1 | Hasan, M. Z., Hanapi, Z. M., Hussain, M. Z., Hussin, M., Sarwar, N., & Akhlaqi, M. Y. (2022). Deep insight into IoT-enabled agriculture and network protocols. Wireless Communications and Mobile Computing, 2022, 1–16. Online |
2 | M. Z. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir, and N. Aslam, “E-challan system implemented in Lahore using digital image processing,” in 2021 International Conference on Innovative Computing (ICIC), 2021. |
3 | M. Z. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir, and N. Aslam, “Code Vision: Learning Mobile Application,” in 2021 International Conference on Innovative Computing (ICIC), 2021 |
4 | M. Z. Hussain, M. Z. Hasan, N. Sarwar, J. Nasir, and N. Aslam, “Cloud application importance and challenges: A Systematic Review,” in 2021 International Conference on Innovative Computing (ICIC), 2021. |
5 | Taimoor Hassan, Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Zaka Ullah, Noor Ul Qamar SPRINGER (2018) “Quantitative Based Mechanism for Resolving Goal Conflicts in Goal-Oriented Requirement Engineering,” International Conference on Intelligent Technologies and Applications (INTAP 2018). http://jdconline.net/intap/ |
6 | Muhammad Zulkifl Hasan, Zaka Ullah, Muhammad Zunnurain Hussain, "A Security Overview of Wireless Sensor Network," International Journal of Computer Science and Information Security (IJCSIS), vol. 16, (5), 20/05/2018, 2018. |
7 | Muhammad Zunnurain Hussain, Tahir Iqbal, Muhammad Zulkifl Hasan & Adeel. M, " Information Retrieval thru cellular devices," International Journal of Computer Science and Information Security (IJCSIS), vol. 16, (5), 20/05/2018, 2018. |
8 | Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, “Implementation of OFDM System Using Various Channel Modulation Schemes,” International Journal of Computer Science and Information Security (IJCSIS), vol. 16, (3), pp. 209-215, 05/4/2018, 2018. |
9 | Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Dr. Khadeeja Anjum, Dr. Arha Anwar, “Sentiment analysis of Autistic Child by Emotional advisor,” International Journal of Computer Science and Information Security (IJCSIS), vol. 16, (3), pp. 234-241, 05/04/2018, 2018. |
10 | Hasan, Muhammad Zulkifl and Hussain, Muhammad Zunnurain (2017) Collective-Study-On-Security-Threats-In-VOIP-Networks, Jan 2017 edn., International Journal of Scientific & Technology Research: International Journal of Scientific & Technology Research. |
11 | Hasan, Muhammad Zulkifl and Hussain, Muhammad Zunnurain (2017) Light Field Photography, Jan 2017 edn., International Journal of Scientific & Technology Research: International Journal of Scientific & Technology Research. |
12 | Hussain, Muhammad Zunnurain and Hasan, Muhammad Zulkifl (2017) Analysis On Security Of Cloud Computing, Jan 2017 edn., International Journal of Scientific & Technology Research: International Journal of Scientific & Technology Research. |
13 | Hussain, Muhammad Zunnurain and Hasan, Muhammad Zulkifl (2017) Collective Study On Security Threats In MANET, Jan 2017 edn., International Journal of Scientific & Technology Research: International Journal of Scientific & Technology Research. |
14 | Hussain, Muhammad Zunnurain and Hasan, Muhammad Zulkifl (2017) Nanopore Sequencing: A Survey, Jan 2017 edn., International Journal of Scientific & Technology Research: International Journal of Scientific & Technology Research |
15 | Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Muhammad Taimoor Aamer Chughtai, " Penetration Testing in System Administration," International Journal of Scientific & Technology Research, vol. 6, no. 6, pp. 275-278, June 2017. |
16 | Muhammad Zulkifl Hasan, Muhammad Zunnurain Hussain, " 3 D Printing," International Journal of Scientific & Technology Research, vol. 6, no. 08, pp. 81, August 2017. |
17 | Z. Ullah and M. Z. Hasan, “Implementation challenges in Campus Network security,” International Journal of Computer Science and Information Security, vol. 15, no. 11, Nov. 2017. |
18 | Cloud Information Security Challenges and Accountable Solution “LGU Journal of Computer Science and Information Technology” ISSN 2519-7991. |
19 | Role of cryptography in information security “International Journal of Electronic Crime Investigation” Vol 2, 2522-3429. |
20 | Hussain, M., Ullah, Z., Hassan, T. and Hasan, M. (2019). Ambient intelligence. LGU Journal of Computer Science & Information Technology ISSN 2519-7991. |
21 | M. Z. Hasan, M. Z. Hussain, Z. Ashiq, Z. Aijaz, and Z. Ullah, “Effectiveness of Modern Educational Games on Society,” LGU Journal of Computer Science & Information Technology ISSN 2519-7991., vol. 2, no. 2, pp. 38–46, Aug. 2018 |
22 | M. Z. Hasan, M. Z. Hussain, Z. Ullah, and T. Hassan, “Future Computing: DNA Hard Drives,” LGU Journal of Computer Science & Information Technology ISSN 2519-7991., Aug. 2019. |
23 | Z. Hussain, Z. Hasan, and Z. Ullah, "Mobile Ad Hoc Networking (MANET)," Uwjcs.org.pk, 2020. [Online]. Available: https://uwjcs.org.pk/. [Accessed: 24- Mar- 2021]. |
24 | Z. Hussain, Z. Hasan, and Z. Ullah, "Managing Cloud Applications Data and Security," Uwjcs.org.pk, 2021. [Online]. Available: https://uwjcs.org.pk/. [Accessed: 24- Mar- 2021]. |
25 | Ibrahim, M. et al. (2022) “Improved Hybrid Deep Collaborative Filtering Approach for True Recommendations,” Computers, Materials & Continua, pp. 1–17.Online |
|