default search action
BibTeX records: Um-e-Ghazia
@article{DBLP:journals/isem/BukhariQU17, author = {Asad Bukhari and Usman Qamar and Um{-}e{-}Ghazia}, title = {{URWF:} user reputation based weightage framework for twitter micropost classification}, journal = {Inf. Syst. {E} Bus. Manag.}, volume = {15}, number = {3}, pages = {623--659}, year = {2017}, url = {https://doi.org/10.1007/s10257-016-0320-0}, doi = {10.1007/S10257-016-0320-0}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isem/BukhariQU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/KanwalMUSA13, author = {Ayesha Kanwal and Rahat Masood and Um{-}e{-}Ghazia and Muhammad Awais Shibli and Abdul Ghafoor Abbasi}, title = {Assessment Criteria for Trust Models in Cloud Computing}, booktitle = {2013 {IEEE} International Conference on Green Computing and Communications (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013}, pages = {254--261}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.61}, doi = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.61}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/greencom/KanwalMUSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/Um-e-GhaziaMSB12, author = {Um{-}e{-}Ghazia and Rahat Masood and Muhammad Awais Shibli and Muhammad Bilal}, editor = {Agostino Cortesi and Nabendu Chaki and Khalid Saeed and Slawomir T. Wierzchon}, title = {Usage Control Model Specification in {XACML} Policy Language - {XACML} Policy Engine of {UCON}}, booktitle = {Computer Information Systems and Industrial Management - 11th {IFIP} {TC} 8 International Conference, {CISIM} 2012, Venice, Italy, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7564}, pages = {68--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33260-9\_5}, doi = {10.1007/978-3-642-33260-9\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisim/Um-e-GhaziaMSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/Um-e-GhaziaMS12, author = {Um{-}e{-}Ghazia and Rahat Masood and Muhammad Awais Shibli}, editor = {Teruhisa Hochin and Roger Y. Lee}, title = {Comparative Analysis of Access Control Systems on Cloud}, booktitle = {13th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2012, Kyoto, Japan, August 8-10, 2012}, pages = {41--46}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SNPD.2012.33}, doi = {10.1109/SNPD.2012.33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/Um-e-GhaziaMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/MasoodUA11, author = {Rahat Masood and Um{-}e{-}Ghazia and Zahid Anwar}, title = {{SWAM:} Stuxnet Worm Analysis in Metasploit}, booktitle = {2011 Frontiers of Information Technology, {FIT} 2011, Islamabad, Pakistan, December 19-21, 2011}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FIT.2011.34}, doi = {10.1109/FIT.2011.34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fit/MasoodUA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.