Mohammad Nauman
Cited by
Cited by
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
M Nauman, S Khan, X Zhang, JP Seifert
International Conference on Trust and Trustworthy Computing, 1-15, 2010
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
A three-way decision making approach to malware analysis using probabilistic rough sets
M Nauman, N Azam, JT Yao
Information Sciences 374, 193-209, 2016
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Design and implementation of a fine-grained resource usage model for the android platform.
M Nauman, S Khan
Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011
Remote attestation of attribute updates and information flows in a UCON system
M Nauman, M Alam, X Zhang, T Ali
International Conference on Trusted Computing, 63-80, 2009
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52 (4), 2149-2161, 2013
Using personalized web search for enhancing common sense and folksonomy based intelligent search systems
M Nauman, S Khan
IEEE/WIC/ACM International Conference on Web Intelligence (WI'07), 423-426, 2007
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21 (1), 569-588, 2018
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
International Conference on Information Security and Assurance, 286-297, 2010
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
SE and CS collaboration: Training students for engineering large, complex systems
M Nauman, M Uzair
20th Conference on Software Engineering Education & Training (CSEET'07), 167-174, 2007
Towards platform-independent trusted computing
R Toegl, T Winkler, M Nauman, T Hong
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 61-66, 2009
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
Behavioral attestation for business processes
M Alam, M Nauman, X Zhang, T Ali, PCK Hung
2009 IEEE International Conference on Web Services, 343-350, 2009
On leveraging stochastic models for remote attestation
T Ali, M Nauman, X Zhang
International conference on trusted systems, 290-301, 2010
On usage control of multimedia content in and through cloud computing paradigm
T Ali, M Nauman, F Hadi, F bin Muhaya
2010 5th International Conference on Future Information Technology, 1-5, 2010
Beyond homology transfer: Deep learning for automated annotation of proteins
M Nauman, HU Rehman, G Politano, A Benso
Journal of Grid Computing 17 (2), 225-237, 2019
LUNA: quantifying and leveraging uncertainty in android malware analysis through Bayesian machine learning
M Backes, M Nauman
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 204-217, 2017
The system can't perform the operation now. Try again later.
Articles 1–20