Follow
Nafees Qamar
Title
Cited by
Cited by
Year
Weathering COVID-19 storm: Successful control measures of five Asian countries
N Lu, KW Cheng, N Qamar, KC Huang, JA Johnson
American journal of infection control 48 (7), 851, 2020
1382020
Alleviation of hepatic injury by chrysin in cisplatin administered rats: probable role of oxidative and inflammatory markers
MU Rehman, N Ali, S Rashid, T Jain, S Nafees, M Tahir, AQ Khan, ...
Pharmacological Reports 66 (6), 1050-1059, 2014
962014
Servenet: A deep neural network for web services classification
Y Yang, N Qamar, P Liu, K Grolinger, W Wang, Z Li, Z Liao
2020 IEEE international conference on web services (ICWS), 168-175, 2020
492020
Medshare: a novel hybrid cloud for medical resource sharing among autonomous healthcare providers
Y Yang, X Li, N Qamar, P Liu, W Ke, B Shen, Z Liu
IEEE Access 6, 46949-46961, 2018
482018
Social networks and collective intelligence: a return to the agora
M Mazzara, L Biselli, PP Greco, N Dragoni, A Marraffa, N Qamar, ...
Social Network Engineering for Secure Web Data and Services, 88-113, 2013
322013
Taking into account functional models in the validation of is security policies
Y Ledru, A Idani, J Milhau, N Qamar, R Laleau, JL Richier, MA Labiadh
Advanced Information Systems Engineering Workshops: CAiSE 2011 International …, 2011
312011
Validation of security-design models using Z
N Qamar, Y Ledru, A Idani
Formal Methods and Software Engineering: 13th International Conference on …, 2011
262011
Open-source electronic health record systems: A systematic review of most recent advances
M Shaikh, AHM Vayani, S Akram, N Qamar
Health Informatics Journal 28 (2), 14604582221099828, 2022
162022
CBS mutations and MTFHR SNPs causative of hyperhomocysteinemia in Pakistani children
S Ibrahim, S Maqbool, M Azam, MP Iqbal, R Qamar
Molecular biology reports 45, 353-360, 2018
162018
Validation of IS security policies featuring authorisation constraints
Y Ledru, A Idani, J Milhau, N Qamar, R Laleau, JL Richier, MA Labiadh
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
152015
Evaluating RBAC supported techniques and their validation and verification
N Qamar, Y Ledru, A Idani
2011 Sixth International Conference on Availability, Reliability and …, 2011
152011
Validation of security policies by the animation of z specifications
Y Ledru, N Qamar, A Idani, JL Richier, MA Labiadh
Proceedings of the 16th ACM symposium on Access control models and …, 2011
152011
Towards a formal analysis of dynamic reconfiguration in WS-BPEL
F Abouzaid, M Mazzara, J Mullins, N Qamar
Intelligent Decision Technologies 7 (3), 213-224, 2013
142013
On Social Network Engineering for Secure Web Data and Services
L Caviglione, M Coccoli, A Merlo
Social Network Engineering for Secure Web Data and Services, 1-4, 2013
122013
Predicting influential blogger’s by a novel, hybrid and optimized case based reasoning approach with balanced random forest using imbalanced data
Y Asim, AK Malik, B Raza, AR Shahid, N Qamar
IEEE Access 9, 6836-6854, 2020
92020
Principles of the coupling between UML and formal notations
A Idani, Y Ledru, J Richier, MA Labiadh, N Qamar, F Gervais, R Laleau, ...
ANR-08-SEGI-018, 2011
92011
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework
U Rauf, M Shehab, N Qamar, S Sameen
Future Generation Computer Systems 117, 412-425, 2021
82021
A quantitative analysis of the performance and scalability of de-identification tools for medical data
Z Liu, N Qamar, J Qian
International Symposium on Foundations of Health Informatics Engineering and …, 2013
82013
Automated reviewing of healthcare security policies
N Qamar, J Faber, Y Ledru, Z Liu
Foundations of Health Information Engineering and Systems: Second …, 2013
82013
Querying medical datasets while preserving privacy
N Qamar, Y Yang, A Nadas, Z Liu
Procedia Computer Science 98, 324-331, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20