Mudassar Aslam

Orcid: 0000-0003-3223-4234

According to our database1, Mudassar Aslam authored at least 20 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Insight into the Machine-Learning-Based Fileless Malware Detection.
Sensors, January, 2023

ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack.
IEEE Trans. Dependable Secur. Comput., 2023

Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing.
IACR Cryptol. ePrint Arch., 2023

Enforcing Data Geolocation Policies in Public Clouds using Trusted Computing.
CoRR, 2023

2022
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.
Sensors, 2022

EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme.
IEEE Access, 2022

2021
Security and trust preserving inter- and intra-cloud VM migrations.
Int. J. Netw. Manag., 2021

A survey on privacy and access control schemes in fog computing.
Int. J. Commun. Syst., 2021

Quantitative System-Level Security Verification of the IoV Infrastructure.
CoRR, 2021

2020
FoNAC - An automated Fog Node Audit and Certification scheme.
Comput. Secur., 2020

2019
Agent-based ARP cache poisoning detection in switched LAN environments.
IET Networks, 2019

2015
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies.
J. Inf. Secur. Appl., 2015

2014
Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services.
PhD thesis, 2014

Trusted Geolocation-Aware Data Placement in Infrastructure Clouds.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A Color Image Enhancement Technique Using Multiscale Retinex.
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013

2012
Security and Trust Preserving VM Migrations in Public Clouds.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Trusted Launch of Virtual Machine Instances in Public IaaS Environments.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Protecting Private Data in the Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012


  Loading...