1. Combinatorial trace method for network immunization
2. M. Ahmad , J. Tariq , M. Farhan , M. Shabbir , and I. Khan . 2016. Who should receive the vaccine? . In Australasian Data Mining Conference (AusDM). 137–145 . M. Ahmad, J. Tariq, M. Farhan, M. Shabbir, and I. Khan. 2016. Who should receive the vaccine?. In Australasian Data Mining Conference (AusDM). 137–145.
3. M. Ahmad J. Tariq M. Shabbir and I. Khan. 2017. Spectral Methods for Immunization of Large Networks. Australasian Journal of Information Systems 21 (2017). M. Ahmad J. Tariq M. Shabbir and I. Khan. 2017. Spectral Methods for Immunization of Large Networks. Australasian Journal of Information Systems 21 (2017).
4. S. Ali. 2021. Cache Replacement Algorithm. arXiv preprint arXiv:2107.14646(2021). S. Ali. 2021. Cache Replacement Algorithm. arXiv preprint arXiv:2107.14646(2021).
5. S. Ali , M. Alvi , S. Faizullah , M. Khan , A. Alshanqiti , and I. Khan . 2020. Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow . In International Conference on Advances in the Emerging Computing Technologies (AECT). 1–6. S. Ali, M. Alvi, S. Faizullah, M. Khan, A. Alshanqiti, and I. Khan. 2020. Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow. In International Conference on Advances in the Emerging Computing Technologies (AECT). 1–6.