Select Publications

Book Chapters

Masood R; Berkovsky S; Kaafar MA, 2022, 'Tracking and personalization', in Modern Socio-Technical Perspectives on Privacy, pp. 171 - 202, http://dx.doi.org/10.1007/978-3-030-82786-1_9

Shibli MA; Masood R; Habiba U; Kanwal A; Ghazi Y; Mumtaz R, 2014, 'Access Control As a Service in Cloud: Challenges, Impact and Strategies', in Computer Communications and Networks, Springer London, pp. 55 - 99, http://dx.doi.org/10.1007/978-1-4471-6452-4_3

Mehak F; Masood R; Ghazi Y; Shibli MA; Khan S, 2014, 'Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing', in Computer Communications and Networks, Springer International Publishing, pp. 297 - 324, http://dx.doi.org/10.1007/978-3-319-10530-7_13

Journal articles

Bhaskar N; Ahmed J; Masood R; Ahmed N; Kerr S; Jha SK, 2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, 8, pp. 1 - 32, http://dx.doi.org/10.1145/3678260

Gunawardena R; Jayawardena S; Seneviratne S; Masood R; Kanhere SS, 2024, 'Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics', IEEE Internet of Things Journal, 11, pp. 27303 - 27321, http://dx.doi.org/10.1109/JIOT.2024.3401101

Sharma B; Karunanayake I; Masood R; Ikram M, 2023, 'Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19', IEEE Access, 11, pp. 29769 - 29789, http://dx.doi.org/10.1109/ACCESS.2023.3260643

Zhao J; Masood R; Seneviratne S, 2021, 'A review of computer vision methods in network security', IEEE Communications Surveys and Tutorials, 23, pp. 1838 - 1878, http://dx.doi.org/10.1109/COMST.2021.3086475

Ikram M; Masood R; Tyson G; Kaafar MA; Loizon N; Ensafi R, 2020, 'Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading', ACM Transactions on Privacy and Security, 23, http://dx.doi.org/10.1145/3380466

Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2018, 'Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking', Proceedings on Privacy Enhancing Technologies, 2018, pp. 122 - 142, http://dx.doi.org/10.1515/popets-2018-0016

Elgedawy I; Khurshid S; Masood R; Shibli MA, 2018, 'CRESCENT+: a self-protecting framework for reliable composite web service delivery', Iran Journal of Computer Science, 1, pp. 65 - 87, http://dx.doi.org/10.1007/s42044-018-0008-3

Mehak F; Masood R; Shibli MA; Elgedway I, 2017, 'EACF: extensible access control framework for cloud environments', Annales des Telecommunications/Annals of Telecommunications, 72, pp. 307 - 323, http://dx.doi.org/10.1007/s12243-016-0548-1

Ghazi Y; Masood R; Rauf A; Shibli MA; Hassan O, 2016, 'DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases', Eurasip Journal on Information Security, 2016, http://dx.doi.org/10.1186/s13635-016-0040-5

Kanwal A; Masood R; Shibli MA; Mumtaz R, 2015, 'Taxonomy for trust models in cloud computing', Computer Journal, 58, pp. 601 - 626, http://dx.doi.org/10.1093/comjnl/bxu138

Shibli MA; Masood R; Ghazi Y; Muftic S, 2015, 'MagicNET: Mobile agents data protection system', Transactions on Emerging Telecommunications Technologies, 26, pp. 813 - 835, http://dx.doi.org/10.1002/ett.2742

Masood R; Shibli MA; Ghazi Y; Kanwal A; Ali A, 2015, 'Cloud authorization: exploring techniques and approach towards effective access control framework', Frontiers of Computer Science, 9, pp. 297 - 321, http://dx.doi.org/10.1007/s11704-014-3160-4

Habiba U; Masood R; Shibli MA; Niazi MA, 2014, 'Cloud identity management security issues & solutions: a taxonomy', Complex Adaptive Systems Modeling, 2, http://dx.doi.org/10.1186/s40294-014-0005-9

Conference Papers

Bogahawatta N; Karunanayaka YS; Seneviratne S; Thilakarathna K; Masood R; Kanhere S; Seneviratne A, 2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in 2024 IEEE 49th Conference on Local Computer Networks (LCN), IEEE, pp. 1 - 9, presented at 2024 IEEE 49th Conference on Local Computer Networks (LCN), 08 October 2024 - 10 October 2024, http://dx.doi.org/10.1109/lcn60385.2024.10639764

Bogahawatta N; How G; Karunanayake Y; Seneviratne S; Thilakarathna K; Kahere S; Masood R; Seneviratne A, 2024, 'DEMO : Passive Identification of WiFi Devices in Real-Time', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 92 - 94, http://dx.doi.org/10.1145/3672202.3673716

Masood R; Cheng WY; Vatsalan D; Mishra D; Asghar HJ; Kaafar D, 2024, 'Privacy Preserving Release of Mobile Sensor Data', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3664476.3664519

Akhtar MM; Masood R; Ikram M; Kanhere SS, 2024, 'SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1784 - 1800, http://dx.doi.org/10.1145/3634737.3644998

Akhtar MM; Karunanayake I; Sharma B; Masood R; Ikram M; Kanhere SS, 2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings - Conference on Local Computer Networks, LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359

Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784

Ikram M; Masood R; Gareth T; Noha Loizon ; Kaafar ; Ensafi R, 2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521

Masood R; Vatsalan D; Ikram M; Kaafar D, 2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, Association for Computing Machinery (ACM), Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093

Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850

Mehmood Y; Shibli MA; Kanwal A; Masood R, 2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559

Shibli MA; Masood R; Habiba U, 2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199

Habiba U; Masood R; Shibli MA, 2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2

Kanwal A; Masood R; Shibli MA, 2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023

Masood R; Shibli MA; Ghafoor A, 2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20

Zahid A; Masood R; Shibli MA, 2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323

Kanwal A; Masood R; Ghazia UE; Shibli MA; Abbasi AG, 2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61

Kazim M; Masood R; Shibli MA, 2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576

Kazim M; Masood R; Shibli MA; Abbasi AG, 2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22

Habiba U; Abassi AG; Masood R; Shibli MA, 2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39

Mehmood Y; Shibli MA; Habiba U; Masood R, 2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325

Um-e-Ghazia ; Masood R; Shibli MA, 2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33

Um-E-Ghazia ; Masood R; Shibli MA; Bilal M, 2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5

Masood R; Ghazia UE; Anwar Z, 2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34

Preprints

Akhtar MM; Bhuiyan NS; Masood R; Ikram M; Kanhere SS, 2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, http://dx.doi.org/10.48550/arxiv.2402.03740

Akhtar MM; Masood R; Ikram M; Kanhere SS, 2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, http://dx.doi.org/10.48550/arxiv.2308.12497

Gunawardena R; Yin Y; Huang Y; Masood R; Seneviratne S; Razzak I; Tran N; Seneviratne A, 2023, Usability of Privacy Controls in Top Health Websites, http://dx.doi.org/10.48550/arxiv.2303.01838

Akhtar MM; Sharma B; Karunanayake I; Masood R; Ikram M; Kanhere SS, 2022, Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News, http://arxiv.org/abs/2209.03162v1

xue W; Ahmed N; Masood R; Hu W; Seneviratne A; Jha SK, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, http://dx.doi.org/10.36227/techrxiv.19766023

Masood R; Cheng WY; Vatsalan D; Mishra D; Asghar HJ; Kaafar MA, 2022, Privacy Preserving Release of Mobile Sensor Data, http://dx.doi.org/10.48550/arxiv.2205.06641

Ikram M; Masood R; Tyson G; Kaafar MA; Ensafi R, 2022, A Study of Third-party Resources Loading on Web, http://dx.doi.org/10.48550/arxiv.2203.03077

Sharma B; Karunanayake I; Masood R; Ikram M, 2022, Don't be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19, http://dx.doi.org/10.48550/arxiv.2202.10543

Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps, http://dx.doi.org/10.48550/arxiv.2007.03905

Zhao J; Masood R; Seneviratne S, 2020, A Review of Computer Vision Methods in Network Security, http://dx.doi.org/10.48550/arxiv.2005.03318

Ikram M; Masood R; Tyson G; Kaafar MA; Loizon N; Ensafi R, 2019, The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading, http://dx.doi.org/10.48550/arxiv.1901.07699


Back to profile page