Segui
Majid Mumtaz
Titolo
Citata da
Citata da
Anno
Forty years of attacks on the RSA cryptosystem: A brief survey
M Mumtaz, L Ping
Journal of Discrete Mathematical Sciences and Cryptography 22 (1), 9-29, 2019
682019
Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level
J Akram, Z Shi, M Mumtaz, P Luo
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
342018
Universities services in the new social ecosystems: Using conversational agents to help teach information security risk analysis
S Kowalski, R Hoffmann, R Jain, M Mumtaz
SOTICS 2011, The First International Conference on Social Eco-Informatics, 91-94, 2011
262011
An RSA based authentication system for smart IoT environment
M Mumtaz, J Akram, L Ping
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
222019
IBFET: Index‐based features extraction technique for scalable code clone detection at file level granularity
J Akram, M Mumtaz, P Luo
Software: Practice and Experience 50 (1), 22-46, 2020
152020
DroidMD: An Efficient and Scalable Android Malware Detection Approach at Source Code Level
PL J. Akram,M. Mumtaz,G. Jabeen
International Journal of Information and Computer Security 15 ((2-3)), 299-321, 2021
142021
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code
J Akram, Z Shi, M Mumtaz, L Ping
The 30th International Conference on Software Engineering and Knowledge …, 2018
122018
Harmonic incursion at the point of common coupling due to small grid-connected power stations
M Mumtaz, SI Khan, WA Chaudhry, ZA Khan
Journal of Electrical Systems and Information Technology 2 (3), 368-377, 2015
82015
An improved cryptanalysis of large RSA decryption exponent with constrained secret key
M Mumtaz, L Ping
International Journal of Information and Computer Security (IJICS), 2021
62021
Swarm Security: Tackling Threats in the Age of Drone Swarms
M Tayyab, M Mumtaz, SM Muzammal, NZ Jhanjhi
Cybersecurity Issues and Challenges in the Drone Industry, 324-342, 2024
52024
DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool.
J Akram, Z Shi, M Mumtaz, P Luo
J. Inf. Sci. Eng. 36 (1), 13-29, 2020
52020
Cryptanalysis of a special case of RSA large decryption exponent using lattice basis reduction method
M Mumtaz, L Ping
2021 IEEE 6th International Conference on Computer and Communication Systems …, 2021
42021
Remarks on the Cryptanalysis of Common Prime RSA for IoT Constrained Low Power Devices
M Majid, L Ping
Information Sciences, 2020
42020
Industry 4.0: The Digital Revolution Unleashing Sustainable Supply Chains
M Tayyab, M Mumtaz, NZ Jhanjhi, SM Muzammal
Digital Transformation for Improved Industry and Supply Chain Performance, 54-69, 2024
22024
Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack
M Mumtaz, P Luo
Cryptology ePrint Archive, 2020
22020
Strong authentication protocol based on Java Crypto chips
M Mumtaz, S Muftic, NB Abdullah
Proceedings of the 5th IEEE International Conference on IT Convergence and …, 2015
22015
Privacy preserving data analysis with generative AI
M Mumtaz, M Tayyab, NZ Jhanjhi, SM Muzammal, K Hameed
AI Techniques for Securing Medical and Business Practices, 391-410, 2025
12025
E_Universities Services in the new social eco-systems: Using Conversational Agents to help Teach Information Security Risk Analysis
R Hoffman, S Kowalski, R Jain, M Mumtaz
12013
E_Universities Services in the New Social Eco-systems: Security Risk Analysis: Using Conversational Agents to Help Teach Information Security Risk Analysis
R Hoffmann, S Kowalski, R Jain, M Mumtaz
12011
AI-Powered Threat Detection in Business Environments: Strategies and Best Practices
M Tayyab, K Hameed, M Mumtaz, SMM Muzammal, P Mahadevappa, ...
Generative AI for Web Engineering Models, 379-436, 2025
2025
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20