Ahmad, Tahir
Ahmad, Tahir
Security & Trust
A Lazy Approach to Access Control as a Service (ACaaS) for IoT
2018-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
2023-01-01 Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah
A Survey on Citizens Broadband Radio Service (CBRS)
2022-01-01 Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh
An Insight into the Machine-Learning-Based Fileless Malware Detection
2023-01-01 Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
2022-01-01 Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M.
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem
2020-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
2022-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
2023-01-01 Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
2021-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
2023-01-01 Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
2022-01-01 Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks
2023-01-01 Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
2023-01-01 Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers
2019-01-01 Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
2022-01-01 Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah; Zara, Nudrat; Saha, Sudipan
Validating Requirements of Access Control for Cloud-Edge IoT Solutions
2018-01-01 Ahmad, Tahir; Ranise, Silvio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A Lazy Approach to Access Control as a Service (ACaaS) for IoT | 1-gen-2018 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware | 1-gen-2023 | Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah | |
A Survey on Citizens Broadband Radio Service (CBRS) | 1-gen-2022 | Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh | |
An Insight into the Machine-Learning-Based Fileless Malware Detection | 1-gen-2023 | Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan | |
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs) | 1-gen-2022 | Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M. | |
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem | 1-gen-2020 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness | 1-gen-2022 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol | 1-gen-2023 | Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah | |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system | 1-gen-2021 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks | 1-gen-2023 | Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah | |
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance | 1-gen-2022 | Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan | |
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks | 1-gen-2023 | Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah | |
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization | 1-gen-2023 | Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan | |
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers | 1-gen-2019 | Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir | |
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications | 1-gen-2022 | Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah; Zara, Nudrat; Saha, Sudipan | |
Validating Requirements of Access Control for Cloud-Edge IoT Solutions | 1-gen-2018 | Ahmad, Tahir; Ranise, Silvio |