The gem5 simulator: Version 20.0+ J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ... arXiv preprint arXiv:2007.03152, 2020 | 269 | 2020 |
A Survey of Computer Architecture Simulation Techniques and Tools A Akram, L Sawalha IEEE Access, 2019 | 110 | 2019 |
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 97 | 2018 |
WHISPER A Tool for Run-time Detection of Side-Channel Attacks M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit IEEE Access, 2020 | 72 | 2020 |
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat 2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018 | 49 | 2018 |
× 86 computer architecture simulators: A comparative study A Akram, L Sawalha 2016 IEEE 34th International Conference on Computer Design (ICCD), 638-645, 2016 | 37 | 2016 |
Machine learning for security: The case of side-channel attack detection at run-time M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ... 2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018 | 33 | 2018 |
A comparison of x86 computer architecture simulators A Akram, L Sawalha | 31 | 2016 |
Performance analysis of scientific computing workloads on general purpose TEEs A Akram, A Giannakou, V Akella, J Lowe-Power, S Peisert 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS …, 2021 | 26 | 2021 |
Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat IEEE Access 8, 70836-70860, 2020 | 24 | 2020 |
Molecular Epidemiology and Prevalence of Theileria lestoquardi and Theileria ovis Infection in Goats Infested With Tick Vectors From Multan, Pakistan M Riaz, MM Nazir, Z Tasawar, AN Ahmed, MM Ayaz, Q Akram, ... Journal of medical entomology 56 (3), 844-848, 2019 | 18 | 2019 |
Validation of the gem5 Simulator for x86 Architectures A Akram, L Sawalha 2019 IEEE/ACM Performance Modeling, Benchmarking and Simulation of High …, 2019 | 15 | 2019 |
Enabling reproducible and agile full-system simulation BR Bruce, A Akam, H Nguyen, K Roarty, M Samani, M Fariborz, T Reddy, ... 2021 IEEE International Symposium on Performance Analysis of Systems and …, 2021 | 14 | 2021 |
Comparison of edge detectors A Akram, A Ismail Int. J. Comp. Sci. Information Technol. Res 1, 16-24, 2013 | 14 | 2013 |
Android Based ECG Monitoring System A Akram, R Javed, A Ahmad International Journal of Science and Research (IJSR), 2013 | 13 | 2013 |
The gem5 simulator: Version 20.0+. CoRR abs/2007.03152 (2020) J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ... arXiv preprint arXiv:2007.03152, 2020 | 12 | 2020 |
Cache-based side-channel intrusion detection using hardware performance counters M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018 | 12 | 2018 |
Performance analysis of scientific computing workloads on trusted execution environments A Akram, A Giannakou, V Akella, J Lowe-Power, S Peisert arXiv preprint arXiv:2010.13216, 2020 | 11 | 2020 |
Enabling design space exploration for risc-v secure compute environments A Akram, V Akella, S Peisert, J Lowe-Power | 9 | 2023 |
A Study of Performance and Power Consumption Differences Among Different ISAs A Akram, L Sawalha IEEE 21st Euromicro Conference on Digital System Design (DSD), 2019 | 9 | 2019 |