A role-based access control policy verification framework for real-time systems B Shafiq, A Masood, J Joshi, A Ghafoor 10th IEEE international workshop on object-oriented real-time dependable …, 2005 | 75 | 2005 |
Conformance testing of temporal role-based access control systems M Masood, A Ghafoor, A Mathur IEEE Transactions on Dependable and Secure Computing 7 (2), 144-158, 2010 | 52 | 2010 |
Scalable and effective test generation for role-based access control systems A Masood, R Bhatti, A Ghafoor, AP Mathur IEEE Transactions on Software Engineering 35 (5), 654-668, 2009 | 50 | 2009 |
Which open-source ids? snort, suricata or zeek A Waleed, AF Jamali, A Masood Computer Networks 213, 109116, 2022 | 18 | 2022 |
Scalable and effective test generation for access control systems that employ RBAC policies A Masood, A Ghafoor, A Mathur Purdue University, 2006 | 15 | 2006 |
Synchronization attacks against 802.11 G Khanna, A Masood, CN Rotaru Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005 | 13 | 2005 |
Deep learning approach for fixed and rotary-wing target detection and classification in radars SMD Rizvi, S Ahmad, K Khan, A Hasan, A Masood IEEE Aerospace and Electronic Systems Magazine 37 (3), 32-42, 2022 | 11 | 2022 |
Role of user and entity behavior analytics in detecting insider attacks S Khaliq, ZUA Tariq, A Masood 2020 International Conference on Cyber Warfare and Security (ICCWS), 1-6, 2020 | 11 | 2020 |
Prevalence of gingivitis in patients visiting Islamic International Dental Hospital S Ali, N Nasir, A Masood, U Bashir Ann Pak Inst Med Sci 8 (2), 150-2, 2012 | 11 | 2012 |
Enterprise mobile device management requirements and features H Batool, A Masood IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 10 | 2020 |
Composability verification of multi-service workflows in a policy-driven cloud computing environment B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017 | 10 | 2017 |
Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment SG Basit Shafiq, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor IEEE 14 (5), 2017 | 10* | 2017 |
Model-based testing of access control systems that employ RBAC policies A Masood, R Bhatti, A Ghafoor, A Mathur Technical Report SERC-TR-277, 2005 | 10 | 2005 |
Design and analysis of multi efficiency motors based high endurance multi rotor with central thrust SHA Kazmi, A Masood, K Nisar 2021 IEEE 15th International Conference on Application of Information and …, 2021 | 9 | 2021 |
Policy-based verification of distributed workflows in a multi-domain environment B Shafiq, A Masood, A Ghafoor technical report, https://www. cerias. purdue. edu/tools_and_resources …, 2006 | 8 | 2006 |
Efficiently managing security concerns in component based system design A Masood, S Sedigh-Ali, A Ghafoor 29th Annual International Computer Software and Applications Conference …, 2005 | 8 | 2005 |
Chediak-Higashi Syndrome-A Case Report A Masood, M Nadeem, S Aman, AH Kazmi ANNALS OF KING EDWARD MEDICAL UNIVERSITY LAHORE PAKISTAN 14 (3), 119-122, 2008 | 7 | 2008 |
Towards a theory of Islamic financial reporting A Masood, I Tahir Griffith University, Nathan, 1-39, 2008 | 6 | 2008 |
Scalable and effective test generation for access control systems A Masood Purdue University, 2006 | 5 | 2006 |
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization M Chaudhary, A Masood Neural Computing and Applications 35 (15), 11373-11388, 2023 | 3 | 2023 |