default search action
Masoom Alam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Abdul Basit Ajmal, Shawal Khan, Masoom Alam, Abolfazl Mehbodniya, Julian L. Webber, Abdul Waheed:
Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach. IEEE Access 11: 70443-70458 (2023) - 2022
- [j36]Muhammad Usman Rana, Osama Ellahi, Masoom Alam, Julian L. Webber, Abolfazl Mehbodniya, Shawal Khan:
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack. IEEE Access 10: 108760-108774 (2022) - 2021
- [j35]Shawal Khan, Shahzad Khan, Mahdi Zareei, Faisal S. Alanazi, Nazri Kama, Masoom Alam, Adeel Anjum:
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access 9: 46313-46324 (2021) - [j34]Shahzad Khan, Mahdi Zareei, Shawal Khan, Faisal S. Alanazi, Masoom Alam, Abdul Waheed:
OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search. IEEE Access 9: 114392-114406 (2021) - [j33]Abdul Basit Ajmal, Masoom Alam, Awais Abdul Khaliq, Shawal Khan, Zakria Qadir, M. A. Parvez Mahmud:
Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks. IEEE Access 9: 126789-126800 (2021) - [c12]Sobia Arshad, Masoom Alam, Saif Al-Kuwari, Muhammad Haider Ali Khan:
Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range. EDUCON 2021: 873-879 - 2020
- [j32]Affaf Shahid, Ahmad Almogren, Nadeem Javaid, Fahad Ahmed Al-Zahrani, Mansour Zuair, Masoom Alam:
Blockchain-Based Agri-Food Supply Chain: A Complete Solution. IEEE Access 8: 69230-69243 (2020) - [j31]Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, Anish Jindal:
FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet Things J. 7(7): 6132-6142 (2020) - [j30]Umair Sarfraz, Sherali Zeadally, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. Secur. Priv. 3(2) (2020) - [j29]Sehrish Shafeeq, Sherali Zeadally, Masoom Alam, Abid Khan:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020)
2010 – 2019
- 2019
- [j28]Nighat Usman, Qaisar Javaid, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saeeda Usman, Asma Sher, Manzoor Ilahi, Masoom Alam:
A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns. IEEE Access 7: 133914-133923 (2019) - [j27]Abdul Wahid, Humera Yasmeen, Munam Ali Shah, Masoom Alam, Sayed Chhattan Shah:
Holistic approach for coupling privacy with safety in VANETs. Comput. Networks 148: 214-230 (2019) - [j26]Umair Sarfraz, Masoom Alam, Sherali Zeadally, Abid Khan:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Networks 148: 361-372 (2019) - [j25]Sehrish Shafeeq, Masoom Alam, Abid Khan:
Privacy aware decentralized access control system. Future Gener. Comput. Syst. 101: 420-433 (2019) - [j24]Abdul Majeed, Raihan Ur Rasool, Farooq Ahmad, Masoom Alam, Nadeem Javaid:
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring. J. Ambient Intell. Humaniz. Comput. 10(4): 1509-1526 (2019) - [j23]Tanveer Khan, Masoom Alam, Adnan Akhunzada, Ali Hur, Muhammad Asif, Muhammad Khurram Khan:
Towards augmented proactive cyberthreat intelligence. J. Parallel Distributed Comput. 124: 47-59 (2019) - 2018
- [j22]Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam:
Detection of rank attack in routing protocol for Low Power and Lossy Networks. Ann. des Télécommunications 73(7-8): 429-438 (2018) - [j21]Sidra Ijaz, Faheel A. Hashmi, Sohail Asghar, Masoom Alam:
Vector Based Genetic Algorithm to optimize predictive analysis in network security. Appl. Intell. 48(5): 1086-1096 (2018) - [j20]Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan, Nadeem Javaid, Kim-Kwang Raymond Choo, Rajkumar Buyya:
Secure policy execution using reusable garbled circuit in the cloud. Future Gener. Comput. Syst. 87: 488-501 (2018) - [j19]Imran Khan, Habib-ur Rehman, Mohammad Hussein Fayiz Al-khatib, Zahid Anwar, Masoom Alam:
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds. Future Gener. Comput. Syst. 89: 239-248 (2018) - [j18]Masoom Alam, Naina Emmanuel, Tanveer Khan, Yang Xiang, Houcine Hassan:
Garbled role-based access control in the cloud. J. Ambient Intell. Humaniz. Comput. 9(4): 1153-1166 (2018) - [j17]Naina Emmanuel, Abid Khan, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan:
Structures and data preserving homomorphic signatures. J. Netw. Comput. Appl. 102: 58-70 (2018) - [j16]Ahsan Saleem, Abid Khan, Furqan Shahid, Masoom Alam, Muhammad Khurram Khan:
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. J. Netw. Comput. Appl. 108: 1-19 (2018) - 2017
- [j15]Naeem Jan, Nadeem Javaid, Qaisar Javaid, Nabil Ali Alrajeh, Masoom Alam, Zahoor Ali Khan, Iftikhar Azim Niaz:
A Balanced Energy-Consuming and Hole-Alleviating Algorithm for Wireless Sensor Networks. IEEE Access 5: 6134-6150 (2017) - [j14]Samman Zahra, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik, Muhammad Khurram Khan:
Fog Computing Over IoT: A Secure Deployment and Formal Verification. IEEE Access 5: 27132-27144 (2017) - [j13]Ashfaq Ahmad, Sheeraz Ahmed, Muhammad Imran, Masoom Alam, Iftikhar Azim Niaz, Nadeem Javaid:
On energy efficiency in underwater wireless sensor networks with cooperative routing. Ann. des Télécommunications 72(3-4): 173-188 (2017) - [j12]Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen:
Towards a set aggregation-based data integrity scheme for smart grids. Ann. des Télécommunications 72(9-10): 551-561 (2017) - [j11]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - [j10]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017) - [j9]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j8]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - [j7]Quratulain Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. IEEE Trans. Inf. Forensics Secur. 12(6): 1259-1268 (2017) - 2016
- [j6]Quratulain Alam, Saher Tabbasum, Saif Ur Rehman Malik, Masoom Alam, Tamleek Ali, Adnan Akhunzada, Samee Ullah Khan, Athanasios V. Vasilakos, Rajkumar Buyya:
Formal Verification of the xDAuth Protocol. IEEE Trans. Inf. Forensics Secur. 11(9): 1956-1969 (2016) - 2013
- [j5]Tamleek Ali, Muazzam Ali Khan, Amir Hayat, Masoom Alam, Muhammad Ali:
Secure Actor Directed Localization in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam:
Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302 (2013) - 2012
- [j3]Hammad Banuri, Masoom Alam, Shahryar Khan, Jawad Manzoor, Bahar Ali, Yasar Khan, Mohsin Yaseen, Mir Nauman Tahir, Tamleek Ali, Quratulain Alam, Xinwen Zhang:
An Android runtime security policy enforcement framework. Pers. Ubiquitous Comput. 16(6): 631-641 (2012) - [j2]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. Secur. Commun. Networks 5(9): 1062-1082 (2012) - 2011
- [c11]Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali:
xDAuth: a scalable and lightweight framework for cross domain access control and delegation. SACMAT 2011: 31-40 - 2010
- [j1]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010) - [c10]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam:
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. SERVICES 2010: 56-63
2000 – 2009
- 2009
- [c9]Shahbaz Khan, Sanaullah Khan, Mohammad Nauman, Tamleek Ali, Masoom Alam:
Realizing dynamic behavior attestation for mobile platforms. FIT 2009: 5:1-5:6 - [c8]Imran Khan, Mohammad Nauman, Masoom Alam, Furqan Aziz:
SAuthMash: mobile agent based self authorization in mashups. FIT 2009: 41:1-41:6 - [c7]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Business Processes. ICWS 2009: 343-350 - [c6]Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman:
Scalable Remote Attestation with Privacy Protection. INTRUST 2009: 73-87 - [c5]Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali:
Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80 - 2008
- [b1]Masoom Alam:
Model driven security for the realization of dynamic security requirements in collaborative systems. University of Innsbruck, 2008, ISBN 978-3-8364-7134-3, pp. 1-159 - [c4]Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. AsiaCCS 2008: 245-248 - [c3]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. SACMAT 2008: 175-184 - [c2]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali:
Behavioral attestation for web services (BA4WS). SWS 2008: 21-28 - 2007
- [c1]Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang:
A Model-Driven Framework for Trusted Computing Based Systems. EDOC 2007: 75-86
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint