cyber attacks
M Talha, M Malik, A Hamza, K Batool, M Akram
MCS, 2018
2018
Tamper-Evident Complex Genomic Networks
K Batool, MA Niazi
arXiv, 14, 2017
2017
Detection of Privacy Threat by Peculiar Feature Extraction in Malwares to Combat Targeted Cyber Attacks
FH Ahmad, K Batool, A Javed
Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016
2016
Detection of Privacy Threat by Peculiar Feature Extraction in Malwares to Combat Targeted Cyber Attacks
AJ Farhan Habib Ahmad , Komal Batool
Springer International Publishing 362 (Lecture Notes in Electrical …, 2015
2015
ISSPIT 2017 Technical Program Committee
MF Liew, N Adra, M Ishtiaq, T Alemu, AH Ali, R Ammar, KA Kumar, ...
The system can't perform the operation now. Try again later.
Articles 1–17