Secure biometric template generation for multi-factor authentication SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan Pattern Recognition 48 (2), 458-472, 2015 | 119 | 2015 |
Evaluating DoS attacks against SIP-based VoIP systems MZ Rafique, M Ali Akbar, M Farooq Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009 | 55 | 2009 |
Application of evolutionary algorithms in detection of SIP based flooding attacks MA Akbar, M Farooq Proceedings of the 11th Annual conference on Genetic and evolutionary …, 2009 | 48 | 2009 |
A comparative study of anomaly detection algorithms for detection of SIP flooding in IMS MA Akbar, Z Tariq, M Farooq Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008 …, 2008 | 43 | 2008 |
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony MA Akbar, M Farooq Knowledge and information systems 38, 491-510, 2014 | 29 | 2014 |
Multi-Factor Authentication on Cloud SH Khan, MA Akbar Digital Image Computing: Techniques and Applications (DICTA), 2015 …, 2015 | 25 | 2015 |
Tstructdroid: Realtime malware detection using in-execution dynamic analysis of kernel process control blocks on android F Shahzad, M Akbar, S Khan, M Farooq National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2013 | 23 | 2013 |
Using telemedicine as an enabler for antenatal care in Pakistan MZ Khalid, A Akbar, AK Tanwani, A Tariq, M Farooq 2nd International Conference E-Medisys: E-Medical Systems, Sfax, 2008 | 21 | 2008 |
Gateway enrollment for internet of things device management G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones US Patent 11,190,513, 2021 | 20 | 2021 |
Bit error rate improvement using ESPRIT based beamforming and RAKE receiver MA Akbar, HB Tila, MZ Khalid, MA Ajaz Multitopic Conference, 2009. INMIC 2009. IEEE 13th International, 1-6, 2009 | 11 | 2009 |
Automating application updates in a virtual computing environment S Mukhopadhyay, M Akbar US Patent 10,416,986, 2019 | 9 | 2019 |
A survey on recent advances in malicious applications analysis and detection techniques for smartphones F Shahzad, MA Akbar, M Farooq National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2012 | 9 | 2012 |
RTP-miner: a real-time security framework for RTP fuzzing attacks MA Akbar, M Farooq Proceedings of the 20th international workshop on Network and operating …, 2010 | 6 | 2010 |
Persistable identity tokens GLL DIMITROV, M Akbar, J Brezak, A Gormley, B Gerhardt US Patent 11,178,141, 2021 | 3 | 2021 |
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications MA Akbar, F Shahzad, M Farooq 23rd Virus Bulletin International Conference (VB2013), 2013 | 2 | 2013 |
Fuzzy-Fortuna: A fuzzified approach to generation of cryptographically secure pseudo-random numbers MA Akbar, MZ Khalid Multitopic Conference, 2008. INMIC 2008. IEEE International, 213-217, 2008 | 1 | 2008 |
Gateway enrollment for Internet of Things device management G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones US Patent 11,916,911, 2024 | | 2024 |
Gateway enrollment for internet of things device management G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones US Patent 11,595,392, 2023 | | 2023 |
Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment M Akbar, A Sudhakar US Patent 10,728,243, 2020 | | 2020 |
Evading OS Protection Measures against Stack based BOF Exploitation (Case Study: Firefox) Project Report MA Akbar | | |