ORCID as entered in ROS

Select Publications
2022, 'Tracking and Personalization', in Modern Socio-Technical Perspectives on Privacy, Springer International Publishing, pp. 171 - 202, http://dx.doi.org/10.1007/978-3-030-82786-1_9
,2014, 'Access Control As a Service in Cloud: Challenges, Impact and Strategies', in Computer Communications and Networks, Springer London, pp. 55 - 99, http://dx.doi.org/10.1007/978-1-4471-6452-4_3
,2014, 'Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing', in Computer Communications and Networks, Springer International Publishing, pp. 297 - 324, http://dx.doi.org/10.1007/978-3-319-10530-7_13
,2023, 'Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19', IEEE Access, 11, pp. 29769 - 29789, http://dx.doi.org/10.1109/ACCESS.2023.3260643
,2021, 'A review of computer vision methods in network security', IEEE Communications Surveys and Tutorials, 23, pp. 1838 - 1878, http://dx.doi.org/10.1109/COMST.2021.3086475
,2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, 23, http://dx.doi.org/10.1145/3380466
,2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016
,2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3
,2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1
,2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, 2016, http://dx.doi.org/10.1186/s13635-016-0040-5
,2015, 'Taxonomy for trust models in cloud computing', Computer Journal, 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138
,2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742
,2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4
,2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, 2, http://dx.doi.org/10.1186/s40294-014-0005-9
,2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784
,2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521
,2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, WWW TheWebConf 2018, Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093
,2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850
,2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559
,2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199
,2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2
,2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023
,2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20
,2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323
,2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61
,2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576
,2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22
,2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39
,2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325
,2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33
,2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5
,2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34
,2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, , http://arxiv.org/abs/2209.03162v1
,2022, Privacy Preserving Release of Mobile Sensor Data, , http://dx.doi.org/10.48550/arxiv.2205.06641
,2022, A Study of Third-party Resources Loading on Web, , http://dx.doi.org/10.48550/arxiv.2203.03077
,2022, Don't be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19, , http://dx.doi.org/10.48550/arxiv.2202.10543
,2020, Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps, , http://dx.doi.org/10.48550/arxiv.2007.03905
,2020, A Review of Computer Vision Methods in Network Security, , http://dx.doi.org/10.48550/arxiv.2005.03318
,2019, The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading, , http://dx.doi.org/10.48550/arxiv.1901.07699
,