Follow
Muhammad Ali Akbar
Muhammad Ali Akbar
Trusted Security Advisor, Secursive. https://www.secursive.com
Verified email at secursive.com - Homepage
Title
Cited by
Cited by
Year
Secure biometric template generation for multi-factor authentication
SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan
Pattern Recognition 48 (2), 458-472, 2015
1152015
Evaluating DoS attacks against SIP-based VoIP systems
MZ Rafique, M Ali Akbar, M Farooq
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
552009
Application of evolutionary algorithms in detection of SIP based flooding attacks
MA Akbar, M Farooq
Proceedings of the 11th Annual conference on Genetic and evolutionary …, 2009
482009
A comparative study of anomaly detection algorithms for detection of SIP flooding in IMS
MA Akbar, Z Tariq, M Farooq
Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008 …, 2008
442008
Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
MA Akbar, M Farooq
Knowledge and information systems 38, 491-510, 2014
292014
Multi-Factor Authentication on Cloud
SH Khan, MA Akbar
Digital Image Computing: Techniques and Applications (DICTA), 2015 …, 2015
232015
Using telemedicine as an enabler for antenatal care in Pakistan
MZ Khalid, A Akbar, AK Tanwani, A Tariq, M Farooq
2nd International Conference E-Medisys: E-Medical Systems, Sfax, 2008
222008
Tstructdroid: Realtime malware detection using in-execution dynamic analysis of kernel process control blocks on android
F Shahzad, M Akbar, S Khan, M Farooq
National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2013
212013
Bit error rate improvement using ESPRIT based beamforming and RAKE receiver
MA Akbar, HB Tila, MZ Khalid, MA Ajaz
Multitopic Conference, 2009. INMIC 2009. IEEE 13th International, 1-6, 2009
112009
Automating application updates in a virtual computing environment
S Mukhopadhyay, M Akbar
US Patent 10,416,986, 2019
92019
A survey on recent advances in malicious applications analysis and detection techniques for smartphones
F Shahzad, MA Akbar, M Farooq
National University of Computer & Emerging Sciences, Islamabad, Pakistan …, 2012
92012
RTP-miner: a real-time security framework for RTP fuzzing attacks
MA Akbar, M Farooq
Proceedings of the 20th international workshop on Network and operating …, 2010
62010
Persistable identity tokens
GLL DIMITROV, M Akbar, J Brezak, A Gormley, B Gerhardt
US Patent 11,178,141, 2021
32021
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
MA Akbar, F Shahzad, M Farooq
23rd Virus Bulletin International Conference (VB2013), 2013
22013
Fuzzy-Fortuna: A fuzzified approach to generation of cryptographically secure pseudo-random numbers
MA Akbar, MZ Khalid
Multitopic Conference, 2008. INMIC 2008. IEEE International, 213-217, 2008
12008
Gateway enrollment for Internet of Things device management
G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones
US Patent 11,916,911, 2024
2024
Gateway enrollment for internet of things device management
G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones
US Patent 11,595,392, 2023
2023
Gateway enrollment for internet of things device management
G McCready, R Chamarajnager, G Bollella, M Akbar, MR Jones
US Patent 11,190,513, 2021
2021
Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment
M Akbar, A Sudhakar
US Patent 10,728,243, 2020
2020
Evading OS Protection Measures against Stack based BOF Exploitation (Case Study: Firefox) Project Report
MA Akbar
The system can't perform the operation now. Try again later.
Articles 1–20