In-depth review of augmented reality: Tracking technologies, development tools, AR displays, collaborative AR, and security concerns

TA Syed, MS Siddiqui, HB Abdullah, S Jan, A Namoun… - Sensors, 2022 - mdpi.com
Augmented reality (AR) has gained enormous popularity and acceptance in the past few
years. AR is indeed a combination of different immersive experiences and solutions that …

Anomaly-based nids: A review of machine learning methods on malware detection

RZA Mohd, MF Zuhairi, AZA Shadil… - … on Information and …, 2016 - ieeexplore.ieee.org
The increasing amount of network traffic threat may originates from various sources, that can
led to a higher probability for an organization to be exposed to intruder. Security mechanism …

Trust in IoT: dynamic remote attestation through efficient behavior capture

T Ali, M Nauman, S Jan - Cluster Computing, 2018 - Springer
Abstract The Internet of Things (IoT) is a latest concept of machine-to-machine
communication, that also gave birth to several information security problems. Many …

Providing efficient, scalable and privacy preserved verification mechanism in remote attestation

TA Syed, S Jan, S Musa, J Ali - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Numerous applications are running in a distributed environment in today's large networked
world. Corporations really need a mechanism to monitor their own application (s) running on …

Efficient, scalable and privacy preserving application attestation in a multi stakeholder scenario

T Ali, J Ali, T Ali, M Nauman, S Musa - … Conference, Beijing, China, July 4-7 …, 2016 - Springer
Measurement and reporting of dynamic behavior of a target application is a pressing issue
in the Trusted Computing paradigm. Remote attestation is a part of trusted computing, which …

Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective

D Sun, G Chang, C Tan, X Wang… - International Journal of …, 2013 - inderscienceonline.com
High security issue is one of the major obstacles for opening up the new cloud computing
era. Trust, as a soft social security philosophy, can fight against such security threats and …

A complete behavioral measurement and reporting: optimized for mobile devices

T Ali, MFA Zuhairi, J Ali, S Musa, M Nauman - First EAI International …, 2017 - eudl.eu
Security is an important factor in today's IT infrastructure due to complex and vast variety of
malware threats. One way to tackle these malware is via signaturebased techniques …

[PDF][PDF] Anomaly based NIDS: a review of machine learning methods on malware detection

M Raffi, FM Zuhairi, AS Abidin… - … Conference on Information …, 2017 - researchgate.net
An increasing amount of network traffic threats are originating from various sources. These
threats can eventually lead to a higher probability for an organization to be exposed to …

[PDF][PDF] A Complete Behavioral Measurement and Reporting: Optimized for Mobile Devices

Security is an important factor in today's IT infrastructure due to complex and waste variety of
malware threats. One way to tackle these malware is via signature-based techniques …

[引用][C] Scalable and Privacy Preserving Application Attestation for Linux based embedded devices