Cloud identity management security issues & solutions: a taxonomy U Habiba, R Masood, MA Shibli, MA Niazi Complex Adaptive Systems Modeling 2, 1-37, 2014 | 110 | 2014 |
Intrusion detection system in cloud computing: Challenges and opportunities Y Mehmood, MA Shibli, U Habiba, R Masood 2013 2nd national conference on information assurance (NCIA), 59-66, 2013 | 99 | 2013 |
The chain of implicit trust: An analysis of the web third-party resources loading M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi The World Wide Web Conference, 2851-2857, 2019 | 76 | 2019 |
Security of sharded NoSQL databases: A comparative analysis A Zahid, R Masood, MA Shibli 2014 conference on information assurance and cyber security (CIACS), 1-8, 2014 | 75 | 2014 |
A review of computer vision methods in network security J Zhao, R Masood, S Seneviratne IEEE Communications Surveys & Tutorials 23 (3), 1838-1878, 2021 | 58 | 2021 |
Assessment criteria for trust models in cloud computing A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi 2013 IEEE International Conference on Green Computing and Communications and …, 2013 | 45 | 2013 |
Incognito: A method for obfuscating web data R Masood, D Vatsalan, M Ikram, MA Kaafar Proceedings of the 2018 world wide web conference, 267-276, 2018 | 39 | 2018 |
Security aspects of virtualization in cloud computing M Kazim, R Masood, MA Shibli, AG Abbasi Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013 | 39 | 2013 |
SWAM: Stuxnet worm analysis in metasploit R Masood, Z Anwar 2011 Frontiers of Information Technology, 142-147, 2011 | 36 | 2011 |
Taxonomy for trust models in cloud computing A Kanwal, R Masood, MA Shibli, R Mumtaz The Computer Journal 58 (4), 601-626, 2015 | 35 | 2015 |
Cloud authorization: exploring techniques and approach towards effective access control framework R Masood, MA Shibli, Y Ghazi, A Kanwal, A Ali Frontiers of Computer Science 9 (2), 297-321, 2015 | 30 | 2015 |
Securing the virtual machine images in cloud computing M Kazim, R Masood, MA Shibli Proceedings of the 6th International Conference on Security of Information …, 2013 | 29 | 2013 |
Distributed intrusion detection system using mobile agents in cloud computing environment Y Mehmood, MA Shibli, A Kanwal, R Masood 2015 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2015 | 28 | 2015 |
Comparative analysis of access control systems on cloud R Masood, MA Shibli 2012 13th ACIS International Conference on Software Engineering, Artificial …, 2012 | 28 | 2012 |
Assessment of cyber security challenges in nuclear power plants security incidents, threats, and initiatives R Masood Cybersecurity and Privacy Research Institute the George Washington University, 2016 | 26 | 2016 |
Evaluation and establishment of trust in cloud federation A Kanwal, R Masood, MA Shibli Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 26 | 2014 |
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking R Masood, BZH Zhao, HJ Asghar, MA Kaafar Proceedings on Privacy Enhancing Technologies, 2018 | 22 | 2018 |
Security aspects of database-as-a-service (DBaaS) in cloud computing F Mehak, R Masood, Y Ghazi, MA Shibli, S Khan Cloud Computing: Challenges, Limitations and R&D Solutions, 297-324, 2014 | 19 | 2014 |
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases Y Ghazi, R Masood, A Rauf, MA Shibli, O Hassan EURASIP Journal on Information Security 2016, 1-17, 2016 | 16 | 2016 |
Usage Control Model Specification in XACML Policy Language: XACML Policy Engine of UCON R Masood, MA Shibli, M Bilal Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012 | 16 | 2012 |