Aspire to Achieve

    • https://www.effatuniversity.edu.sa/English/Research/Pages/default.aspx, A researcherhttps://www.effatuniversity.edu.sa/Arabic/Research/Pages/default.aspx, باحث
      A researcher
    • https://www.effatuniversity.edu.sa/English/academics/Undergraduate, An undergraduatehttps://www.effatuniversity.edu.sa/Arabic/academics/Undergraduate, البكالوريوس
      An undergraduate
    • https://www.effatuniversity.edu.sa/English/academics/graduate, A graduatehttps://www.effatuniversity.edu.sa/Arabic/academics/Graduate, الدراسات العليا
      A graduate

Publications

  • Research Interests:

  1. Sohail K., Mohammed N., Toqeer A., Suleiman A., Hassan E. Using Capsule Networks for Android Malware Detection through Orientation-based Features. Computers, Materials & Continua, Indexed: ISI–SCI, Scopus. Vol. 70, No.3, pp.5345–5362, October 2021. Advanced Computer Science and Applications, 2019
  2. Mohammad A., Salman J., Sohail K., Toqeer A. Employing Takaful Islamic Banking through State of the Art Blockchain: A Case Study. International Journal of Advanced Computer Science and Applications (IJACSA). Indexed: SCOPUS & ISI–ESCI. Vol. 10, No. 12, December, 2019.
  3. Fazal K., Shahrulniza M., Georgios T., Sohail K. A Novel Requirements Analysis Approach in SPL based on Collateral, KAOS and Feature Model. International Journal of Engineering & Technology. Vol.7, No. 4.29, pp. 104–108. November, 2018
  4. Mohammad N., Tamleek A., Sohail K., Toqeer A. Deep Neural Architectures for Large Scale Android Malware Analysis. The Journal of Networks, Software Tools and Applications. Vol. 21. No.1. pp 569–588. May, 2017
  5. Toqeer A., Roslan I., Shahrulniza M., Mohammad N., Sohail K. Design and Implementation of an Attestation Protocol for Measured Dynamic Behavior. International Journal of High-Performance Computer Design, Analysis, and Use. Vol. 73. No. 4. pp 1–28. April, 2017
  6. Ayanwuyi K., Megat Z., Hassan D., Sohail K. Bait Request Algorithm to Mitigate Black Hole Attacks in Mobile Ad Hoc Networks. International Journal of Computer Science and Network Security (IJCSNS). Vol. 16. No. 5. pp. 56–62. May, 2016.
  7. Sohail K., Mohammad N., Abu T., Shahrulniza M., Toqeer A. TSSDroid: Realization of an Efficient and Usable TSS API for the Android Software Stack. Journal of Security and Communication Networks (SCN). Vol. 9. No. 11. pp. 1553–1576. February, 2016.
  8. Mohammad N., Sohail K., Abu T., Shahrulniza M. Realization of a User-centric, Privacy-Preserving Permission Framework for Android. Journal of Security and Communication Networks (SCN). Vol. 8. No. 3. pp. 368–382. March, 2014.
  9. Mohammad N., and Sohail K. Design and Implementation of a Fine-grained Resource Usage Control Model for the Android Platform. International Arab Journal of Information Technology (IAJIT). Vol. 8. No. 4. pp. 440–448. October, 2011
  10. Alam, M. Ali, T. Anwar, S. Alam, Q. Ali, M. Adnan, A. Hayat, A. Khan, S. Towards Trusted Information Sharing in Enterprise Information Systems. Information – An International Interdisciplinary Journal. Vol. 14. No. 10. pp. 3515–3526. October, 2011.
  11. Fazal K., Shahrulniza M., Georgios T., Sohail K. A Novel Requirement Analysis Approach in SPL based on Collateral, KAOS and Feature Model. 2nd IEEE International Conference of Information and Communication Technologies (ICICTM’2018). Kuala Lumpur, Malaysia. May, 2018.
  12. Mohammad N., Sohail K., Abu T., Shahrulniza M. Transforming High-Level Requirements to Executable Policies for Android. 8th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC’2014). Siem Reap, Cambodia. January, 2014.
  13. Sohail K., Abu T., Mohammad N., Shahrulniza M. Towards a High-Level Trusted Computing API for Android Software Stack.  7th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC’2013). Kota Kinabalu, Malaysia. January, 2013.
  14. Sohail K., Abu T., Mohammad N., Shahrulniza M. How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms.  IEEE The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012). Kuala Lumpur, Malaysia. June, 2012.
  15. Mohammad N., Sohail K., Abu T., Shahrulniza M. POAuth: Privacy-aware Open Authorization for Native Apps on Smartphone Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC’2012). Kuala Lumpur, Malaysia. February, 2012.
  16. Toqeer A., Roslan I., Shahrulniza M., Mohammad N., Sohail K., A Sense of Others: Behavioral Attestation of Unix Processes on Remote Platforms. 6th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC’2012). Kuala Lumpur, Malaysia. February, 2012.
  17. Masoom A., Xinwen Z., Mohammad N., Sohail K. MAuth: A Fine-grained and User-Centric Permission Delegation Framework for Multi-Mashup Web Services. The 6th IEEE World Congress on Services (SERVICES’2010). Florida, USA. July, 2010.
  18. Mohammad N., Sohail K., Xinwen Z., Jean-Pierre S. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. 3rd International Conference on Trust and Trustworthy Computing (Trust’2010). Berlin, Germany. June, 2010.
  19. Mohammad N., Sohail K., Xinwen Z. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. The 5th Symposium on Information, Computer and Communications Security (ASIACCS’2010). Beijing, China. April, 2010.
  20. Sohail K., Amir H. A Trustworthy Identity Management Architecture for e-Government Processes. IEEE World Congress on Privacy, Security, Trust and the Management of e-Business (Congress 2009). New Brunswick, Canada. August, 2009.
  21. Amir H., Sohail K., Masoom A. Identity Management System for Electronic Government Processes in Pakistan. IEEE 5th International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET’2008). Penang, Malaysia. November, 2008.

Effat Alumnae

Live-Chat