1. |
Junaid Akram*, Danish Vasan, Ping Luo (2022), "Obfuscated Code is Identifiable by a Token Based Clone Detection Technique", International Journal of Information and Computer Security
(External URL)
|
2. |
Junaid Akram*, Majid Mumtaz, Gul Jabeen and Ping Luo (2021), "DroidMD: An Efficient and Scalable Android Malware Detection Approach at Source Code Level", International Journal of Information and Computer Security
(External URL)
|
3. |
Danish Vasan*, Mamoun Alazab, Sitalakshmi Venkatraman, Junaid Akram, Zheng Qin (2020), "MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning", IEEE Transactions on Computers
(External URL)
|
4. |
Junaid Akram*, Ping Luo (2020), "SQVDT: Scalable Quantitative Vulnerability Detection Technique for Source Code Security Assessment.", International Journal of Software: Practice and Experience
(External URL)
|
5. |
Junaid Akram*, Zhendong Shi, Majid Mumtaz, Ping Luo (2020), "DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool", Journal of Information Science and Engineering (JISE)
|
6. |
Junaid Akram*, Luo Ping (2020), "How to Build a Vulnerability Benchmark to Overcome Cyber Security Attacks", IET (Institution of Engineering and Technology) Information Security
(External URL)
|
7. |
Junaid Akram*, Majid Mumtaz, Ping Luo (2019), "IBFET: Index Based Features Extraction Technique for Scalable Code Clone Detection at File Level Granularity", International Journal of Software: Practice and Experience
(External URL)
|
8. |
Majid Mumtaz; Junaid Akram and Luo Ping (2019), "An RSA Based Authentication System for Smart IoT Environment, Conference", An RSA Based Authentication System for Smart IoT Environment, Conference
(External URL)
|
9. |
Junaid Akram*, Fang Luping (2015), "Data Structure and Algorithm: A Visualized Web Based Courseware Improves Cognitive Learning", International Journal of Digital Information and Wireless Communications
(External URL)
|