Mohammad Nauman
Mohammad Nauman
Effat University, Department of Computer Science
Verified email at - Homepage
Cited by
Cited by
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
M Nauman, S Khan, X Zhang, JP Seifert
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
A three-way decision making approach to malware analysis using probabilistic rough sets
M Nauman, N Azam, JT Yao
Information Sciences 374, 193-209, 2016
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
Design and implementation of a fine-grained resource usage model for the android platform.
M Nauman, S Khan
Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011
Self-driving cars using CNN and Q-learning
SOA Chishti, S Riaz, M BilalZaib, M Nauman
2018 IEEE 21st International Multi-Topic Conference (INMIC), 1-7, 2018
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52, 2149-2161, 2013
Remote attestation of attribute updates and information flows in a ucon system
M Nauman, M Alam, X Zhang, T Ali
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
Beyond homology transfer: Deep learning for automated annotation of proteins
M Nauman, H Ur Rehman, G Politano, A Benso
Journal of Grid Computing 17, 225-237, 2019
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
Using personalized web search for enhancing common sense and folksonomy based intelligent search systems
M Nauman, S Khan
IEEE/WIC/ACM International Conference on Web Intelligence (WI'07), 423-426, 2007
Clinical manifestations of patients with systemic lupus erythematosus (SLE) in Khyber Pakhtunkhwa
A Khan, MH Shah, M Nauman, I Hakim, G Shahid, P Niaz, H Sethi, S Aziz, ...
J Pak Med Assoc 67 (8), 1180-5, 2017
LUNA: quantifying and leveraging uncertainty in android malware analysis through Bayesian machine learning
M Backes, M Nauman
2017 IEEE European symposium on security and privacy (euros&p), 204-217, 2017
SE and CS collaboration: Training students for engineering large, complex systems
M Nauman, M Uzair
20th Conference on Software Engineering Education & Training (CSEET'07), 167-174, 2007
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
Trust in IoT: dynamic remote attestation through efficient behavior capture
T Ali, M Nauman, S Jan
Cluster Computing 21, 409-421, 2018
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
Towards platform-independent trusted computing
R Toegl, T Winkler, M Nauman, T Hong
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 61-66, 2009
The system can't perform the operation now. Try again later.
Articles 1–20