Follow
Mansoor Ahmed (PhD)
Mansoor Ahmed (PhD)
Research Fellow @ ADAPT Centre & IVI- MU, Ireland; Former Marie-Curie (MSCA) Fellow
Verified email at mu.ie - Homepage
Title
Cited by
Cited by
Year
Smart Cities: A Survey on Security Concerns
AKMA Sidra Ijaz, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1832016
Android Malware Detection & Protection: A Survey
AKMA Saba Arshad, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1362016
Leveraging IoT and fog computing in healthcare systems
KS Awaisi, S Hussain, M Ahmed, AA Khan, G Ahmed
IEEE Internet of Things Magazine 3 (2), 52-56, 2020
782020
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks
MMR Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy
Future Generation Computer Systems 82, 274-289, 2018
712018
CDED-Net: Joint segmentation of optic disc and optic cup for glaucoma screening
M Tabassum, TM Khan, M Arsalan, SS Naqvi, M Ahmed, HA Madni, ...
IEEE access 8, 102733-102747, 2020
682020
SemanticLIFE ‐A Framework for Managing Information of A Human Lifetime
MA Hoang H.H., Karim M.S., Khusro S., LanzenbergerM., Latif K., Michlmayr E ...
Proceedings of 6th International Conference on Information Integration and …, 2004
63*2004
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks
MA Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan
Sensors 16, 2016
552016
Intelligent role-based access control model and framework using semantic business roles in multi-domain environments
R Ghazal, AK Malik, N Qadeer, B Raza, AR Shahid, H Alquhayz
IEEE Access 8, 12253-12267, 2020
382020
Towards ontology-based multilingual URL filtering: A Big Data Problem
GJ Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid ...
The Journal of Supercomputing 74 (10), 5003–5021, 2018
28*2018
τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates
MMA Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman ...
Computer and Security: Elsevier 66, 20-39, 2017
27*2017
BCALS: Blockchain‐based secure log management system for cloud computing
A Ali, A Khan, M Ahmed, G Jeon
Transactions on Emerging Telecommunications Technologies 33 (4), e4272, 2022
262022
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes
T Kanwal, SAA Shaukat, A Anjum, KKR Choo, A Khan, N Ahmad, ...
Information Sciences 488, 238-256, 2019
262019
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
S Beg, A Anjum, M Ahmad, S Hussain, G Ahmad, S Khan, KKR Choo
Journal of Network and Computer Applications 174, 102874, 2021
252021
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable cities and society 40, 326-334, 2018
242018
Security and privacy issues in fog computing
A Ali, M Ahmed, M Imran, HA Khattak
Fog Computing: Theory and Practice, 105-137, 2020
232020
Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges
MKK Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada
Journal of Network and Computer Applications 100, 80-94, 2017
232017
Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends
A Khan, A Ahmad, M Ahmed, J Sessa, M Anisetti
Complex & Intelligent Systems 8 (5), 3919-3941, 2022
212022
Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE
AMT Mansoor Ahmed, Amin Anjomshoaa
International Conference on Availability, Reliability and Security, 2007
20*2007
Buyer Seller Watermarking Protocols Issues and Challenges - A Survey
MASN Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail
Journal of Network and Computer Applications: Elsevier 75, 317–334, 2016
16*2016
Energy theft detection in smart grids: Taxonomy, comparative analysis, challenges, and future research directions
M Ahmed, A Khan, M Ahmed, M Tahir, G Jeon, G Fortino, F Piccialli
IEEE/CAA Journal of Automatica Sinica 9 (4), 578-600, 2022
152022
The system can't perform the operation now. Try again later.
Articles 1–20