Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based...
Mohammad Nauman, Shahbaz Khan: Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems. Web Intelligence 2007: 423-426
View ArticleSE and CS Collaboration: Training Students for Engineering Large, Complex...
Mohammad Nauman, Muhammad Uzair: SE and CS Collaboration: Training Students for Engineering Large, Complex Systems. CSEE&T 2007: 167-174
View ArticleBehavioral attestation for web services (BA4WS).
Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali: Behavioral attestation for web services (BA4WS). SWS 2008: 21-28
View ArticleModel-based behavioral attestation.
Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert: Model-based behavioral attestation. SACMAT 2008: 175-184
View ArticleResolving Lexical Ambiguities in Folksonomy Based Search Systems through...
Mohammad Nauman, Shahbaz Khan, Muhammad Amin, Fida Hussain: Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization. SemSearch 2008: 2-13
View ArticleRemote Attestation of Attribute Updates and Information Flows in a UCON System.
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali: Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80
View ArticleScalable Remote Attestation with Privacy Protection.
Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman: Scalable Remote Attestation with Privacy Protection. INTRUST 2009: 73-87
View ArticleBehavioral Attestation for Business Processes.
Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung: Behavioral Attestation for Business Processes. ICWS 2009: 343-350
View ArticleSAuthMash: mobile agent based self authorization in mashups.
Imran Khan, Mohammad Nauman, Masoom Alam, Furqan Aziz: SAuthMash: mobile agent based self authorization in mashups. FIT 2009: 41:1-41:6
View ArticleRealizing dynamic behavior attestation for mobile platforms.
Shahbaz Khan, Sanaullah Khan, Mohammad Nauman, Tamleek Ali, Masoom Alam: Realizing dynamic behavior attestation for mobile platforms. FIT 2009: 5:1-5:6
View ArticleTowards platform-independent trusted computing.
Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong: Towards platform-independent trusted computing. STC 2009: 61-66
View ArticleBeyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. TRUST 2010: 1-15
View ArticleMAuth: A Fine-Grained and User-centric Permission Delegation Framework for...
Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam: MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. SERVICES 2010: 56-63
View ArticleTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on...
Mohammad Nauman, Tamleek Ali: TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. ISA 2010: 286-297
View ArticleOn Leveraging Stochastic Models for Remote Attestation.
Tamleek Ali, Mohammad Nauman, Xinwen Zhang: On Leveraging Stochastic Models for Remote Attestation. INTRUST 2010: 290-301
View ArticleApex: extending Android permission model and enforcement with user-defined...
Mohammad Nauman, Sohail Khan, Xinwen Zhang: Apex: extending Android permission model and enforcement with user-defined runtime constraints. AsiaCCS 2010: 328-332
View ArticleBehavioral Attestation for Web Services Based Business Processes.
Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung: Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010)
View ArticleDesign and implementation of a fine-grained resource usage model for the...
Mohammad Nauman, Sohail Khan: Design and implementation of a fine-grained resource usage model for the android platform. Int. Arab J. Inf. Technol. 8(4): 440-448 (2011)
View ArticlePOAuth: privacy-aware open authorization for native apps on smartphone...
Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa, Najeeb Ur Rehman: POAuth: privacy-aware open authorization for native apps on smartphone platforms. ICUIMC 2012: 60:1-60:8
View ArticleA sense of others: behavioral attestation of UNIX processes on remote platforms.
Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: A sense of others: behavioral attestation of UNIX processes on remote platforms. ICUIMC 2012: 51:1-51:7
View ArticleHow secure is your smartphone: An analysis of smartphone security mechanisms.
Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa: How secure is your smartphone: An analysis of smartphone security mechanisms. CyberSec 2012: 76-81
View ArticleSpecification and Standardization of a Java Trusted Computing API.
Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong: Specification and Standardization of a Java Trusted Computing API. Softw. Pract. Exp. 42(8): 945-965 (2012)
View ArticleAnalysis of existing remote attestation techniques.
Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar: Analysis of existing remote attestation techniques. Secur....
View ArticleRealization of dynamic behavior using remotely verifiable n-call slides in...
Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace. ICUIMC 2013: 18
View ArticleTowards a high-level trusted computing API for Android software stack.
Abu Talib Othman, Sohail Khan, Mohammad Nauman, Shahrulniza Musa: Towards a high-level trusted computing API for Android software stack. ICUIMC 2013: 17
View ArticleUsing trusted computing for privacy preserving keystroke-based authentication...
Mohammad Nauman, Tamleek Ali, Azhar Rauf: Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun. Syst. 52(4): 2149-2161 (2013)
View ArticleBehavioral Attestation for Web Services using access policies.
Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam: Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302...
View ArticleTransforming high-level requirements to executable policies for Android.
Abu Talib Othman, Mohammad Nauman, Shahrulniza Musa, Sohail Khan: Transforming high-level requirements to executable policies for Android. ICUIMC 2014: 112:1-112:8
View ArticleA Three-Way Decision Making Approach to Malware Analysis.
Mohammad Nauman, Nouman Azam, Jingtao Yao: A Three-Way Decision Making Approach to Malware Analysis. RSKT 2015: 286-298
View ArticleRealization of a user-centric, privacy preserving permission framework for...
Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa: Realization of a user-centric, privacy preserving permission framework for Android. Secur. Commun. Networks 8(3): 368-382 (2015)
View ArticleEfficient, Scalable and Privacy Preserving Application Attestation in a Multi...
Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Mohammad Nauman, Shahrulniza Musa: Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. ICCSA (4) 2016: 407-421
View ArticleTSSDroid: realization of an efficient and usable TSS API for the Android...
Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed: TSSDroid: realization of an efficient and usable TSS API for the Android software stack. Secur. Commun. Networks...
View ArticleA three-way decision making approach to malware analysis using probabilistic...
Mohammad Nauman, Nouman Azam, Jingtao Yao: A three-way decision making approach to malware analysis using probabilistic rough sets. Inf. Sci. 374: 193-209 (2016)
View ArticleLUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis...
Michael Backes, Mohammad Nauman: LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. EuroS&P 2017: 204-217
View ArticleDesign and implementation of an attestation protocol for measured dynamic...
Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: Design and implementation of an attestation protocol for measured dynamic behavior. J. Supercomput. 74(11): 5746-5773 (2018)
View ArticleDeep neural architectures for large scale android malware analysis.
Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed: Deep neural architectures for large scale android malware analysis. Clust. Comput. 21(1): 569-588 (2018)
View ArticleTrust in IoT: dynamic remote attestation through efficient behavior capture.
Toqeer Ali Syed, Mohammad Nauman, Salman Jan: Trust in IoT: dynamic remote attestation through efficient behavior capture. Clust. Comput. 21(1): 409-421 (2018)
View ArticleFunction Identification in Android Binaries with Deep Learning.
Aizaz Sharif, Mohammad Nauman: Function Identification in Android Binaries with Deep Learning. CANDAR 2019: 92-101
View ArticleDeepMoney: counterfeit money detection using generative adversarial networks.
Toqeer Ali Syed, Salman Jan, Ahmad B. Alkhodre, Mohammad Nauman, Muhammad Amin, Muhammad Shoaib Siddiqui: DeepMoney: counterfeit money detection using generative adversarial networks. PeerJ Comput....
View ArticleBeyond Homology Transfer: Deep Learning for Automated Annotation of Proteins.
Mohammad Nauman, Hafeez Ur Rehman, Gianfranco Politano, Alfredo Benso: Beyond Homology Transfer: Deep Learning for Automated Annotation of Proteins. J. Grid Comput. 17(2): 225-237 (2019)
View ArticleOp2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End...
Kaleem Nawaz Khan, Muhammad Salman Khan, Mohammad Nauman, Muhammad Yaseen Khan: Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware. CoRR abs/2104.04798...
View ArticleIntegrity verification and behavioral classification of a large dataset...
Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah: Integrity verification and behavioral classification of a large dataset applications...
View ArticleGene Ontology GAN (GOGAN): a novel architecture for protein function prediction.
Musadaq Mansoor, Mohammad Nauman, Hafeez Ur Rehman, Alfredo Benso: Gene Ontology GAN (GOGAN): a novel architecture for protein function prediction. Soft Comput. 26(16): 7653-7667 (2022)
View ArticleGene Ontology Capsule GAN: an improved architecture for protein function...
Musadaq Mansoor, Mohammad Nauman, Hafeez Ur Rehman, Maryam Omar: Gene Ontology Capsule GAN: an improved architecture for protein function prediction. PeerJ Comput. Sci. 8: e1014 (2022)
View Article
More Pages to Explore .....