R. Masood
Latest
- Privacy Preserving Release of Mobile Sensor Data
- Privacy Preserving Release of Mobile Sensor Data
- Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19
- Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19
- False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- USABILITY OF PRIVACY CONTROLS IN TOP HEALTH WEBSITES
- USABILITY OF PRIVACY CONTROLS IN TOP HEALTH WEBSITES
- A Study of Third-party Resources Loading on Web
- A Study of Third-party Resources Loading on Web
- FLAP: Federated Learning with Attack and Privacy Awareness
- FLAP: Federated Learning with Attack and Privacy Awareness
- Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News
- Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News
- A review of computer vision methods in network security
- A review of computer vision methods in network security
- Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
- Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
- Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps
- Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps
- The chain of implicit trust: An analysis of the web third-party resources loading
- The chain of implicit trust: An analysis of the web third-party resources loading
- Incognito: A method for obfuscating web data
- Incognito: A method for obfuscating web data
- EACF: extensible access control framework for cloud Environments
- EACF: extensible access control framework for cloud Environments
- POSTER: TouchTrack: How Unique are your Touch Gestures?
- POSTER: TouchTrack: How Unique are your Touch Gestures?
- DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
- DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
- Distributed intrusion detection system using mobile agents in cloud computing environment
- Distributed intrusion detection system using mobile agents in cloud computing environment
- Cloud authorization: exploring techniques and approach towards effective access control framework
- Cloud authorization: exploring techniques and approach towards effective access control framework
- MagicNET: Mobile agents data protection system
- MagicNET: Mobile agents data protection system
- Realization of FGAC model using XACML policy specification
- Realization of FGAC model using XACML policy specification
- Secure identity management system for federated Cloud environment
- Secure identity management system for federated Cloud environment
- Taxonomy for trust models in cloud computing
- Taxonomy for trust models in cloud computing
- Cloud identity management security issues & solutions: a taxonomy
- Cloud identity management security issues & solutions: a taxonomy
- Evaluation and establishment of trust in cloud federation
- Evaluation and establishment of trust in cloud federation
- Fine-Grained Access Control in Object-Oriented Databases
- Fine-Grained Access Control in Object-Oriented Databases
- Security of sharded NoSQL databases: A comparative analysis
- Security of sharded NoSQL databases: A comparative analysis
- Assessment criteria for cloud identity management systems
- Assessment criteria for cloud identity management systems
- Assessment criteria for trust models in cloud computing
- Assessment criteria for trust models in cloud computing
- Intrusion detection system in cloud computing: Challenges and opportunities
- Intrusion detection system in cloud computing: Challenges and opportunities
- Securing the virtual machine images in Cloud computing
- Securing the virtual machine images in Cloud computing
- Security aspects of virtualization in cloud computing
- Security aspects of virtualization in cloud computing
- Comparative analysis of access control systems on cloud
- Comparative analysis of access control systems on cloud
- Usage control model specification in XACML policy language XACML policy engine of UCON
- Usage control model specification in XACML policy language XACML policy engine of UCON
- SWAM: Stuxnet worm analysis in Metasploit
- SWAM: Stuxnet worm analysis in Metasploit