Data protection and privacy of the internet of healthcare things (IoHTs) J Shahid, R Ahmad, AK Kiani, T Ahmad, S Saeed, AM Almuhaideb Applied Sciences 12 (4), 1927, 2022 | 105 | 2022 |
Federated transfer learning: concept and applications S Saha, T Ahmad Intelligenza Artificiale 15 (1), 35-44, 2021 | 95 | 2021 |
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers A Palmieri, P Prem, S Ranise, U Morelli, T Ahmad 2019 IEEE World Congress on Services (SERVICES) 2642, 47-53, 2019 | 41 | 2019 |
Monitoring Internet censorship with UBICA G Aceto, A Botta, A Pescapè, N Feamster, M Faheem Awan, T Ahmad, ... Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015 …, 2015 | 34 | 2015 |
A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study T Ahmad, U Morelli, S Ranise, N Zannone Proceedings of the 23nd ACM on symposium on access control models and …, 2018 | 24 | 2018 |
An insight into the machine-learning-based fileless malware detection O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad, M Aslam, A Buriro, ... Sensors 23 (2), 612, 2023 | 20 | 2023 |
TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications S Ullah, T Ahmad, A Buriro, N Zara, S Saha Applied Sciences 12 (21), 10755, 2022 | 18 | 2022 |
Analyzing internet censorship in pakistan G Aceto, A Botta, A Pescapé, MF Awan, T Ahmad, S Qaisar 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 18 | 2016 |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system T Ahmad, U Morelli, S Ranise, N Zannone International Journal of Information Security 21 (2), 379-408, 2022 | 15 | 2022 |
Food items detection and recognition via multiple deep models S Khan, K Ahmad, T Ahmad, N Ahmad Journal of Electronic Imaging 28 (1), 013020-013020, 2019 | 14 | 2019 |
Measuring broadband access network performance in Pakistan: A comparative study MF Awan, T Ahmad, S Qaisar, N Feamster, S Sundaresan 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015 | 13 | 2015 |
Machine learning-based dynamic attribute selection technique for ddos attack classification in iot networks S Ullah, Z Mahmood, N Ali, T Ahmad, A Buriro Computers 12 (6), 115, 2023 | 12 | 2023 |
Getting smarter about smart cities: Improving data security and privacy through compliance M Aslam, MA Khan Abbasi, T Khalid, RU Shan, S Ullah, T Ahmad, ... Sensors 22 (23), 9338, 2022 | 12 | 2022 |
Performance evaluation of mobile broadband cellular networks in Pakistan T Arshad, MF Awan, T Ahmad, S Qaisar 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN …, 2016 | 12 | 2016 |
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization A Buriro, AB Buriro, T Ahmad, S Buriro, S Ullah Applied Sciences 13 (4), 2508, 2023 | 11 | 2023 |
A real-time hybrid approach to combat in-browser cryptojacking malware MH Khan Abbasi, S Ullah, T Ahmad, A Buriro Applied Sciences 13 (4), 2039, 2023 | 11 | 2023 |
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs T Ahmad, U Younis Journal of Network and Computer Applications 41, 197-205, 2014 | 8 | 2014 |
Prevention of cryptojacking attacks in business and FinTech applications S Ullah, T Ahmad, R Ahmad, M Aslam Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023 | 7 | 2023 |
Validating requirements of access control for cloud-edge IoT solutions (short paper) T Ahmad, S Ranise Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019 | 7 | 2019 |
Performance analysis of non-cryptographic hash functions for real-time storage and lookup of urls T Ahmad, U Younis Proceedings of the 2013 11th International Conference on Frontiers of …, 2013 | 5 | 2013 |