1
TITLE: Early identification of spammers through identity linking, social network and call features  Full Text
AUTHORS: Muhammad Ajmal Azad ; Ricardo Morla ;
PUBLISHED: 2017, SOURCE: JOURNAL OF COMPUTATIONAL SCIENCE, VOLUME: 23
INDEXED IN: Scopus WOS CrossRef: 4
2
TITLE: Caller-Centrality: Identifying Telemarketers in a VoIP Network
AUTHORS: Muhammad Ajmal Azad ; Syed Khurram Rizvi;
PUBLISHED: 2016, SOURCE: 11th International Conference on Availability, Reliability and Security (ARES) in PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016)
INDEXED IN: Scopus WOS
3
TITLE: Clustering VoIP caller for SPIT identification. Clustering VoIP caller for SPIT identification  Full Text
AUTHORS: Muhammad Ajmal Azad ; Ricardo Morla ; Junaid Arshad; Khaled Salah;
PUBLISHED: 2016, SOURCE: SECURITY AND COMMUNICATION NETWORKS, VOLUME: 9, ISSUE: 18
INDEXED IN: Scopus WOS DBLP CrossRef: 9
4
TITLE: Database Preservation: The DBPreserve Approach  Full Text
AUTHORS: Arif Ur Rahman; Muhammad Muzammal ; Gabriel David ; Cristina Ribeiro ;
PUBLISHED: 2015, SOURCE: INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, VOLUME: 6, ISSUE: 12
INDEXED IN: WOS CrossRef
5
TITLE: ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User
AUTHORS: Muhammad Ajmal Azad ; Ricardo Morla ;
PUBLISHED: 2015, SOURCE: IEEE 18th International Conference on Computational Science and Engineering (CSE) in 2015 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE)
INDEXED IN: Scopus WOS DBLP CrossRef: 1
6
TITLE: Caller-REP: Detecting unwanted calls with caller social strength  Full Text
AUTHORS: Muhammad Ajmal Azad ; Ricardo Morla ;
PUBLISHED: 2013, SOURCE: COMPUTERS & SECURITY, VOLUME: 39, ISSUE: PART B
INDEXED IN: Scopus WOS DBLP CrossRef: 22
7
TITLE: Intrusion damage assessment for multi-stage attacks for clouds  Full Text
AUTHORS: Junaid Arshad; Muhammad Ajmal Azad ; Imran Ali Jokhio; Paul Townend;
PUBLISHED: 2013, SOURCE: IET COMMUNICATIONS, VOLUME: 7, ISSUE: 12
INDEXED IN: Scopus WOS CrossRef
8
TITLE: Mitigating SPIT with social strength
AUTHORS: Azad, MA ; Morla, R ;
PUBLISHED: 2012, SOURCE: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
INDEXED IN: Scopus DBLP CrossRef: 6