Grid neighbourhood based three way clustering (3WC)
Shoaib, Muhammad, Ali Tanveer, Tamleek, Ali, Bahar, Hayat, Bashir, Shah, Anwar
Published in Information sciences (01.02.2024)
Published in Information sciences (01.02.2024)
Get full text
Journal Article
Formal Verification of the xDAuth Protocol
Alam, Quratulain, Tabbasum, Saher, Malik, Saif U. R., Alam, Masoom, Ali, Tamleek, Akhunzada, Adnan, Khan, Samee U., Vasilakos, Athanasios V., Buyya, Rajkumar
Published in IEEE transactions on information forensics and security (01.09.2016)
Published in IEEE transactions on information forensics and security (01.09.2016)
Get full text
Journal Article
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
Jan, Salman, Musa, Shahrulniza, Ali, Toqeer, Nauman, Mohammad, Anwar, Sajid, Ali Tanveer, Tamleek, Shah, Babar
Published in Expert systems (01.06.2021)
Published in Expert systems (01.06.2021)
Get full text
Journal Article
Secure Actor Directed Localization in Wireless Sensor and Actor Networks
Alam, Masoom, Khan, Muazzam A., Hayat, Amir, Ali, Muhammad, Ali, Tamleek
Published in International journal of distributed sensor networks (01.01.2013)
Published in International journal of distributed sensor networks (01.01.2013)
Get full text
Journal Article
Behavioral Attestation for Web Services Based Business Processes
Alam, Masoom, Nauman, Mohammad, Zhang, Xinwen, Ali, Tamleek, Hung, Patrick C. K, Alam, Quratulain
Published in International journal of web services research (01.07.2010)
Published in International journal of web services research (01.07.2010)
Get full text
Journal Article
A deep learning system for health care IoT and smartphone malware detection
Amin, Muhammad, Shehwar, Duri, Ullah, Abrar, Guarda, Teresa, Tanveer, Tamleek Ali, Anwar, Sajid
Published in Neural computing & applications (01.07.2022)
Published in Neural computing & applications (01.07.2022)
Get full text
Journal Article
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques
Amin, Muhammad, Al-Obeidat, Feras, Tubaishat, Abdallah, Shah, Babar, Anwar, Sajid, Tanveer, Tamleek Ali
Published in Computers & electrical engineering (01.05.2023)
Published in Computers & electrical engineering (01.05.2023)
Get full text
Journal Article
Deep neural architectures for large scale android malware analysis
Nauman, Mohammad, Tanveer, Tamleek Ali, Khan, Sohail, Syed, Toqeer Ali
Published in Cluster computing (01.03.2018)
Published in Cluster computing (01.03.2018)
Get full text
Journal Article
An Automated Permission Selection Framework for Android Platform
Ali, Toqeer, Khan, Yasar, Ali, Tamleek, Faizullah, Safiullah, Alghamdi, Turki, Anwar, Sajid
Published in Journal of grid computing (01.09.2020)
Published in Journal of grid computing (01.09.2020)
Get full text
Journal Article
DeepSIC: a deep model: For satellite image classification
Amin, Muhammad, Tanveer, Tamleek Ali, Shah, Shakirullah, Abdullah, Muhammad, Shafi, Muhammad
Published in Cluster computing (01.03.2018)
Published in Cluster computing (01.03.2018)
Get full text
Journal Article
DeepSIC: a deep model
Amin, Muhammad, Tanveer, Tamleek Ali, Shah, Shakirullah, Abdullah, Muhammad, Shafi, Muhammad
Published in Cluster computing (01.03.2018)
Published in Cluster computing (01.03.2018)
Get full text
Journal Article
An Android runtime security policy enforcement framework
Banuri, Hammad, Alam, Masoom, Khan, Shahryar, Manzoor, Jawad, Ali, Bahar, Khan, Yasar, Yaseen, Mohsin, Tahir, Mir Nauman, Ali, Tamleek, Alam, Quratulain, Zhang, Xinwen
Published in Personal and ubiquitous computing (01.08.2012)
Published in Personal and ubiquitous computing (01.08.2012)
Get full text
Journal Article
Behavioral Attestation for Web Services using access policies
Alam, Masoom, Zhang, Xinwen, Nauman, Mohammad, Ali, Tamleek, Ali, Muhammad, Anwar, Sajid, Alam, Quratulain
Published in Multimedia tools and applications (01.09.2013)
Published in Multimedia tools and applications (01.09.2013)
Get full text
Journal Article
Behavioral Attestation for Web Services using access policies: Secure Multimedia Communication in Vehicular Adhoc Network
ALAM, Masoom, XINWEN ZHANG, NAUMAN, Mohammad, ALI, Tamleek, ALI, Muhammad, ANWAR, Sajid, ALAM, Quratulain
Published in Multimedia tools and applications (2013)
Get full text
Published in Multimedia tools and applications (2013)
Journal Article