Ammar Masood

Orcid: 0000-0002-5118-0617

According to our database1, Ammar Masood authored at least 18 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems.
Comput. Secur., February, 2024

2023
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization.
Neural Comput. Appl., May, 2023

Security analysis and enhancements of UAS architecture.
Inf. Secur. J. A Glob. Perspect., May, 2023

Open source SIEM solutions for an enterprise.
Inf. Comput. Secur., 2023

Scalable and effective artificial intelligence for multivariate radar environment.
Eng. Appl. Artif. Intell., 2023

2022
Security-enhanced Android for an enterprise.
Int. J. Secur. Networks, 2022

Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE).
Comput. Secur., 2022

Which open-source IDS? Snort, Suricata or Zeek.
Comput. Networks, 2022

2021
Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel.
Wirel. Pers. Commun., 2021

2020
Enterprise Mobile Device Management Requirements and Features.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2017
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment.
IEEE Trans. Dependable Secur. Comput., 2017

2011
Quantifying the role of access control in end-to-end network security.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

2010
Conformance Testing of Temporal Role-Based Access Control Systems.
IEEE Trans. Dependable Secur. Comput., 2010

Fault coverage of Constrained Random Test Selection for access control: A formal analysis.
J. Syst. Softw., 2010

2009
Scalable and Effective Test Generation for Role-Based Access Control Systems.
IEEE Trans. Software Eng., 2009

Integrating GSTRBAC spatial constraints in X-GTRBAC.
Proceedings of the FIT '09, 2009

2005
A Role-Based Access Control Policy Verification Framework for Real-Time Systems.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

Efficiently Managing Security Concerns in Component Based System Design.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005


  Loading...