关注
Tahir Ahmad
标题
引用次数
引用次数
年份
Data protection and privacy of the internet of healthcare things (IoHTs)
J Shahid, R Ahmad, AK Kiani, T Ahmad, S Saeed, AM Almuhaideb
Applied Sciences 12 (4), 1927, 2022
1052022
Federated transfer learning: concept and applications
S Saha, T Ahmad
Intelligenza Artificiale 15 (1), 35-44, 2021
952021
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers
A Palmieri, P Prem, S Ranise, U Morelli, T Ahmad
2019 IEEE World Congress on Services (SERVICES) 2642, 47-53, 2019
412019
Monitoring Internet censorship with UBICA
G Aceto, A Botta, A Pescapè, N Feamster, M Faheem Awan, T Ahmad, ...
Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015 …, 2015
342015
A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study
T Ahmad, U Morelli, S Ranise, N Zannone
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
242018
An insight into the machine-learning-based fileless malware detection
O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad, M Aslam, A Buriro, ...
Sensors 23 (2), 612, 2023
202023
TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications
S Ullah, T Ahmad, A Buriro, N Zara, S Saha
Applied Sciences 12 (21), 10755, 2022
182022
Analyzing internet censorship in pakistan
G Aceto, A Botta, A Pescapé, MF Awan, T Ahmad, S Qaisar
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
182016
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
T Ahmad, U Morelli, S Ranise, N Zannone
International Journal of Information Security 21 (2), 379-408, 2022
152022
Food items detection and recognition via multiple deep models
S Khan, K Ahmad, T Ahmad, N Ahmad
Journal of Electronic Imaging 28 (1), 013020-013020, 2019
142019
Measuring broadband access network performance in Pakistan: A comparative study
MF Awan, T Ahmad, S Qaisar, N Feamster, S Sundaresan
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
132015
Machine learning-based dynamic attribute selection technique for ddos attack classification in iot networks
S Ullah, Z Mahmood, N Ali, T Ahmad, A Buriro
Computers 12 (6), 115, 2023
122023
Getting smarter about smart cities: Improving data security and privacy through compliance
M Aslam, MA Khan Abbasi, T Khalid, RU Shan, S Ullah, T Ahmad, ...
Sensors 22 (23), 9338, 2022
122022
Performance evaluation of mobile broadband cellular networks in Pakistan
T Arshad, MF Awan, T Ahmad, S Qaisar
2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN …, 2016
122016
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
A Buriro, AB Buriro, T Ahmad, S Buriro, S Ullah
Applied Sciences 13 (4), 2508, 2023
112023
A real-time hybrid approach to combat in-browser cryptojacking malware
MH Khan Abbasi, S Ullah, T Ahmad, A Buriro
Applied Sciences 13 (4), 2039, 2023
112023
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
T Ahmad, U Younis
Journal of Network and Computer Applications 41, 197-205, 2014
82014
Prevention of cryptojacking attacks in business and FinTech applications
S Ullah, T Ahmad, R Ahmad, M Aslam
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
72023
Validating requirements of access control for cloud-edge IoT solutions (short paper)
T Ahmad, S Ranise
Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019
72019
Performance analysis of non-cryptographic hash functions for real-time storage and lookup of urls
T Ahmad, U Younis
Proceedings of the 2013 11th International Conference on Frontiers of …, 2013
52013
系统目前无法执行此操作,请稍后再试。
文章 1–20