default search action
Mudassar Aslam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Osama Khalid, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Mudassar Aslam, Attaullah Buriro, Rizwan Ahmad:
An Insight into the Machine-Learning-Based Fileless Malware Detection. Sensors 23(2): 612 (2023) - [j8]Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza:
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack. IEEE Trans. Dependable Secur. Comput. 20(2): 1031-1047 (2023) - [i3]Zair Abbas, Mudassar Aslam:
Enforcing Data Geolocation Policies in Public Clouds using Trusted Computing. CoRR abs/2306.17171 (2023) - [i2]Syed Z. Abbas, Mudassar Aslam:
Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing. IACR Cryptol. ePrint Arch. 2023: 999 (2023) - 2022
- [j7]Anum Khurshid, Reem Alsaaidi, Mudassar Aslam, Shahid Raza:
EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme. IEEE Access 10: 129932-129948 (2022) - [j6]Mudassar Aslam, Muhammad Abbas Khan Abbasi, Tauqeer Khalid, Rafi us Shan, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Rizwan Ahmad:
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance. Sensors 22(23): 9338 (2022) - 2021
- [j5]Tauqeer Khalid, Muhammad Abbas Khan Abbasi, Maria Zuraiz, Abdul Nasir Khan, Mazhar Ali, Raja Wasim Ahmad, Joel J. P. C. Rodrigues, Mudassar Aslam:
A survey on privacy and access control schemes in fog computing. Int. J. Commun. Syst. 34(2) (2021) - [j4]Mudassar Aslam, Simon Bouget, Shahid Raza:
Security and trust preserving inter- and intra-cloud VM migrations. Int. J. Netw. Manag. 31(2) (2021) - [i1]Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst:
Quantitative System-Level Security Verification of the IoV Infrastructure. CoRR abs/2101.06137 (2021) - 2020
- [j3]Mudassar Aslam, Bushra Mohsin, Abdul Nasir Khan, Shahid Raza:
FoNAC - An automated Fog Node Audit and Certification scheme. Comput. Secur. 93: 101759 (2020)
2010 – 2019
- 2019
- [j2]Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam, Anthony T. Chronopoulos:
Agent-based ARP cache poisoning detection in switched LAN environments. IET Networks 8(1): 67-73 (2019) - 2015
- [j1]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies. J. Inf. Secur. Appl. 22: 28-39 (2015) - 2014
- [b1]Mudassar Aslam:
Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services. Mälardalen University College, Västerås, Eskilstuna, Sweden, 2014 - [c7]Nicolae Paladi, Mudassar Aslam, Christian Gehrmann:
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. TrustCom 2014: 352-360 - 2013
- [c6]Zahid Mahmood, Tauseef Ali, Shahid Khattak, Mudassar Aslam, Huzaifa Mehmood:
A Color Image Enhancement Technique Using Multiscale Retinex. FIT 2013: 119-124 - [c5]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. SIN 2013: 136-143 - 2012
- [c4]Lars Rasmusson, Mudassar Aslam:
Protecting Private Data in the Cloud. CLOSER 2012: 5-12 - [c3]Mudassar Aslam, Christian Gehrmann, Lars Rasmusson, Mats Björkman:
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. CLOSER 2012: 511-521 - [c2]Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius:
Trusted Launch of Virtual Machine Instances in Public IaaS Environments. ICISC 2012: 309-323 - [c1]Mudassar Aslam, Christian Gehrmann, Mats Björkman:
Security and Trust Preserving VM Migrations in Public Clouds. TrustCom 2012: 869-876
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint