Liza Ahmad
Liza Ahmad
Verified email at
Cited by
Cited by
A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues
O Alfandi, S Khanji, L Ahmad, A Khattak
Cluster Computing 24, 37-55, 2021
Analysis of cloud computing attacks and countermeasures
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said
2016 18th International Conference on Advanced Communication Technology …, 2016
Blockchain-based chain of custody: towards real-time tamper-proof evidence management
L Ahmad, S Khanji, F Iqbal, F Kamoun
Proceedings of the 15th international conference on availability …, 2020
Should we rush to implement password-less single factor fido2 based authentication?
F Alqubaisi, AS Wazan, L Ahmad, DW Chadwick
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC …, 2020
Evaluation of Linux SMTP server security aspects—A case study
S Khanji, R Jabir, L Ahmad, O Alfandi, H Said
2016 7th International Conference on Information and Communication Systems …, 2016
RootAsRole: a security module to manage the administrative privileges for Linux
AS Wazan, DW Chadwick, R Venant, E Billoir, R Laborde, L Ahmad, ...
Computers & Security, 102983, 2022
A systematic analysis on the readiness of Blockchain integration in IoT forensics
S Khanji, O Alfandi, L Ahmad, L Kakkengal, M Al-kfairy
Forensic Science International: Digital Investigation 42, 301472, 2022
List of Authors of URC2020 Special Track Papers
L Ahmad, N Al Hashimi, E Al Neyadi, A Al Shehhi, S Al Shehhi, ...
The system can't perform the operation now. Try again later.
Articles 1–8