Ahmad, Tahir
Ahmad, Tahir
Security & Trust
A Lazy Approach to Access Control as a Service (ACaaS) for IoT
2018-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
2023-01-01 Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah
A Survey on Citizens Broadband Radio Service (CBRS)
2022-01-01 Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh
An Insight into the Machine-Learning-Based Fileless Malware Detection
2023-01-01 Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan
Analyzing Internet Censorship in Pakistan
2016-01-01 Giuseppe, Aceto; Botta, Alessio; Pescapè, Antonio; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad
Behavioral Analysis of Backdoor Malware Exploiting Heap Overflow Vulnerabilities Using Data Mining and Machine Learning
2023-01-01 Khaliq, Ali Raza; Ullah, Subhan; Ahmad, Tahir; Yadav, Ashish; Majid, M Imran
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
2022-01-01 Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M.
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem
2020-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
2022-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
2023-01-01 Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
2021-01-01 Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
Federated transfer learning: Concept and applications
2021-01-01 Saha, Sudipan; Ahmad, Tahir
Food items detection and recognition via multiple deep models
2019-01-01 Khan, Sheema; Ahmad, Kashif; Ahmad, Tahir; Ahmad, Nasir
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks
2023-01-01 Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
2022-01-01 Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks
2023-01-01 Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
2023-01-01 Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan
Measuring Broadband Access Network Performance in Pakistan: A Comparative Study
2015-01-01 Faheem Awan, Muhammad; Ahmad, Tahir; Qaiser, Saad; Feamster, Nick; Sundaresan, Srikanth
Monitoring Internet Censorship with UBICA
2015-01-01 Aceto, Giuseppe; Botta, Alessio; Pescapè, Antonio; Feamster, Nick; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers
2019-01-01 Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A Lazy Approach to Access Control as a Service (ACaaS) for IoT | 1-gen-2018 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware | 1-gen-2023 | Haris Khan Abbasi, Muhammad; Ullah, Subhan; Ahmad, Tahir; Buriro, Attaullah | |
A Survey on Citizens Broadband Radio Service (CBRS) | 1-gen-2022 | Agarwal, Pranay; Manekiya, Mohammedhusen; Ahmad, Tahir; Yadav, Ashish; Kumar, Abhinav; Donelli, Massimo; Tarun Mishra, Saurabh | |
An Insight into the Machine-Learning-Based Fileless Malware Detection | 1-gen-2023 | Khalid, Osama; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Aslam, Mudassar; Buriro, Attaullah; Ahmad, Rizwan | |
Analyzing Internet Censorship in Pakistan | 1-gen-2016 | Giuseppe, Aceto; Botta, Alessio; Pescapè, Antonio; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad | |
Behavioral Analysis of Backdoor Malware Exploiting Heap Overflow Vulnerabilities Using Data Mining and Machine Learning | 1-gen-2023 | Khaliq, Ali Raza; Ullah, Subhan; Ahmad, Tahir; Yadav, Ashish; Majid, M Imran | |
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs) | 1-gen-2022 | Shahid, Jahanzeb; Ahmad, Rizwan; Kiani, Adnan K.; Ahmad, Tahir; Saeed, Saqib; Almuhaideb, Abdullah M. | |
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem | 1-gen-2020 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness | 1-gen-2022 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio | |
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol | 1-gen-2023 | Ayaz Khan, Muhammad; Ullah, Subhan; Ahmad, Tahir; Jawad, Khwaja; Buriro, Attaullah | |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system | 1-gen-2021 | Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola | |
Federated transfer learning: Concept and applications | 1-gen-2021 | Saha, Sudipan; Ahmad, Tahir | |
Food items detection and recognition via multiple deep models | 1-gen-2019 | Khan, Sheema; Ahmad, Kashif; Ahmad, Tahir; Ahmad, Nasir | |
Fortifying Smart Home Security: A Robust and Efficient User-Authentication Scheme to Counter Node Capture Attacks | 1-gen-2023 | Asghar, Iqra; Ayaz Khan, Muhammad; Ahmad, Tahir; Ullah, Subhan; Mansoor ul Hassan, Khwaja; Buriro, Attaullah | |
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance | 1-gen-2022 | Aslam, Mudassar; Abbas Khan Abbasi, Muhammad; Khalid, Tauqeer; us Shan, Rafi; Ullah, Subhan; Ahmad, Tahir; Saeed, Saqib; Alabbad, Dina A.; Ahmad, Rizwan | |
Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks | 1-gen-2023 | Ullah, Subhan; Mahmood, Zahid; Ali, Nabeel; Ahmad, Tahir; Buriro, Attaullah | |
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization | 1-gen-2023 | Buriro, Attaullah; Baseer Buriro, Abdul; Ahmad, Tahir; Buriro, Saifullah; Ullah, Subhan | |
Measuring Broadband Access Network Performance in Pakistan: A Comparative Study | 1-gen-2015 | Faheem Awan, Muhammad; Ahmad, Tahir; Qaiser, Saad; Feamster, Nick; Sundaresan, Srikanth | |
Monitoring Internet Censorship with UBICA | 1-gen-2015 | Aceto, Giuseppe; Botta, Alessio; Pescapè, Antonio; Feamster, Nick; Faheem Awan, M.; Ahmad, Tahir; Qaisar, Saad | |
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers | 1-gen-2019 | Palmieri, Andrea; Prem, Paolo; Ranise, Silvio; Morelli, Umberto; Ahmad, Tahir |