Sfoglia per Autore Ahmad, Tahir
Performance Analysis of Non-cryptographic Hash Functions for Real-Time Storage and Lookup of URLs.
2013-01-01 Ahmad, Tahir; Younis, Usman
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
2014-01-01 Ahmad, Tahir; Younis, Usman
Monitoring Internet Censorship with UBICA
2015-01-01 Aceto, Giuseppe; Botta, Alessio; Pescapè, Antonio; Feamster, Nick; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad
Measuring Broadband Access Network Performance in Pakistan: A Comparative Study
2015-01-01 Faheem Awan, Muhammad; Ahmad, Tahir; Qaiser, Saad; Feamster, Nick; Sundaresan, Srikanth
Performance Evaluation of Mobile Broadband Cellular Networks in Pakistan
2016-01-01 Arshad, Tayyab; Faheem Awan, Muhammad; Ahmad, Tahir; Qaisar, Saad
Analyzing Internet Censorship in Pakistan
2016-01-01 Giuseppe, Aceto; Botta, Alessio; Pescapè, Antonio; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad
Validating Requirements of Access Control for Cloud-Edge IoT Solutions
2018-01-01 Ahmad, Tahir; Ranise, Silvio
A Lazy Approach to Access Control as a Service (ACaaS) for IoT
2018-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers
2019-01-01 Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir
Food items detection and recognition via multiple deep models
2019-01-01 Khan, Sheema; Ahmad, Kashif; Ahmad, Tahir; Ahmad, Nasir
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem
2020-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
2021-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
Federated transfer learning: Concept and applications
2021-01-01 Saha, Sudipan; Ahmad, Tahir
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
2022-01-01 Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan
A Survey on Citizens Broadband Radio Service (CBRS)
2022-01-01 Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
2022-01-01 Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M.
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
2022-01-01 Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah; Zara, Nudrat; Saha, Sudipan
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
2022-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
2023-01-01 Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
2023-01-01 Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Performance Analysis of Non-cryptographic Hash Functions for Real-Time Storage and Lookup of URLs. | 1-gen-2013 | Ahmad, Tahir; Younis, Usman | |
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs | 1-gen-2014 | Ahmad, Tahir; Younis, Usman | |
Monitoring Internet Censorship with UBICA | 1-gen-2015 | Aceto, Giuseppe; Botta, Alessio; Pescapè, Antonio; Feamster, Nick; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad | |
Measuring Broadband Access Network Performance in Pakistan: A Comparative Study | 1-gen-2015 | Faheem Awan, Muhammad; Ahmad, Tahir; Qaiser, Saad; Feamster, Nick; Sundaresan, Srikanth | |
Performance Evaluation of Mobile Broadband Cellular Networks in Pakistan | 1-gen-2016 | Arshad, Tayyab; Faheem Awan, Muhammad; Ahmad, Tahir; Qaisar, Saad | |
Analyzing Internet Censorship in Pakistan | 1-gen-2016 | Giuseppe, Aceto; Botta, Alessio; Pescapè, Antonio; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad | |
Validating Requirements of Access Control for Cloud-Edge IoT Solutions | 1-gen-2018 | Ahmad, Tahir; Ranise, Silvio | |
A Lazy Approach to Access Control as a Service (ACaaS) for IoT | 1-gen-2018 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers | 1-gen-2019 | Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir | |
Food items detection and recognition via multiple deep models | 1-gen-2019 | Khan, Sheema; Ahmad, Kashif; Ahmad, Tahir; Ahmad, Nasir | |
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem | 1-gen-2020 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system | 1-gen-2021 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
Federated transfer learning: Concept and applications | 1-gen-2021 | Saha, Sudipan; Ahmad, Tahir | |
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance | 1-gen-2022 | Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan | |
A Survey on Citizens Broadband Radio Service (CBRS) | 1-gen-2022 | Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh | |
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs) | 1-gen-2022 | Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M. | |
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications | 1-gen-2022 | Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah; Zara, Nudrat; Saha, Sudipan | |
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness | 1-gen-2022 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization | 1-gen-2023 | Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan | |
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware | 1-gen-2023 | Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile