Follow
Mansoor Ahmed (PhD)
Mansoor Ahmed (PhD)
Marie-Curie Research Fellow at ADAPT Centre & IVI- Maynooth University, Ireland; Faculty @ CUI
Verified email at comsats.edu.pk - Homepage
Title
Cited by
Cited by
Year
Smart Cities: A Survey on Security Concerns
AKMA Sidra Ijaz, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1672016
Android Malware Detection & Protection: A Survey
AKMA Saba Arshad, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1242016
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks
MMR Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy
Future Generation Computer Systems 82, 274-289, 2018
672018
SemanticLIFE ‐A Framework for Managing Information of A Human Lifetime
MA Hoang H.H., Karim M.S., Khusro S., LanzenbergerM., Latif K., Michlmayr E ...
Proceedings of 6th International Conference on Information Integration and …, 2004
63*2004
Leveraging IoT and fog computing in healthcare systems
KS Awaisi, S Hussain, M Ahmed, AA Khan, G Ahmed
IEEE Internet of Things Magazine 3 (2), 52-56, 2020
592020
CDED-Net: Joint segmentation of optic disc and optic cup for glaucoma screening
M Tabassum, TM Khan, M Arsalan, SS Naqvi, M Ahmed, HA Madni, ...
IEEE Access 8, 102733-102747, 2020
532020
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks
MA Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan
Sensors 16, 2016
532016
Towards ontology-based multilingual URL filtering: A Big Data Problem
GJ Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid ...
The Journal of Supercomputing 74 (10), 5003–5021, 2018
28*2018
τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates
MMA Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman ...
Computer and Security: Elsevier 66, 20-39, 2017
25*2017
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes
T Kanwal, SAA Shaukat, A Anjum, KKR Choo, A Khan, N Ahmad, ...
Information Sciences 488, 238-256, 2019
232019
Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges
MKK Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada
Journal of Network and Computer Applications 100, 80-94, 2017
232017
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
S Beg, A Anjum, M Ahmad, S Hussain, G Ahmad, S Khan, KKR Choo
Journal of Network and Computer Applications 174, 102874, 2021
212021
Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE
AMT Mansoor Ahmed, Amin Anjomshoaa
International Conference on Availability, Reliability and Security, 2007
20*2007
Security and privacy issues in fog computing
A Ali, M Ahmed, M Imran, HA Khattak
Fog Computing: Theory and Practice, 105-137, 2020
192020
BCALS: Blockchain‐based secure log management system for cloud computing
A Ali, A Khan, M Ahmed, G Jeon
Transactions on Emerging Telecommunications Technologies 33 (4), e4272, 2022
182022
Intelligent role-based access control model and framework using semantic business roles in multi-domain environments
R Ghazal, AK Malik, N Qadeer, B Raza, AR Shahid, H Alquhayz
IEEE Access 8, 12253-12267, 2020
182020
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable cities and society 40, 326-334, 2018
172018
Buyer Seller Watermarking Protocols Issues and Challenges - A Survey
MASN Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail
Journal of Network and Computer Applications: Elsevier 75, 317–334, 2016
14*2016
Watermarking as a service (WaaS) with anonymity
G Naz, Farah and Khan, Abid and Ahmed, Mansoor and Khan, Majid Iqbal and Din ...
Multimedia Tools and Applications, 1--25, 2019
13*2019
Secure provenance using an authenticated data structure approach
NJ Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen
Computers & Security 73, 34--56, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20