Follow
Muneer Ahmad Dar
Muneer Ahmad Dar
National Institute of Electronics and Information Technology
Verified email at nielit.gov.in
Title
Cited by
Cited by
Year
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
SN Bukhari, MA Dar, U Iqbal
2018 fourth international conference on advances in electrical, electronics …, 2018
202018
Digital transformation and its influence on sustainable manufacturing and business practices
IAR Moghrabi, SA Bhat, P Szczuko, RA AlKhaled, MA Dar
Sustainability 15 (4), 3010, 2023
192023
Intelligent Hospitals based on IOT
U Iqbal, MA Dar, SN Bukhari
2018 Fourth International Conference on Advances in Electrical, Electronics …, 2018
132018
Evaluation of mobile learning in workplace iraining
MA Dar, SA Bhat
2016 International Conference on Advances in Computing, Communications and …, 2016
122016
Enhancing security of Android & IOS by implementing need-based security (NBS)
MA Dar, J Parvez
2014 International Conference on Control, Instrumentation, Communication and …, 2014
112014
Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones.
MA Dar, A Askar, D Alyahya, SA Bhat
International Journal of Interactive Mobile Technologies 15 (23), 2021
92021
Security enhancement in Android using ellipic curve cryptography
MA Dar, J Parvez
International Journal of Security and Its Applications 11 (6), 27-34, 2017
92017
Smartphone operating systems: Evaluation & enhancements
MA Dar, J Parvez
2014 International Conference on Control, Instrumentation, Communication and …, 2014
92014
Evaluation of Security and Privacy of Smartphone Users
MA Dar, SN Bukhari, UI Khan
2018 Fourth International Conference on Advances in Electrical, Electronics …, 2018
82018
A live-tracking framework for Smartphones
MA Dar, J Parvez
2015 International Conference on Innovations in Information, Embedded and …, 2015
82015
Evaluating Smartphone Application Security: A Case Study on Android
MA Dar, J Parvez
Global Journal of Computer Science and Technology 13 (E12), 9-15, 2013
82013
Blockchain based secure data exchange between cloud networks and smart hand-held devices for use in smart cities
MA Dar, A Askar, SA Bhat
2022 International Conference on Artificial Intelligence in Information and …, 2022
72022
A novel framework for modelling wheelchairs under the realm of Internet-of-Things
SA Bhat, MA Dar, H Elalfy, MA Matheen, S Shah
International Journal of Advanced Computer Science and Applications (IJACSA …, 2021
72021
Prediction of Erythemato-Squamous Diseases Using Machine Learning
SNH Bukhari, F Masoodi, MA Dar, NI Wani, A Sajad, G Hussain
Applications of Machine Learning and Deep Learning on Biological Data, 87-96, 2023
62023
Sensing direction of human motion using single-input-single-output (SISO) channel model and neural networks
SA Bhat, MA Dar, P Szczuko, D Alyahya, F Mustafa
IEEE Access 10, 56823-56844, 2022
62022
Novel Techniques to Enhance the Security of Smartphone Applications.
MA Dar, J Parvez
International Journal of Interactive Mobile Technologies 10 (4), 2016
62016
A novel approach to restrict the access of malicious applications in android
MA Dar
2017 international conference on innovations in information, embedded and …, 2017
52017
Security comparison of android and ios and implementationof user approved security (uas) for android
DM Ahmad, P Javed
Indian Journal of Science and Technology, 2016
52016
Ruminal lactic acidosis in cow: clinical assessment.
S Bashir, T Hussain, MA Dar, AA Dar, AA Bhat, J Farooq
52015
A novel strategy to enhance the android security framework
M AhmadDar, J Parvez
International Journal of Computer Applications 91 (8), 37-41, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20