Follow
Mansoor Ahmed (PhD)
Mansoor Ahmed (PhD)
Marie-Curie Research Fellow at ADAPT Centre & IVI- Maynooth University, Ireland; Faculty @ CUI
Verified email at comsats.edu.pk - Homepage
Title
Cited by
Cited by
Year
Smart Cities: A Survey on Security Concerns
AKMA Sidra Ijaz, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1682016
Android Malware Detection & Protection: A Survey
AKMA Saba Arshad, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1242016
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks
MMR Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy
Future Generation Computer Systems 82, 274-289, 2018
682018
SemanticLIFE ‐A Framework for Managing Information of A Human Lifetime
MA Hoang H.H., Karim M.S., Khusro S., LanzenbergerM., Latif K., Michlmayr E ...
Proceedings of 6th International Conference on Information Integration and …, 2004
63*2004
Leveraging IoT and fog computing in healthcare systems
KS Awaisi, S Hussain, M Ahmed, AA Khan, G Ahmed
IEEE Internet of Things Magazine 3 (2), 52-56, 2020
592020
CDED-Net: Joint segmentation of optic disc and optic cup for glaucoma screening
M Tabassum, TM Khan, M Arsalan, SS Naqvi, M Ahmed, HA Madni, ...
IEEE Access 8, 102733-102747, 2020
532020
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks
MA Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan
Sensors 16, 2016
532016
Towards ontology-based multilingual URL filtering: A Big Data Problem
GJ Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid ...
The Journal of Supercomputing 74 (10), 5003–5021, 2018
28*2018
τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates
MMA Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman ...
Computer and Security: Elsevier 66, 20-39, 2017
25*2017
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes
T Kanwal, SAA Shaukat, A Anjum, KKR Choo, A Khan, N Ahmad, ...
Information Sciences 488, 238-256, 2019
232019
Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges
MKK Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada
Journal of Network and Computer Applications 100, 80-94, 2017
232017
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
S Beg, A Anjum, M Ahmad, S Hussain, G Ahmad, S Khan, KKR Choo
Journal of Network and Computer Applications 174, 102874, 2021
212021
Security and privacy issues in fog computing
A Ali, M Ahmed, M Imran, HA Khattak
Fog Computing: Theory and Practice, 105-137, 2020
202020
Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE
AMT Mansoor Ahmed, Amin Anjomshoaa
International Conference on Availability, Reliability and Security, 2007
20*2007
BCALS: Blockchain‐based secure log management system for cloud computing
A Ali, A Khan, M Ahmed, G Jeon
Transactions on Emerging Telecommunications Technologies 33 (4), e4272, 2022
182022
Intelligent role-based access control model and framework using semantic business roles in multi-domain environments
R Ghazal, AK Malik, N Qadeer, B Raza, AR Shahid, H Alquhayz
IEEE Access 8, 12253-12267, 2020
182020
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable cities and society 40, 326-334, 2018
172018
Buyer Seller Watermarking Protocols Issues and Challenges - A Survey
MASN Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail
Journal of Network and Computer Applications: Elsevier 75, 317–334, 2016
14*2016
Watermarking as a service (WaaS) with anonymity
G Naz, Farah and Khan, Abid and Ahmed, Mansoor and Khan, Majid Iqbal and Din ...
Multimedia Tools and Applications, 1--25, 2019
13*2019
Secure provenance using an authenticated data structure approach
NJ Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen
Computers & Security 73, 34--56, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20