Ahmad, Tahir

Ahmad, Tahir  

Security & Trust  

Mostra records
Risultati 1 - 17 di 17 (tempo di esecuzione: 0.027 secondi).
Titolo Data di pubblicazione Autore(i) File
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 1-gen-2018 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware 1-gen-2023 Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah
A Survey on Citizens Broadband Radio Service (CBRS) 1-gen-2022 Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh
An Insight into the Machine-Learning-Based Fileless Malware Detection 1-gen-2023 Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs) 1-gen-2022 Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M.
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 1-gen-2020 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness 1-gen-2022 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol 1-gen-2023 Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 1-gen-2021 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks 1-gen-2023 Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance 1-gen-2022 Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks 1-gen-2023 Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization 1-gen-2023 Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 1-gen-2019 Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir
Prevention of Cryptojacking Attacks in Business and FinTech Applications 1-gen-2023 Ullah, Subhan; Ahmad, Tahir; Ahmad, Rizwan; Aslam, Mudassar
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications 1-gen-2022 Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah; Zara, Nudrat; Saha, Sudipan
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 1-gen-2018 Ahmad, Tahir; Ranise, Silvio