Follow
Ammar Masood
Ammar Masood
Verified email at mail.au.edu.pk
Title
Cited by
Cited by
Year
A role-based access control policy verification framework for real-time systems
B Shafiq, A Masood, J Joshi, A Ghafoor
10th IEEE international workshop on object-oriented real-time dependable …, 2005
762005
Conformance testing of temporal role-based access control systems
M Masood, A Ghafoor, A Mathur
IEEE Transactions on Dependable and Secure Computing 7 (2), 144-158, 2010
522010
Scalable and effective test generation for role-based access control systems
A Masood, R Bhatti, A Ghafoor, AP Mathur
IEEE Transactions on Software Engineering 35 (5), 654-668, 2009
492009
Which open-source ids? snort, suricata or zeek
A Waleed, AF Jamali, A Masood
Computer Networks 213, 109116, 2022
282022
Deep learning approach for fixed and rotary-wing target detection and classification in radars
SMD Rizvi, S Ahmad, K Khan, A Hasan, A Masood
IEEE Aerospace and Electronic Systems Magazine 37 (3), 32-42, 2022
142022
Role of user and entity behavior analytics in detecting insider attacks
S Khaliq, ZUA Tariq, A Masood
2020 International Conference on Cyber Warfare and Security (ICCWS), 1-6, 2020
132020
Enterprise mobile device management requirements and features
H Batool, A Masood
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
132020
Synchronization attacks against 802.11
G Khanna, A Masood, CN Rotaru
Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005
132005
Design and analysis of multi efficiency motors based high endurance multi rotor with central thrust
SHA Kazmi, A Masood, K Nisar
2021 IEEE 15th International Conference on Application of Information and …, 2021
122021
Composability verification of multi-service workflows in a policy-driven cloud computing environment
B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor
IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017
112017
Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment
SG Basit Shafiq, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor
IEEE 14 (5), 2017
11*2017
Model-based testing of access control systems that employ RBAC policies
A Masood, R Bhatti, A Ghafoor, A Mathur
Technical Report SERC-TR-277, 2005
102005
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization
M Chaudhary, A Masood
Neural Computing and Applications 35 (15), 11373-11388, 2023
82023
Policy-based verification of distributed workflows in a multi-domain environment
B Shafiq, A Masood, A Ghafoor
technical report, https://www. cerias. purdue. edu/tools_and_resources …, 2006
82006
Efficiently managing security concerns in component based system design
A Masood, S Sedigh-Ali, A Ghafoor
29th Annual International Computer Software and Applications Conference …, 2005
82005
Open source SIEM solutions for an enterprise
A Tariq, J Manzoor, MA Aziz, ZUA Tariq, A Masood
Information & Computer Security 31 (1), 88-107, 2022
52022
Vulnerability analysis of qualcomm secure execution environment (QSEE)
F Khalid, A Masood
Computers & Security 116, 102628, 2022
52022
A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks
A Masood, A Masood
2021 International Bhurban Conference on Applied Sciences and Technologies …, 2021
42021
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis
F Khalid, A Masood
2020 International Conference on Cyber Warfare and Security (ICCWS), 1-8, 2020
42020
Effective model for real time end to end secure communication over gsm voice channel
MU Rehman, M Adnan, M Batool, LA Khan, A Masood
Wireless Personal Communications 119, 1643-1659, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20