Tamleek Ali

According to our database1, Tamleek Ali authored at least 29 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Grid neighbourhood based three way clustering (3WC).
Inf. Sci., February, 2024

2023
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques.
Comput. Electr. Eng., May, 2023

2022
A deep learning system for health care IoT and smartphone malware detection.
Neural Comput. Appl., 2022

Android malware detection through generative adversarial networks.
Trans. Emerg. Telecommun. Technol., 2022

2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021

2020
An Automated Permission Selection Framework for Android Platform.
J. Grid Comput., 2020

Static malware detection and attribution in android byte-code through an end-to-end deep system.
Future Gener. Comput. Syst., 2020

2019
Energy-Efficient Harvested-Aware Clustering and Cooperative Routing Protocol for WBAN (E-HARP).
IEEE Access, 2019

Robust and Efficient Energy Harvested-Aware Routing Protocol With Clustering Approach in Body Area Networks.
IEEE Access, 2019

2018
Deep neural architectures for large scale android malware analysis.
Clust. Comput., 2018

DeepSIC: a deep model.
Clust. Comput., 2018

2016
Formal Verification of the xDAuth Protocol.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2013
Using trusted computing for privacy preserving keystroke-based authentication in smartphones.
Telecommun. Syst., 2013

Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013

Secure Actor Directed Localization in Wireless Sensor and Actor Networks.
Int. J. Distributed Sens. Networks, 2013

End to End Verification Mechanism for Dynamic Behavior Attestation.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
Analysis of existing remote attestation techniques.
Secur. Commun. Networks, 2012

An Android runtime security policy enforcement framework.
Pers. Ubiquitous Comput., 2012

2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Serv. Res., 2010

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

On Leveraging Stochastic Models for Remote Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

A novel grid middleware architecture.
Proceedings of the FIT '10, 2010

2009
Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009

Scalable Remote Attestation with Privacy Protection.
Proceedings of the Trusted Systems, First International Conference, 2009

Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

Realizing dynamic behavior attestation for mobile platforms.
Proceedings of the FIT '09, 2009

2008
Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008


  Loading...