Follow
Tamleek Ali Tanveer
Tamleek Ali Tanveer
Security Engineering Research Group, Institute of Management Sciences, Peshawar
Verified email at imsciences.edu.pk - Homepage
Title
Cited by
Cited by
Year
Static malware detection and attribution in android byte-code through an end-to-end deep system
M Amin, TA Tanveer, M Tehseen, M Khan, FA Khan, S Anwar
Future generation computer systems 102, 112-126, 2020
962020
Model-based behavioral attestation
M Alam, X Zhang, M Nauman, T Ali, JP Seifert
Proceedings of the 13th ACM symposium on Access control models and …, 2008
882008
Energy-efficient harvested-aware clustering and cooperative routing protocol for WBAN (E-HARP)
Z Ullah, I Ahmed, FA Khan, M Asif, M Nawaz, T Ali, M Khalid, F Niaz
IEEE Access 7, 100036-100050, 2019
812019
The esc-eorp euro-endo (european infective endocarditis) registry
G Habib, P Lancellotti, PA Erba, A Sadeghpour, M Meshaal, A Sambola, ...
European Heart Journal-Quality of Care and Clinical Outcomes 5 (3), 202-207, 2019
772019
Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks
Z Ullah, I Ahmed, T Ali, N Ahmad, F Niaz, Y Cao
IEEE Access 7, 33906-33921, 2019
642019
Deep neural architectures for large scale android malware analysis
M Nauman, TA Tanveer, S Khan, TA Syed
Cluster Computing 21, 569-588, 2018
512018
Android malware detection through generative adversarial networks
M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar
Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022
502022
An Android runtime security policy enforcement framework
H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ...
Personal and Ubiquitous Computing 16, 631-641, 2012
442012
Using trusted computing for privacy preserving keystroke-based authentication in smartphones
M Nauman, T Ali, A Rauf
Telecommunication Systems 52, 2149-2161, 2013
372013
Remote attestation of attribute updates and information flows in a ucon system
M Nauman, M Alam, X Zhang, T Ali
Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009
352009
A deep learning system for health care IoT and smartphone malware detection
M Amin, D Shehwar, A Ullah, T Guarda, TA Tanveer, S Anwar
Neural Computing and Applications, 1-12, 2022
292022
Token: Trustable keystroke-based authentication for web-based applications on smartphones
M Nauman, T Ali
Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010
292010
Bio-synthesized silver nanoparticles using different plant extracts as anti-cancer agent
Y Khan, M Numan, M Ali, AT Khali, T Ali, N Abbas, ZK Shinwari
J. Nanomed. Biother. Discov 7 (154), 2, 2017
232017
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
232008
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
202007
Behavioral attestation for business processes
M Alam, M Nauman, X Zhang, T Ali, PCK Hung
2009 IEEE International Conference on Web Services, 343-350, 2009
172009
On leveraging stochastic models for remote attestation
T Ali, M Nauman, X Zhang
International conference on trusted systems, 290-301, 2010
152010
On usage control of multimedia content in and through cloud computing paradigm
T Ali, M Nauman, F Hadi, F bin Muhaya
2010 5th International Conference on Future Information Technology, 1-5, 2010
152010
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks
T Ali, M Nauman, M Amin, M Alam
2010 International Conference on Information Science and Applications, 1-8, 2010
152010
Multicentre observational study of adherence to Sepsis Six guidelines in emergency general surgery
Journal of British Surgery 104 (2), e165-e171, 2017
142017
The system can't perform the operation now. Try again later.
Articles 1–20