Rahat Masood

Orcid: 0000-0001-5935-0062

According to our database1, Rahat Masood authored at least 35 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning.
CoRR, 2024

2023
False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
CoRR, 2023

Usability of Privacy Controls in Top Health Websites.
CoRR, 2023

Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19.
IEEE Access, 2023

Towards Automatic Annotation and Detection of Fake News.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

2022
Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News.
CoRR, 2022

Privacy Preserving Release of Mobile Sensor Data.
CoRR, 2022

A Study of Third-party Resources Loading on Web.
CoRR, 2022

Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study.
CoRR, 2022

Tracking and Personalization.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
A Review of Computer Vision Methods in Network Security.
IEEE Commun. Surv. Tutorials, 2021

2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020

Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2019
Online Privacy in Mobile and Web Platforms: Risk Quantification and Obfuscation Techniques.
PhD thesis, 2019

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.
Proceedings of the World Wide Web Conference, 2019

2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018

CRESCENT+: a self-protecting framework for reliable composite web service delivery.
Iran J. Comput. Sci., 2018

Incognito: A Method for Obfuscating Web Data.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

2017
EACF: extensible access control framework for cloud environments.
Ann. des Télécommunications, 2017

POSTER: TouchTrack: How Unique are your Touch Gestures?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases.
EURASIP J. Inf. Secur., 2016

2015
Secure Identity Management System for Federated Cloud Environment.
Proceedings of the Software Engineering, 2015

Cloud authorization: exploring techniques and approach towards effective access control framework.
Frontiers Comput. Sci., 2015

MagicNET: mobile agents data protection system.
Trans. Emerg. Telecommun. Technol., 2015

Taxonomy for Trust Models in Cloud Computing.
Comput. J., 2015

Realization of FGAC model using XACML policy specification.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

2014
Cloud identity management security issues & solutions: a taxonomy.
Complex Adapt. Syst. Model., 2014

Evaluation and establishment of trust in cloud federation.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Securing the virtual machine images in cloud computing.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Assessment Criteria for Cloud Identity Management Systems.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Assessment Criteria for Trust Models in Cloud Computing.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Security Aspects of Virtualization in Cloud Computing.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Comparative Analysis of Access Control Systems on Cloud.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
SWAM: Stuxnet Worm Analysis in Metasploit.
Proceedings of the 2011 Frontiers of Information Technology, 2011


  Loading...