Tamleek Ali Tanveer
Tamleek Ali Tanveer
Security Engineering Research Group, Institute of Management Sciences, Peshawar
Verified email at - Homepage
Cited by
Cited by
Static malware detection and attribution in android byte-code through an end-to-end deep system
M Amin, TA Tanveer, M Tehseen, M Khan, FA Khan, S Anwar
Future generation computer systems 102, 112-126, 2020
Energy-efficient harvested-aware clustering and cooperative routing protocol for WBAN (E-HARP)
Z Ullah, I Ahmed, FA Khan, M Asif, M Nawaz, T Ali, M Khalid, F Niaz
IEEE Access 7, 100036-100050, 2019
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
The esc-eorp euro-endo (european infective endocarditis) registry
G Habib, P Lancellotti, PA Erba, A Sadeghpour, M Meshaal, A Sambola, ...
European Heart Journal-Quality of Care and Clinical Outcomes 5 (3), 202-207, 2019
Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks
Z Ullah, I Ahmed, T Ali, N Ahmad, F Niaz, Y Cao
IEEE Access 7, 33906-33921, 2019
Android malware detection through generative adversarial networks
M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar
Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
An Android runtime security policy enforcement framework
H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ...
Personal and Ubiquitous Computing 16, 631-641, 2012
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52, 2149-2161, 2013
A deep learning system for health care IoT and smartphone malware detection
M Amin, D Shehwar, A Ullah, T Guarda, TA Tanveer, S Anwar
Neural Computing and Applications, 1-12, 2022
Remote attestation of attribute updates and information flows in a ucon system
M Nauman, M Alam, X Zhang, T Ali
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
Bio-synthesized silver nanoparticles using different plant extracts as anti-cancer agent
Y Khan, M Numan, M Ali, AT Khali, T Ali, N Abbas, ZK Shinwari
J. Nanomed. Biother. Discov 7 (154), 2, 2017
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
Behavioral attestation for business processes
M Alam, M Nauman, X Zhang, T Ali, PCK Hung
2009 IEEE International Conference on Web Services, 343-350, 2009
On leveraging stochastic models for remote attestation
T Ali, M Nauman, X Zhang
International conference on trusted systems, 290-301, 2010
Multicentre observational study of adherence to Sepsis Six guidelines in emergency general surgery
Journal of British Surgery 104 (2), e165-e171, 2017
Formal verification of the xDAuth protocol
Q Alam, S Tabbasum, SUR Malik, M Alam, T Ali, A Akhunzada, SU Khan, ...
IEEE Transactions on Information Forensics and Security 11 (9), 1956-1969, 2016
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks
T Ali, M Nauman, M Amin, M Alam
2010 International Conference on Information Science and Applications, 1-8, 2010
The system can't perform the operation now. Try again later.
Articles 1–20