Reachability analysis for attributes in ABAC with group hierarchy M Gupta, R Sandhu, T Mawla, J Benson IEEE transactions on dependable and secure computing 20 (1), 841-858, 2022 | 20 | 2022 |
BlueSky: Activity Control: A Vision for" Active" Security Models for Smart Collaborative Systems T Mawla, M Gupta, R Sandhu Proceedings of the 27th ACM on symposium on access control models and …, 2022 | 10 | 2022 |
Temporal signature mining for network intrusion detection using TEMR T Mawla, S Dutta, MF Rabbi Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 4 | 2019 |
A comparison study of temporal signature mining over traditional data mining techniques to detect network intrusion S Dutta, T Mawla, MF Rabbi Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 4 | 2019 |
The model for mutable activity control and chain of dependencies in smart and connected systems T Mawla, M Gupta, S Ameer, R Sandhu International Journal of Information Security, 1-28, 2024 | 2* | 2024 |
Specification and Enforcement of Activity Dependency Policies using XACML T Mawla, M Gupta, R Sandhu International Symposium on System and Software Reliability (ISSSR), 12, 2024 | 1 | 2024 |
Activity Control: A Vision for" Active" Security Models for Smart Collaborative Systems T Mawla, M Gupta Proceedings of Student Research and Creative Inquiry Day 6, 2022 | 1 | 2022 |
Constraints Visualization and Specification for Activity-centric Access Control T Mawla, M Gupta 2024 IEEE 6th International Conference on Trust, Privacy and Security in …, 2024 | | 2024 |
Network Intrusion Detection and Attack Type Classification using Machine Learning T Mawla, W Eberle Proceedings of Student Research and Creative Inquiry Day 6, 2022 | | 2022 |