Apex: extending android permission model and enforcement with user-defined runtime constraints M Nauman, S Khan, X Zhang Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 886 | 2010 |
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform M Nauman, S Khan, X Zhang, JP Seifert International Conference on Trust and Trustworthy Computing, 1-15, 2010 | 111 | 2010 |
Deep neural architectures for large scale android malware analysis M Nauman, TA Tanveer, S Khan, TA Syed Cluster Computing 21, 569-588, 2018 | 56 | 2018 |
How secure is your smartphone: An analysis of smartphone security mechanisms S Khan, M Nauman, AT Othman, S Musa Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 55 | 2012 |
Design and implementation of a fine-grained resource usage model for the android platform. M Nauman, S Khan Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011 | 43 | 2011 |
Employing Takaful islamic banking through state of the art blockchain: a case study M Abdeen, J Salman, S Khan, T Ali International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 27 | 2019 |
Realization of a user‐centric, privacy preserving permission framework for Android M Nauman, S Khan, AT Othman, S Musa Security and Communication Networks 8 (3), 368-382, 2015 | 12 | 2015 |
Poauth: privacy-aware open authorization for native apps on smartphone platforms M Nauman, S Khan, AT Othman, S Musa, NU Rehman Proceedings of the 6th International Conference on Ubiquitous Information …, 2012 | 7 | 2012 |
Towards a high-level trusted computing API for Android software stack AT Othman, S Khan, M Nauman, S Musa Proceedings of the 7th International Conference on Ubiquitous Information …, 2013 | 6 | 2013 |
A sense of others: behavioral attestation of unix processes on remote platforms TA Syed, R Ismail, S Musa, M Nauman, S Khan Proceedings of the 6th International Conference on Ubiquitous Information …, 2012 | 6 | 2012 |
Mauth: A fine-grained and user-centric permission delegation framework for multi-mashup web services M Alam, X Zhang, M Nauman, S Khan, Q Alam 2010 6th World Congress on Services, 56-63, 2010 | 6 | 2010 |
Design and implementation of an attestation protocol for measured dynamic behavior T Ali, R Ismail, S Musa, M Nauman, S Khan The Journal of Supercomputing 74 (11), 5746-5773, 2018 | 4 | 2018 |
A novel requirements analysis approach in SPL based on collateral, KAOS and feature model FQ Khan, S Musa, G Tsaramirsis, S Khan International Journal of Engineering & Technology 7 (4.29), 104-108, 2018 | 4 | 2018 |
Using Capsule Networks for Android Malware Detection Through Orientation-Based Features. S Khan, M Nauman, SA Alsaif, TA Syed, HA Eleraky Computers, Materials & Continua 70 (3), 2022 | 3 | 2022 |
Bait Request Algorithm to Mitigate Black Hole Attacks in Mobile Ad Hoc Networks AT Kolade, MF Zuhairi, H Dao, S Khan IJCSNS, 1, 2016 | 3 | 2016 |
TSSDroid: realization of an efficient and usable TSS API for the Android software stack S Khan, M Nauman, AT Othman, S Musa, TA Syed Security and Communication Networks 9 (11), 1553-1576, 2016 | 2 | 2016 |
A Trustworthy Identity Management Architecture for e-Government Processes S Khan, A Hayat 2009 World Congress on Privacy, Security, Trust and the Management of e …, 2009 | 2 | 2009 |
Identity management system for electronic government processes in Pakistan A Hayat, S Khan, M Alam 2008 International Symposium on High Capacity Optical Networks and Enabling …, 2008 | 2 | 2008 |
LL-XSS: End-to-End Generative Model-based XSS Payload Creation S Khan 2024 21st Learning and Technology Conference (L&T), 121-126, 2024 | 1 | 2024 |
Transforming high-level requirements to executable policies for Android AT Othman, M Nauman, S Musa, S Khan Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 1 | 2014 |