An analysis of the privacy and security risks of android vpn permission-enabled apps M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson Proceedings of the 2016 internet measurement conference, 349-364, 2016 | 182 | 2016 |
Security and privacy in IoT using machine learning and blockchain: threats and countermeasures N Waheed, X He, M Ikram, M Usman, SS Hashmi, M Usman ACM Computing Surveys 53 (6), 37, 2020 | 155 | 2020 |
Mobile health and privacy: cross sectional study G Tangari, M Ikram, K Ijaz, MA Kaafar, S Berkovsky bmj 373, 2021 | 116 | 2021 |
Route-over vs Mesh-under Routing in 6LoWPAN AH Chowdhury, M Ikram, HS Cha, H Redwan, SMS Shams, KH Kim, ... Proceedings of the 2009 international conference on wireless communications …, 2009 | 108 | 2009 |
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning Ikram, A Muhammad, K Hassan Jameel, M Mohamed Ali, K Anirban, ... https://petsymposium.org/2017/papers/issue1/paper10-2017-1-source.pdf, 79-99, 2017 | 105 | 2017 |
Image Retrieval in Multimedia Databases: A Survey Y Alemu, J Koh, M Ikram, DK Kim Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH …, 2009 | 77 | 2009 |
Decentralized Control: A Case Study of Russia R Ramesh, RS Raman, M Bernhard, V Ongkowijaya, L Evdokimov, ... | 74 | 2020 |
The chain of implicit trust: An analysis of the web third-party resources loading M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi The World Wide Web Conference, 2851-2857, 2019 | 71 | 2019 |
A first look at mobile ad-blocking apps M Ikram, MA Kaafar 2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017 | 57 | 2017 |
4G/5G antenna system with dual function planar connected array M Ikram, R Hussain, MS Sharawi IET microwaves, antennas & propagation 11 (12), 1760-1764, 2017 | 52 | 2017 |
Characterizing key stakeholders in an online black-hat marketplace S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ... 2017 APWG Symposium on Electronic Crime Research (eCrime), 17-27, 2017 | 45 | 2017 |
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling M Ikram, P Beaume, MA Kaafar SecCrypt, 10, 2019 | 38 | 2019 |
Incognito: A method for obfuscating web data R Masood, D Vatsalan, M Ikram, MA Kaafar Proceedings of the 2018 world wide web conference, 267-276, 2018 | 36 | 2018 |
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna AsiaCCS, 1--13, 2019 | 34 | 2019 |
Measuring, characterizing, and detecting Facebook like farms M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ... ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017 | 30 | 2017 |
iOS, Your OS, Everybody’s OS: Vetting and Analyzing Network Services of iOS Applications Z Tang, K Tang, M Xue, Y Tian, S Chen, M Ikram, T Wang, H Zhu USENIX Security 2020, 2020 | 26 | 2020 |
Analyzing security issues of android mobile health and medical applications G Tangari, M Ikram, IWB Sentana, K Ijaz, MA Kaafar, S Berkovsky Journal of the American Medical Informatics Association 28 (10), 2074-2084, 2021 | 23 | 2021 |
A Longitudinal Analysis of Online Ad-Blocking Blacklists SS Hashmi, M Ikram, MA Kaafar LCN, 1-9, 2019 | 20 | 2019 |
Towards a zero-trust micro-segmentation network security strategy: an evaluation framework N Basta, M Ikram, MA Kaafar, A Walker NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-7, 2022 | 19 | 2022 |
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs) M Ikram, AH Chowdhury, B Zafar, HS Cha, KH Kim, SW Yoo, DK Kim Proceedings of the 2009 International Conference on Wireless Communications …, 2009 | 15 | 2009 |