A role-based access control policy verification framework for real-time systems B Shafiq, A Masood, J Joshi, A Ghafoor 10th IEEE international workshop on object-oriented real-time dependable …, 2005 | 76 | 2005 |
Conformance testing of temporal role-based access control systems M Masood, A Ghafoor, A Mathur IEEE Transactions on Dependable and Secure Computing 7 (2), 144-158, 2010 | 51 | 2010 |
Scalable and effective test generation for role-based access control systems A Masood, R Bhatti, A Ghafoor, AP Mathur IEEE Transactions on Software Engineering 35 (5), 654-668, 2009 | 48 | 2009 |
Which open-source ids? Snort, suricata or zeek A Waleed, AF Jamali, A Masood Computer Networks 213, 109116, 2022 | 31 | 2022 |
Role of user and entity behavior analytics in detecting insider attacks S Khaliq, ZUA Tariq, A Masood 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-6, 2020 | 17 | 2020 |
Deep learning approach for fixed and rotary-wing target detection and classification in radars SMD Rizvi, S Ahmad, K Khan, A Hasan, A Masood IEEE Aerospace and Electronic Systems Magazine 37 (3), 32-42, 2022 | 16 | 2022 |
Design and analysis of multi efficiency motors based high endurance multi rotor with central thrust SHA Kazmi, A Masood, K Nisar 2021 IEEE 15th International Conference on Application of Information and …, 2021 | 15 | 2021 |
Enterprise mobile device management requirements and features H Batool, A Masood IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 13 | 2020 |
Synchronization attacks against 802.11 G Khanna, A Masood, CN Rotaru Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005 | 13 | 2005 |
Composability verification of multi-service workflows in a policy-driven cloud computing environment B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017 | 10 | 2017 |
Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment SG Basit Shafiq, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor IEEE 14 (5), 2017 | 10* | 2017 |
Model-based testing of access control systems that employ RBAC policies A Masood, R Bhatti, A Ghafoor, A Mathur Technical Report SERC-TR-277, 2005 | 10 | 2005 |
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization M Chaudhary, A Masood Neural Computing and Applications 35 (15), 11373-11388, 2023 | 9 | 2023 |
Policy-based verification of distributed workflows in a multi-domain environment B Shafiq, A Masood, A Ghafoor technical report, https://www. cerias. purdue. edu/tools_and_resources …, 2006 | 8 | 2006 |
Efficiently managing security concerns in component based system design A Masood, S Sedigh-Ali, A Ghafoor 29th Annual International Computer Software and Applications Conference …, 2005 | 8 | 2005 |
Open source SIEM solutions for an enterprise A Tariq, J Manzoor, MA Aziz, ZUA Tariq, A Masood Information & Computer Security 31 (1), 88-107, 2022 | 7 | 2022 |
Vulnerability analysis of qualcomm secure execution environment (QSEE) F Khalid, A Masood Computers & Security 116, 102628, 2022 | 5 | 2022 |
Effective model for real time end to end secure communication over gsm voice channel MU Rehman, M Adnan, M Batool, LA Khan, A Masood Wireless Personal Communications 119, 1643-1659, 2021 | 4 | 2021 |
A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks A Masood, A Masood 2021 International Bhurban Conference on Applied Sciences and Technologies …, 2021 | 4 | 2021 |
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis F Khalid, A Masood 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-8, 2020 | 4 | 2020 |