Quantcast
Channel: dblp: Mohammad Nauman
Browsing latest articles
Browse All 44 View Live

Image may be NSFW.
Clik here to view.

Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based...

Mohammad Nauman, Shahbaz Khan: Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems. Web Intelligence 2007: 423-426

View Article



Image may be NSFW.
Clik here to view.

SE and CS Collaboration: Training Students for Engineering Large, Complex...

Mohammad Nauman, Muhammad Uzair: SE and CS Collaboration: Training Students for Engineering Large, Complex Systems. CSEE&T 2007: 167-174

View Article

Image may be NSFW.
Clik here to view.

Behavioral attestation for web services (BA4WS).

Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali: Behavioral attestation for web services (BA4WS). SWS 2008: 21-28

View Article

Image may be NSFW.
Clik here to view.

Model-based behavioral attestation.

Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert: Model-based behavioral attestation. SACMAT 2008: 175-184

View Article

Image may be NSFW.
Clik here to view.

Resolving Lexical Ambiguities in Folksonomy Based Search Systems through...

Mohammad Nauman, Shahbaz Khan, Muhammad Amin, Fida Hussain: Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization. SemSearch 2008: 2-13

View Article


Image may be NSFW.
Clik here to view.

Remote Attestation of Attribute Updates and Information Flows in a UCON System.

Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali: Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80

View Article

Image may be NSFW.
Clik here to view.

Scalable Remote Attestation with Privacy Protection.

Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman: Scalable Remote Attestation with Privacy Protection. INTRUST 2009: 73-87

View Article

Image may be NSFW.
Clik here to view.

Behavioral Attestation for Business Processes.

Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung: Behavioral Attestation for Business Processes. ICWS 2009: 343-350

View Article


Image may be NSFW.
Clik here to view.

SAuthMash: mobile agent based self authorization in mashups.

Imran Khan, Mohammad Nauman, Masoom Alam, Furqan Aziz: SAuthMash: mobile agent based self authorization in mashups. FIT 2009: 41:1-41:6

View Article


Image may be NSFW.
Clik here to view.

Realizing dynamic behavior attestation for mobile platforms.

Shahbaz Khan, Sanaullah Khan, Mohammad Nauman, Tamleek Ali, Masoom Alam: Realizing dynamic behavior attestation for mobile platforms. FIT 2009: 5:1-5:6

View Article

Image may be NSFW.
Clik here to view.

Towards platform-independent trusted computing.

Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong: Towards platform-independent trusted computing. STC 2009: 61-66

View Article

Image may be NSFW.
Clik here to view.

Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for...

Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert: Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. TRUST 2010: 1-15

View Article

Image may be NSFW.
Clik here to view.

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for...

Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam: MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. SERVICES 2010: 56-63

View Article


Image may be NSFW.
Clik here to view.

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on...

Mohammad Nauman, Tamleek Ali: TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. ISA 2010: 286-297

View Article

Image may be NSFW.
Clik here to view.

On Leveraging Stochastic Models for Remote Attestation.

Tamleek Ali, Mohammad Nauman, Xinwen Zhang: On Leveraging Stochastic Models for Remote Attestation. INTRUST 2010: 290-301

View Article


Image may be NSFW.
Clik here to view.

Apex: extending Android permission model and enforcement with user-defined...

Mohammad Nauman, Sohail Khan, Xinwen Zhang: Apex: extending Android permission model and enforcement with user-defined runtime constraints. AsiaCCS 2010: 328-332

View Article

Image may be NSFW.
Clik here to view.

Behavioral Attestation for Web Services Based Business Processes.

Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung: Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010)

View Article


Image may be NSFW.
Clik here to view.

Design and implementation of a fine-grained resource usage model for the...

Mohammad Nauman, Sohail Khan: Design and implementation of a fine-grained resource usage model for the android platform. Int. Arab J. Inf. Technol. 8(4): 440-448 (2011)

View Article

Image may be NSFW.
Clik here to view.

POAuth: privacy-aware open authorization for native apps on smartphone...

Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa, Najeeb Ur Rehman: POAuth: privacy-aware open authorization for native apps on smartphone platforms. ICUIMC 2012: 60:1-60:8

View Article

Image may be NSFW.
Clik here to view.

A sense of others: behavioral attestation of UNIX processes on remote platforms.

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: A sense of others: behavioral attestation of UNIX processes on remote platforms. ICUIMC 2012: 51:1-51:7

View Article

Image may be NSFW.
Clik here to view.

How secure is your smartphone: An analysis of smartphone security mechanisms.

Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa: How secure is your smartphone: An analysis of smartphone security mechanisms. CyberSec 2012: 76-81

View Article


Image may be NSFW.
Clik here to view.

Specification and Standardization of a Java Trusted Computing API.

Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore W. Hong: Specification and Standardization of a Java Trusted Computing API. Softw. Pract. Exp. 42(8): 945-965 (2012)

View Article


Image may be NSFW.
Clik here to view.

Analysis of existing remote attestation techniques.

Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar: Analysis of existing remote attestation techniques. Secur....

View Article

Image may be NSFW.
Clik here to view.

Realization of dynamic behavior using remotely verifiable n-call slides in...

Roslan Ismail, Toqeer Ali Syed, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace. ICUIMC 2013: 18

View Article

Image may be NSFW.
Clik here to view.

Towards a high-level trusted computing API for Android software stack.

Abu Talib Othman, Sohail Khan, Mohammad Nauman, Shahrulniza Musa: Towards a high-level trusted computing API for Android software stack. ICUIMC 2013: 17

View Article


Image may be NSFW.
Clik here to view.

Using trusted computing for privacy preserving keystroke-based authentication...

Mohammad Nauman, Tamleek Ali, Azhar Rauf: Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun. Syst. 52(4): 2149-2161 (2013)

View Article

Image may be NSFW.
Clik here to view.

Behavioral Attestation for Web Services using access policies.

Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam: Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302...

View Article

Image may be NSFW.
Clik here to view.

Transforming high-level requirements to executable policies for Android.

Abu Talib Othman, Mohammad Nauman, Shahrulniza Musa, Sohail Khan: Transforming high-level requirements to executable policies for Android. ICUIMC 2014: 112:1-112:8

View Article

Image may be NSFW.
Clik here to view.

A Three-Way Decision Making Approach to Malware Analysis.

Mohammad Nauman, Nouman Azam, Jingtao Yao: A Three-Way Decision Making Approach to Malware Analysis. RSKT 2015: 286-298

View Article



Image may be NSFW.
Clik here to view.

Realization of a user-centric, privacy preserving permission framework for...

Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa: Realization of a user-centric, privacy preserving permission framework for Android. Secur. Commun. Networks 8(3): 368-382 (2015)

View Article

Image may be NSFW.
Clik here to view.

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi...

Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Mohammad Nauman, Shahrulniza Musa: Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. ICCSA (4) 2016: 407-421

View Article

Image may be NSFW.
Clik here to view.

TSSDroid: realization of an efficient and usable TSS API for the Android...

Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed: TSSDroid: realization of an efficient and usable TSS API for the Android software stack. Secur. Commun. Networks...

View Article

Image may be NSFW.
Clik here to view.

A three-way decision making approach to malware analysis using probabilistic...

Mohammad Nauman, Nouman Azam, Jingtao Yao: A three-way decision making approach to malware analysis using probabilistic rough sets. Inf. Sci. 374: 193-209 (2016)

View Article


Image may be NSFW.
Clik here to view.

LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis...

Michael Backes, Mohammad Nauman: LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. EuroS&P 2017: 204-217

View Article

Image may be NSFW.
Clik here to view.

Design and implementation of an attestation protocol for measured dynamic...

Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan: Design and implementation of an attestation protocol for measured dynamic behavior. J. Supercomput. 74(11): 5746-5773 (2018)

View Article

Image may be NSFW.
Clik here to view.

Deep neural architectures for large scale android malware analysis.

Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed: Deep neural architectures for large scale android malware analysis. Clust. Comput. 21(1): 569-588 (2018)

View Article


Image may be NSFW.
Clik here to view.

Trust in IoT: dynamic remote attestation through efficient behavior capture.

Toqeer Ali Syed, Mohammad Nauman, Salman Jan: Trust in IoT: dynamic remote attestation through efficient behavior capture. Clust. Comput. 21(1): 409-421 (2018)

View Article


Image may be NSFW.
Clik here to view.

Function Identification in Android Binaries with Deep Learning.

Aizaz Sharif, Mohammad Nauman: Function Identification in Android Binaries with Deep Learning. CANDAR 2019: 92-101

View Article

Image may be NSFW.
Clik here to view.

DeepMoney: counterfeit money detection using generative adversarial networks.

Toqeer Ali Syed, Salman Jan, Ahmad B. Alkhodre, Mohammad Nauman, Muhammad Amin, Muhammad Shoaib Siddiqui: DeepMoney: counterfeit money detection using generative adversarial networks. PeerJ Comput....

View Article

Image may be NSFW.
Clik here to view.

Beyond Homology Transfer: Deep Learning for Automated Annotation of Proteins.

Mohammad Nauman, Hafeez Ur Rehman, Gianfranco Politano, Alfredo Benso: Beyond Homology Transfer: Deep Learning for Automated Annotation of Proteins. J. Grid Comput. 17(2): 225-237 (2019)

View Article

Image may be NSFW.
Clik here to view.

Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End...

Kaleem Nawaz Khan, Muhammad Salman Khan, Mohammad Nauman, Muhammad Yaseen Khan: Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware. CoRR abs/2104.04798...

View Article


Image may be NSFW.
Clik here to view.

Integrity verification and behavioral classification of a large dataset...

Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah: Integrity verification and behavioral classification of a large dataset applications...

View Article

Image may be NSFW.
Clik here to view.

Gene Ontology GAN (GOGAN): a novel architecture for protein function prediction.

Musadaq Mansoor, Mohammad Nauman, Hafeez Ur Rehman, Alfredo Benso: Gene Ontology GAN (GOGAN): a novel architecture for protein function prediction. Soft Comput. 26(16): 7653-7667 (2022)

View Article


Image may be NSFW.
Clik here to view.

Gene Ontology Capsule GAN: an improved architecture for protein function...

Musadaq Mansoor, Mohammad Nauman, Hafeez Ur Rehman, Maryam Omar: Gene Ontology Capsule GAN: an improved architecture for protein function prediction. PeerJ Comput. Sci. 8: e1014 (2022)

View Article
Browsing latest articles
Browse All 44 View Live




Latest Images