Follow
Tahir Ahmad
Title
Cited by
Cited by
Year
Data protection and privacy of the internet of healthcare things (IoHTs)
J Shahid, R Ahmad, AK Kiani, T Ahmad, S Saeed, AM Almuhaideb
Applied Sciences 12 (4), 1927, 2022
842022
Federated transfer learning: concept and applications
S Saha, T Ahmad
Intelligenza Artificiale 15 (1), 35-44, 2021
742021
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers
A Palmieri, P Prem, S Ranise, U Morelli, T Ahmad
2019 IEEE World Congress on Services (SERVICES) 2642, 47-53, 2019
352019
Monitoring Internet censorship with UBICA
G Aceto, A Botta, A Pescapè, N Feamster, M Faheem Awan, T Ahmad, ...
Traffic Monitoring and Analysis: 7th International Workshop, TMA 2015 …, 2015
332015
A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study
T Ahmad, U Morelli, S Ranise, N Zannone
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
222018
Analyzing internet censorship in pakistan
G Aceto, A Botta, A Pescapé, MF Awan, T Ahmad, S Qaisar
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
172016
An insight into the machine-learning-based fileless malware detection
O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad, M Aslam, A Buriro, ...
Sensors 23 (2), 612, 2023
152023
Food items detection and recognition via multiple deep models
S Khan, K Ahmad, T Ahmad, N Ahmad
Journal of Electronic Imaging 28 (1), 013020-013020, 2019
142019
TrojanDetector: a multi-layer hybrid approach for trojan detection in android applications
S Ullah, T Ahmad, A Buriro, N Zara, S Saha
Applied Sciences 12 (21), 10755, 2022
132022
Measuring broadband access network performance in Pakistan: A comparative study
MF Awan, T Ahmad, S Qaisar, N Feamster, S Sundaresan
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015
132015
Performance evaluation of mobile broadband cellular networks in Pakistan
T Arshad, MF Awan, T Ahmad, S Qaisar
2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN …, 2016
122016
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
T Ahmad, U Morelli, S Ranise, N Zannone
International Journal of Information Security 21 (2), 379-408, 2022
92022
MalwD&C: A Quick and Accurate Machine Learning-Based Approach for Malware Detection and Categorization
A Buriro, AB Buriro, T Ahmad, S Buriro, S Ullah
Applied Sciences 13 (4), 2508, 2023
82023
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
T Ahmad, U Younis
Journal of Network and Computer Applications 41, 197-205, 2014
82014
Machine learning-based dynamic attribute selection technique for ddos attack classification in iot networks
S Ullah, Z Mahmood, N Ali, T Ahmad, A Buriro
Computers 12 (6), 115, 2023
72023
A real-time hybrid approach to combat in-browser cryptojacking malware
MH Khan Abbasi, S Ullah, T Ahmad, A Buriro
Applied Sciences 13 (4), 2039, 2023
62023
Getting smarter about smart cities: Improving data security and privacy through compliance
M Aslam, MA Khan Abbasi, T Khalid, RU Shan, S Ullah, T Ahmad, ...
Sensors 22 (23), 9338, 2022
52022
Performance analysis of non-cryptographic hash functions for real-time storage and lookup of urls
T Ahmad, U Younis
Proceedings of the 2013 11th International Conference on Frontiers of …, 2013
52013
Prevention of Cryptojacking Attacks in Business and FinTech Applications
S Ullah, T Ahmad, R Ahmad, M Aslam
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
42023
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem
T Ahmad, U Morelli, S Ranise
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20