Sohail Khan
Cited by
Cited by
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
M Nauman, S Khan, X Zhang, JP Seifert
International Conference on Trust and Trustworthy Computing, 1-15, 2010
How secure is your smartphone: An analysis of smartphone security mechanisms
S Khan, M Nauman, AT Othman, S Musa
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
Design and implementation of a fine-grained resource usage model for the android platform.
M Nauman, S Khan
Int. Arab J. Inf. Technol. 8 (4), 440-448, 2011
Employing Takaful islamic banking through state of the art blockchain: a case study
M Abdeen, J Salman, S Khan, T Ali
International Journal of Advanced Computer Science and Applications 10 (12), 2019
Realization of a user‐centric, privacy preserving permission framework for Android
M Nauman, S Khan, AT Othman, S Musa
Security and Communication Networks 8 (3), 368-382, 2015
Poauth: privacy-aware open authorization for native apps on smartphone platforms
M Nauman, S Khan, AT Othman, S Musa, NU Rehman
Proceedings of the 6th International Conference on Ubiquitous Information …, 2012
A sense of others: behavioral attestation of unix processes on remote platforms
TA Syed, R Ismail, S Musa, M Nauman, S Khan
Proceedings of the 6th International Conference on Ubiquitous Information …, 2012
Mauth: A fine-grained and user-centric permission delegation framework for multi-mashup web services
M Alam, X Zhang, M Nauman, S Khan, Q Alam
2010 6th World Congress on Services, 56-63, 2010
Towards a high-level trusted computing API for Android software stack
AT Othman, S Khan, M Nauman, S Musa
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
Design and implementation of an attestation protocol for measured dynamic behavior
T Ali, R Ismail, S Musa, M Nauman, S Khan
The Journal of Supercomputing 74 (11), 5746-5773, 2018
A novel requirements analysis approach in SPL based on collateral, KAOS and feature model
FQ Khan, S Musa, G Tsaramirsis, S Khan
International Journal of Engineering & Technology 7 (4.29), 104-108, 2018
Bait Request Algorithm to Mitigate Black Hole Attacks in Mobile Ad Hoc Networks
AT Kolade, MF Zuhairi, H Dao, S Khan
IJCSNS, 1, 2016
Using capsule networks for android malware detection through orientation-based features
S Khan, M Nauman, SA Alsaif, TA Syed, HA Eleraky
Comput. Mater. Continua 70, 5345-5362, 2022
TSSDroid: realization of an efficient and usable TSS API for the Android software stack
S Khan, M Nauman, AT Othman, S Musa, TA Syed
Security and Communication Networks 9 (11), 1553-1576, 2016
A Trustworthy Identity Management Architecture for e-Government Processes
S Khan, A Hayat
2009 World Congress on Privacy, Security, Trust and the Management of e …, 2009
Identity management system for electronic government processes in Pakistan
A Hayat, S Khan, M Alam
2008 International Symposium on High Capacity Optical Networks and Enabling …, 2008
Transforming high-level requirements to executable policies for Android
AT Othman, M Nauman, S Musa, S Khan
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
S Khan, M Nauman
Big Data Mining and Analytics 7 (2), 485-499, 2024
The system can't perform the operation now. Try again later.
Articles 1–20