Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey on common criteria (CC) evaluating schemes for security assessment of IT products., , , , , , , , and . PeerJ Comput. Sci., (2021)Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations., , , , and . Future Gener. Comput. Syst., (2019)Security Assessment and Evaluation of VPNs: A Comprehensive Survey., , , , , , , , , and . ACM Comput. Surv., 55 (13s): 273:1-273:47 (2023)Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices., , and . IEEE J. Biomed. Health Informatics, 24 (6): 1752-1761 (2020)Forensic analysis of image deletion applications., , , and . Multim. Tools Appl., 81 (14): 19559-19586 (2022)Analytical study of hardware-rooted security standards and their implementation techniques in mobile., , , , and . Telecommun. Syst., 74 (3): 379-403 (2020)ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes., , , , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 105-125. Springer, (2022)Crowdsourcing Cybercrimes through Online Resources., , , and . DeSE, page 158-163. IEEE, (2020)Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan., , , , , and . Healthcom, page 1-6. IEEE, (2017)Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks., , , and . CoRR, (2022)