Seguir
Tahir Ahmad
Título
Citado por
Citado por
Año
Data protection and privacy of the internet of healthcare things (IoHTs)
J Shahid, R Ahmad, AK Kiani, T Ahmad, S Saeed, AM Almuhaideb
Applied Sciences 12 (4), 1927, 2022
872022
Federated transfer learning: concept and applications
S Saha, T Ahmad
Intelligenza Artificiale 15 (1), 35-44, 2021
762021
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers
A Palmieri, P Prem, S Ranise, U Morelli, T Ahmad
2019 IEEE World Congress on Services (SERVICES) 2642, 47-53, 2019
362019
Monitoring Internet censorship with UBICA
G Aceto, A Botta, A Pescapè, N Feamster, M Faheem Awan, T Ahmad, ...
Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015 …, 2015
332015
A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study
T Ahmad, U Morelli, S Ranise, N Zannone
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
222018
Analyzing internet censorship in pakistan
G Aceto, A Botta, A Pescapé, MF Awan, T Ahmad, S Qaisar
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
172016
An insight into the machine-learning-based fileless malware detection
O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad, M Aslam, A Buriro, ...
Sensors 23 (2), 612, 2023
152023
TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications
S Ullah, T Ahmad, A Buriro, N Zara, S Saha
Applied Sciences 12 (21), 10755, 2022
152022
Food items detection and recognition via multiple deep models
S Khan, K Ahmad, T Ahmad, N Ahmad
Journal of Electronic Imaging 28 (1), 013020-013020, 2019
142019
Measuring broadband access network performance in Pakistan: A comparative study
MF Awan, T Ahmad, S Qaisar, N Feamster, S Sundaresan
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
132015
Performance evaluation of mobile broadband cellular networks in Pakistan
T Arshad, MF Awan, T Ahmad, S Qaisar
2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN …, 2016
122016
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
T Ahmad, U Morelli, S Ranise, N Zannone
International Journal of Information Security 21 (2), 379-408, 2022
92022
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
A Buriro, AB Buriro, T Ahmad, S Buriro, S Ullah
Applied Sciences 13 (4), 2508, 2023
82023
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
T Ahmad, U Younis
Journal of Network and Computer Applications 41, 197-205, 2014
82014
Machine learning-based dynamic attribute selection technique for ddos attack classification in iot networks
S Ullah, Z Mahmood, N Ali, T Ahmad, A Buriro
Computers 12 (6), 115, 2023
72023
A real-time hybrid approach to combat in-browser cryptojacking malware
MH Khan Abbasi, S Ullah, T Ahmad, A Buriro
Applied Sciences 13 (4), 2039, 2023
62023
Getting smarter about smart cities: Improving data security and privacy through compliance
M Aslam, MA Khan Abbasi, T Khalid, RU Shan, S Ullah, T Ahmad, ...
Sensors 22 (23), 9338, 2022
52022
Performance analysis of non-cryptographic hash functions for real-time storage and lookup of urls
T Ahmad, U Younis
Proceedings of the 2013 11th International Conference on Frontiers of …, 2013
52013
Prevention of Cryptojacking Attacks in Business and FinTech Applications
S Ullah, T Ahmad, R Ahmad, M Aslam
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
42023
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem
T Ahmad, U Morelli, S Ranise
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
42020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20