Muhammad Ikram
Titre
Citée par
Citée par
Année
Route-over vs Mesh-under Routing in 6LoWPAN
AH Chowdhury, M Ikram, HS Cha, H Redwan, SMS Shams, KH Kim, ...
Proceedings of the 2009 international conference on wireless communications …, 2009
892009
Image Retrieval in Multimedia Databases: A Survey
Y Alemu, J Koh, M Ikram, DK Kim
Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH …, 2009
682009
An analysis of the privacy and security risks of android vpn permission-enabled apps
M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson
Proceedings of the 2016 Internet Measurement Conference, 349-364, 2016
612016
Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning
Ikram, A Muhammad, K Hassan Jameel, M Mohamed Ali, K Anirban, ...
https://petsymposium.org/2017/papers/issue1/paper10-2017-1-source.pdf, 79-99, 2017
392017
A first look at mobile ad-blocking apps
M Ikram, MA Kaafar
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
242017
Measuring, characterizing, and detecting Facebook like farms
M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ...
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
16*2017
Characterizing Key Stakeholders in an Online Black-Hat Marketplace
S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ...
16*2017
A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs)
M Ikram, AH Chowdhury, B Zafar, HS Cha, KH Kim, SW Yoo, DK Kim
Proceedings of the 2009 International Conference on Wireless Communications …, 2009
15*2009
The chain of implicit trust: An analysis of the web third-party resources loading
M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi
The World Wide Web Conference, 2851-2857, 2019
132019
On improved relay nodes placement in two-tiered wireless sensor networks
B Zafar, ZH Mir, SMS Shams, M Ikram, WA Baig, KH Kim, SW Yoo
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
12*2009
Power-Efficient Clustering for Wireless Multimedia Sensor Network
S Jo, M Ikram, I Jung, WRJ Kim
International Journal of Distributed Sensor Networks, 1-8, 2014
9*2014
Incognito: A method for obfuscating web data
R Masood, D Vatsalan, M Ikram, MA Kaafar
Proceedings of the 2018 World Wide Web Conference, 267-276, 2018
82018
Secure and survivable group communication over MANET using CRTDH based on a virtual subnet model
MAH Chowdhury, M Ikram, KH Kim
2008 IEEE Asia-Pacific Services Computing Conference, 638-643, 2008
72008
DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
M Ikram, P Beaume, MA Kaafar
SecCrypt, 10, 2019
52019
A Longitudinal Analysis of Online Ad-Blocking Blacklists
SS Hashmi, M Ikram, MA Kaafar
LCN, 1-9, 2019
52019
A cartography of web tracking using DNS records
J Su, Z Li, S Grumbach, M Ikram, K Salamatiane, X Gaogang
Computer Communications, 83-95, 2019
52019
Benchmarking Peer-to-Peer Systems
W Effelsberg, R Steinmetz, T Strufe
Lecture Notes in Computer Science 7847, 2013
42013
On Optimization of Ad-blocking Lists for Mobile Devices
SS Hashmi, M Ikram, S Smith
Proceedings of MobiQuitous 2019–16th EAI International Conference on Mobile …, 2019
32019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
AsiaCCS, 1--13, 2019
32019
Web Tracking Cartography with DNS Records
J Su, Z Li, S Grumbach, M Ikram, K Salamatian, G Xie
IEEE 37th International Performance Computing and Communications Conference …, 2018
22018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20