Mohammad Nauman
Orcid: 0000-0003-0941-2549
According to our database1,
Mohammad Nauman
authored at least 45 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers.
Big Data Min. Anal., 2024
2022
Soft Comput., 2022
PeerJ Comput. Sci., 2022
2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021
Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware.
CoRR, 2021
2019
PeerJ Comput. Sci., 2019
J. Grid Comput., 2019
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
2018
J. Supercomput., 2018
Clust. Comput., 2018
Clust. Comput., 2018
2017
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks, 2016
A three-way decision making approach to malware analysis using probabilistic rough sets.
Inf. Sci., 2016
Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
2015
Secur. Commun. Networks, 2015
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015
2014
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
2013
Using trusted computing for privacy preserving keystroke-based authentication in smartphones.
Telecommun. Syst., 2013
Multim. Tools Appl., 2013
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013
2012
Softw. Pract. Exp., 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Design and implementation of a fine-grained resource usage model for the android platform.
Int. Arab J. Inf. Technol., 2011
2010
Int. J. Web Serv. Res., 2010
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Trusted Computing, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the FIT '09, 2009
Proceedings of the FIT '09, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Resolving Lexical Ambiguities in Folksonomy Based Search Systems through Common Sense and Personalization.
Proceedings of the Workshop on Semantic Search (SemSearch 2008) at the 5th European Semantic Web Conference (ESWC 2008), 2008
2007
Using PersonalizedWeb Search for Enhancing Common Sense and Folksonomy Based Intelligent Search Systems.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007
Proceedings of the 20th Conference on Software Engineering Education and Training (CSEE&T 2007), 2007