关注
Ammar Masood
Ammar Masood
在 mail.au.edu.pk 的电子邮件经过验证
标题
引用次数
引用次数
年份
A role-based access control policy verification framework for real-time systems
B Shafiq, A Masood, J Joshi, A Ghafoor
10th IEEE international workshop on object-oriented real-time dependable …, 2005
752005
Conformance testing of temporal role-based access control systems
M Masood, A Ghafoor, A Mathur
IEEE Transactions on Dependable and Secure Computing 7 (2), 144-158, 2010
522010
Scalable and effective test generation for role-based access control systems
A Masood, R Bhatti, A Ghafoor, AP Mathur
IEEE Transactions on Software Engineering 35 (5), 654-668, 2009
502009
Which open-source ids? snort, suricata or zeek
A Waleed, AF Jamali, A Masood
Computer Networks 213, 109116, 2022
182022
Scalable and effective test generation for access control systems that employ RBAC policies
A Masood, A Ghafoor, A Mathur
Purdue University, 2006
152006
Synchronization attacks against 802.11
G Khanna, A Masood, CN Rotaru
Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005
132005
Deep learning approach for fixed and rotary-wing target detection and classification in radars
SMD Rizvi, S Ahmad, K Khan, A Hasan, A Masood
IEEE Aerospace and Electronic Systems Magazine 37 (3), 32-42, 2022
112022
Role of user and entity behavior analytics in detecting insider attacks
S Khaliq, ZUA Tariq, A Masood
2020 International Conference on Cyber Warfare and Security (ICCWS), 1-6, 2020
112020
Prevalence of gingivitis in patients visiting Islamic International Dental Hospital
S Ali, N Nasir, A Masood, U Bashir
Ann Pak Inst Med Sci 8 (2), 150-2, 2012
112012
Enterprise mobile device management requirements and features
H Batool, A Masood
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
102020
Composability verification of multi-service workflows in a policy-driven cloud computing environment
B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor
IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017
102017
Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment
SG Basit Shafiq, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor
IEEE 14 (5), 2017
10*2017
Model-based testing of access control systems that employ RBAC policies
A Masood, R Bhatti, A Ghafoor, A Mathur
Technical Report SERC-TR-277, 2005
102005
Design and analysis of multi efficiency motors based high endurance multi rotor with central thrust
SHA Kazmi, A Masood, K Nisar
2021 IEEE 15th International Conference on Application of Information and …, 2021
92021
Policy-based verification of distributed workflows in a multi-domain environment
B Shafiq, A Masood, A Ghafoor
technical report, https://www. cerias. purdue. edu/tools_and_resources …, 2006
82006
Efficiently managing security concerns in component based system design
A Masood, S Sedigh-Ali, A Ghafoor
29th Annual International Computer Software and Applications Conference …, 2005
82005
Chediak-Higashi Syndrome-A Case Report
A Masood, M Nadeem, S Aman, AH Kazmi
ANNALS OF KING EDWARD MEDICAL UNIVERSITY LAHORE PAKISTAN 14 (3), 119-122, 2008
72008
Towards a theory of Islamic financial reporting
A Masood, I Tahir
Griffith University, Nathan, 1-39, 2008
62008
Scalable and effective test generation for access control systems
A Masood
Purdue University, 2006
52006
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization
M Chaudhary, A Masood
Neural Computing and Applications 35 (15), 11373-11388, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20