Tamleek Ali Tanveer
Tamleek Ali Tanveer
Security Engineering Research Group, Institute of Management Sciences, Peshawar
Dirección de correo verificada de - Página principal
Citado por
Citado por
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
Static malware detection and attribution in android byte-code through an end-to-end deep system
M Amin, TA Tanveer, M Tehseen, M Khan, FA Khan, S Anwar
Future generation computer systems 102, 112-126, 2020
The esc-eorp euro-endo (european infective endocarditis) registry
G Habib, P Lancellotti, PA Erba, A Sadeghpour, M Meshaal, A Sambola, ...
European Heart Journal-Quality of Care and Clinical Outcomes 5 (3), 202-207, 2019
Energy-efficient harvested-aware clustering and cooperative routing protocol for WBAN (E-HARP)
Z Ullah, I Ahmed, FA Khan, M Asif, M Nawaz, T Ali, M Khalid, F Niaz
IEEE Access 7, 100036-100050, 2019
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks
Z Ullah, I Ahmed, T Ali, N Ahmad, F Niaz, Y Cao
IEEE Access 7, 33906-33921, 2019
An Android runtime security policy enforcement framework
H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ...
Personal and Ubiquitous Computing 16, 631-641, 2012
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52, 2149-2161, 2013
Android malware detection through generative adversarial networks
M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar
Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022
Remote attestation of attribute updates and information flows in a ucon system
M Nauman, M Alam, X Zhang, T Ali
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
A deep learning system for health care IoT and smartphone malware detection
M Amin, D Shehwar, A Ullah, T Guarda, TA Tanveer, S Anwar
Neural Computing and Applications, 1-12, 2020
Bio-synthesized silver nanoparticles using different plant extracts as anti-cancer agent
Y Khan, M Numan, M Ali, AT Khali, T Ali, N Abbas, ZK Shinwari
Journal of Nanomedine Biotherapeutic Discovery 7 (154), 2, 2017
Behavioral attestation for business processes
M Alam, M Nauman, X Zhang, T Ali, PCK Hung
2009 IEEE International Conference on Web Services, 343-350, 2009
On leveraging stochastic models for remote attestation
T Ali, M Nauman, X Zhang
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
On usage control of multimedia content in and through cloud computing paradigm
T Ali, M Nauman, F Hadi, F bin Muhaya
2010 5th International Conference on Future Information Technology, 1-5, 2010
Multicentre observational study of adherence to Sepsis Six guidelines in emergency general surgery
Journal of British Surgery 104 (2), e165-e171, 2017
Android application behavioral analysis through intent monitoring
MW Afridi, T Ali, T Alghamdi, T Ali, M Yasar
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-8, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20