A comparative analysis of blockchain architecture and its applications: Problems and recommendations TA Syed, A Alzahrani, S Jan, MS Siddiqui, A Nadeem, T Alghamdi IEEE access 7, 176838-176869, 2019 | 218 | 2019 |
Deep neural architectures for large scale android malware analysis M Nauman, TA Tanveer, S Khan, TA Syed Cluster Computing 21, 569-588, 2018 | 45 | 2018 |
A blockchain-based value added tax (VAT) system: Saudi Arabia as a use-case A Alkhodre, S Jan, S Khusro, T Ali, Y Alsaawy, M Yasar Int. J. Adv. Comput. Sci. Appl 10 (9), 708-716, 2019 | 44 | 2019 |
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure J Ali, T Ali, S Musa, A Zahrani International Journal of Advanced Computer Science and Applications(ijacsa …, 0 | 43* | |
Blockchain-based smart-IoT trust zone measurement architecture J Ali, T Ali, Y Alsaawy, AS Khalid, S Musa Proceedings of the International Conference on Omni-Layer Intelligent …, 2019 | 40 | 2019 |
An extended access control model for permissioned blockchain frameworks MY Khan, MF Zuhairi, T Ali, T Alghamdi, JA Marmolejo-Saucedo Wireless Networks 26, 4943-4954, 2020 | 29 | 2020 |
A transparent and trusted property registration system on permissioned blockchain T Ali, A Nadeem, A Alzahrani, S Jan 2019 International Conference on Advances in the Emerging Computing …, 2020 | 25 | 2020 |
Trust in IoT: dynamic remote attestation through efficient behavior capture SJ Toqeer Ali, Mohammad Nauman Cluster Computing, 1-13, 2017 | 24* | 2017 |
A novel blockchain-based framework for vehicle life cycle tracking: An end-to-end solution TA Syed, MS Siddique, A Nadeem, A Alzahrani, S Jan, MAK Khattak IEEE Access 8, 111042-111063, 2020 | 22 | 2020 |
Design and implementation of an efficient framework for behaviour attestation using n-call slides R Ismail, TA Syed, S Musa Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 18 | 2014 |
Secure healthcare record sharing mechanism with blockchain GQ Butt, TA Sayed, R Riaz, SS Rizvi, A Paul Applied Sciences 12 (5), 2307, 2022 | 16 | 2022 |
DeepMoney: counterfeit money detection using generative adversarial networks T Ali, S Jan, A Alkhodre, M Nauman, M Amin, MS Siddiqui PeerJ Computer Science 5, e216, 2019 | 15 | 2019 |
On leveraging stochastic models for remote attestation T Ali, M Nauman, X Zhang International conference on trusted systems, 290-301, 2010 | 15 | 2010 |
An ensemble learning based classification approach for the prediction of household solid waste generation A Namoun, BR Hussein, A Tufail, A Alrehaili, TA Syed, O BenRhouma Sensors 22 (9), 3506, 2022 | 12 | 2022 |
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah Expert Systems 38 (4), e12611, 2021 | 12 | 2021 |
BlockTrack-L: A lightweight blockchain-based provenance message tracking in IoT MS Siddiqui, TA Syed, A Nadeem, W Nawaz, SS Albouq International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 12 | 2020 |
Employing Takaful islamic banking through state of the art blockchain: a case study M Abdeen, J Salman, S Khan, T Ali International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 12 | 2019 |
Android application behavioral analysis through intent monitoring MW Afridi, T Ali, T Alghamdi, T Ali, M Yasar 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-8, 2018 | 11 | 2018 |
Towards secure instance migration in the cloud TA Syed, S Musa, A Rahman, S Jan 2015 International Conference on Cloud Computing (ICCC), 1-6, 2015 | 11 | 2015 |
A Scalable and Privacy Preserving Remote Attestation Mechanism T Ali, M Alam, M Nauman, TA Syed, M Ali, S Anwar International journal on information 14 (6), 1205-1218, 2011 | 10 | 2011 |