Apex: extending android permission model and enforcement with user-defined runtime constraints M Nauman, S Khan, X Zhang Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 885 | 2010 |
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform M Nauman, S Khan, X Zhang, JP Seifert International Conference on Trust and Trustworthy Computing, 1-15, 2010 | 111 | 2010 |
How secure is your smartphone: An analysis of smartphone security mechanisms S Khan, M Nauman, AT Othman, S Musa Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 55 | 2012 |
Deep neural architectures for large scale android malware analysis M Nauman, TA Tanveer, S Khan, TA Syed Cluster Computing 21, 569-588, 2018 | 54 | 2018 |
Design and implementation of a fine-grained resource usage model for the android platform. M Nauman, S Khan Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011 | 43 | 2011 |
Zia Ullah N Khan, S Khan, J Jan, M Ali Education 2022, 2020 | 28 | 2020 |
Employing Takaful islamic banking through state of the art blockchain: a case study M Abdeen, J Salman, S Khan, T Ali International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 25 | 2019 |
Realization of a user‐centric, privacy preserving permission framework for Android M Nauman, S Khan, AT Othman, S Musa Security and Communication Networks 8 (3), 368-382, 2015 | 12 | 2015 |
Poauth: privacy-aware open authorization for native apps on smartphone platforms M Nauman, S Khan, AT Othman, S Musa, NU Rehman Proceedings of the 6th International Conference on Ubiquitous Information …, 2012 | 7 | 2012 |
A sense of others: behavioral attestation of unix processes on remote platforms TA Syed, R Ismail, S Musa, M Nauman, S Khan Proceedings of the 6th International Conference on Ubiquitous Information …, 2012 | 6 | 2012 |
Mauth: A fine-grained and user-centric permission delegation framework for multi-mashup web services M Alam, X Zhang, M Nauman, S Khan, Q Alam 2010 6th World Congress on Services, 56-63, 2010 | 6 | 2010 |
Towards a high-level trusted computing API for Android software stack AT Othman, S Khan, M Nauman, S Musa Proceedings of the 7th International Conference on Ubiquitous Information …, 2013 | 5 | 2013 |
Design and implementation of an attestation protocol for measured dynamic behavior T Ali, R Ismail, S Musa, M Nauman, S Khan The Journal of Supercomputing 74 (11), 5746-5773, 2018 | 4 | 2018 |
A novel requirements analysis approach in SPL based on collateral, KAOS and feature model FQ Khan, S Musa, G Tsaramirsis, S Khan International Journal of Engineering & Technology 7 (4.29), 104-108, 2018 | 4 | 2018 |
Bait Request Algorithm to Mitigate Black Hole Attacks in Mobile Ad Hoc Networks AT Kolade, MF Zuhairi, H Dao, S Khan IJCSNS, 1, 2016 | 3 | 2016 |
Using capsule networks for android malware detection through orientation-based features S Khan, M Nauman, SA Alsaif, TA Syed, HA Eleraky Comput. Mater. Continua 70, 5345-5362, 2022 | 2 | 2022 |
TSSDroid: realization of an efficient and usable TSS API for the Android software stack S Khan, M Nauman, AT Othman, S Musa, TA Syed Security and Communication Networks 9 (11), 1553-1576, 2016 | 2 | 2016 |
A Trustworthy Identity Management Architecture for e-Government Processes S Khan, A Hayat 2009 World Congress on Privacy, Security, Trust and the Management of e …, 2009 | 2 | 2009 |
Identity management system for electronic government processes in Pakistan A Hayat, S Khan, M Alam 2008 International Symposium on High Capacity Optical Networks and Enabling …, 2008 | 2 | 2008 |
Transforming high-level requirements to executable policies for Android AT Othman, M Nauman, S Musa, S Khan Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 1 | 2014 |