Follow
Mohammad Nauman
Mohammad Nauman
Effat University, Department of Computer Science
Verified email at effatuniversity.edu.sa - Homepage
Title
Cited by
Cited by
Year
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
8862010
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
M Nauman, S Khan, X Zhang, JP Seifert
International Conference on Trust and Trustworthy Computing, 1-15, 2010
1112010
A three-way decision making approach to malware analysis using probabilistic rough sets
M Nauman, N Azam, JT Yao
Information Sciences 374, 193-209, 2016
942016
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
892008
Self-driving cars using CNN and Q-learning
SOA Chishti, S Riaz, M BilalZaib, M Nauman
2018 IEEE 21st International Multi-Topic Conference (INMIC), 1-7, 2018
582018
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
562018
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
552012
Design and implementation of a fine-grained resource usage model for the android platform.
M Nauman, S Khan
Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011
432011
Beyond homology transfer: Deep learning for automated annotation of proteins
M Nauman, H Ur Rehman, G Politano, A Benso
Journal of Grid Computing 17, 225-237, 2019
412019
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52, 2149-2161, 2013
372013
Remote attestation of attribute updates and information flows in a ucon system
M Nauman, M Alam, X Zhang, T Ali
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
362009
DeepMoney: counterfeit money detection using generative adversarial networks
T Ali, S Jan, A Alkhodre, M Nauman, M Amin, MS Siddiqui
PeerJ Computer Science 5, e216, 2019
342019
LUNA: quantifying and leveraging uncertainty in android malware analysis through Bayesian machine learning
M Backes, M Nauman
2017 IEEE European symposium on security and privacy (euros&p), 204-217, 2017
332017
Trust in IoT: dynamic remote attestation through efficient behavior capture
T Ali, M Nauman, S Jan
Cluster Computing 21, 409-421, 2018
302018
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
292010
Using personalized web search for enhancing common sense and folksonomy based intelligent search systems
M Nauman, S Khan
IEEE/WIC/ACM International Conference on Web Intelligence (WI'07), 423-426, 2007
292007
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models
S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah
Expert Systems 38 (4), e12611, 2021
272021
SE and CS collaboration: Training students for engineering large, complex systems
M Nauman, M Uzair
20th Conference on Software Engineering Education & Training (CSEET'07), 167-174, 2007
242007
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
232008
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
202007
The system can't perform the operation now. Try again later.
Articles 1–20