Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Conference Papers

Akhtar MM; Karunanayake I; Sharma B; Masood R; Ikram M; Kanhere SS, 2023, 'Towards Automatic Annotation and Detection of Fake News', in Proceedings - Conference on Local Computer Networks, LCN, http://dx.doi.org/10.1109/LCN58197.2023.10223359

Yao W; Li Y; Lin W; Hu T; Chowdhury I; Masood R; Seneviratne S, 2020, 'Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps', in Proceedings - Conference on Local Computer Networks, LCN, pp. 381 - 384, http://dx.doi.org/10.1109/LCN48667.2020.9314784

Ikram M; Masood R; Gareth T; Noha Loizon ; Kaafar ; Ensafi R, 2019, 'The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading', in Proceeding WWW '19 The World Wide Web Conference, ACM, San Francisco, USA, pp. 2851 - 2857, presented at WWW 2019, San Francisco, USA, 13 May 2019 - 17 May 2018, http://dx.doi.org/10.1145/3308558.3313521

Masood R; Vatsalan D; Ikram M; Kaafar D, 2018, 'Incognito: A Method for Obfuscating Web Data', in Incognito: A Method for Obfuscating Web Data, Association for Computing Machinery (ACM), Lyon, France, presented at WWW TheWebConf 2018, Lyon, France, 23 April 2018 - 27 April 2018, http://dx.doi.org/10.1145/3178876.3186093

Masood R; Zhao BZH; Asghar HJ; Kaafar MA, 2017, 'Poster: Touchtrack: How unique are your touch gestures?', in Proceedings of the ACM Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 2555 - 2557, presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 30 October 2017 - 03 November 2017, http://dx.doi.org/10.1145/3133956.3138850

Mehmood Y; Shibli MA; Kanwal A; Masood R, 2016, 'Distributed intrusion detection system using mobile agents in cloud computing environment', in Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2015.7395559

Shibli MA; Masood R; Habiba U, 2015, 'Realization of FGAC model using XACML policy specification', in 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings, http://dx.doi.org/10.1109/SNPD.2015.7176199

Habiba U; Masood R; Shibli MA, 2015, 'Secure identity management system for federated Cloud environment', in Studies in Computational Intelligence, pp. 17 - 33, http://dx.doi.org/10.1007/978-3-319-10389-1_2

Kanwal A; Masood R; Shibli MA, 2014, 'Evaluation and establishment of trust in cloud federation', in Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2014, http://dx.doi.org/10.1145/2557977.2558023

Masood R; Shibli MA; Ghafoor A, 2014, 'Fine-grained access control in object-oriented databases', in Lecture Notes in Electrical Engineering, pp. 133 - 138, http://dx.doi.org/10.1007/978-3-642-40861-8_20

Zahid A; Masood R; Shibli MA, 2014, 'Security of sharded NoSQL databases: A comparative analysis', in Conference Proceedings - 2014 Conference on Information Assurance and Cyber Security, CIACS 2014, pp. 1 - 8, http://dx.doi.org/10.1109/CIACS.2014.6861323

Kanwal A; Masood R; Ghazia UE; Shibli MA; Abbasi AG, 2013, 'Assessment criteria for trust models in cloud computing', in Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 254 - 261, http://dx.doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61

Kazim M; Masood R; Shibli MA, 2013, 'Securing the virtual machine images in Cloud computing', in SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425 - 428, http://dx.doi.org/10.1145/2523514.2523576

Kazim M; Masood R; Shibli MA; Abbasi AG, 2013, 'Security aspects of virtualization in cloud computing', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 229 - 240, http://dx.doi.org/10.1007/978-3-642-40925-7_22

Habiba U; Abassi AG; Masood R; Shibli MA, 2013, 'Assessment criteria for cloud identity management systems', in Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp. 188 - 195, http://dx.doi.org/10.1109/PRDC.2013.39

Mehmood Y; Shibli MA; Habiba U; Masood R, 2013, 'Intrusion detection system in cloud computing: Challenges and opportunities', in Conference Proceedings - 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 59 - 66, http://dx.doi.org/10.1109/NCIA.2013.6725325

Um-e-Ghazia ; Masood R; Shibli MA, 2012, 'Comparative analysis of access control systems on cloud', in Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012, pp. 41 - 46, http://dx.doi.org/10.1109/SNPD.2012.33

Um-E-Ghazia ; Masood R; Shibli MA; Bilal M, 2012, 'Usage control model specification in XACML policy language XACML policy engine of UCON', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 79, http://dx.doi.org/10.1007/978-3-642-33260-9_5

Masood R; Ghazia UE; Anwar Z, 2011, 'SWAM: Stuxnet worm analysis in Metasploit', in Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011, pp. 142 - 147, http://dx.doi.org/10.1109/FIT.2011.34


Back to profile page