Ahmed, M., Hanh, H. H., Karim, S., Khusro, S., Lanzenberger, M., Latif, K., Elka, M., Mustofa, K., Tinh, N. H., Rauber, A., Schatten, A., Tho, N. M., and Tjoa, A. M, “SemanticLIFE ‐A Framework for Managing Information of a Human Lifetime”, (2004). Austrian Computer Society Book Series, iiWAS'2004, Jakarta, Indonesia.
Mansoor Ahmed, Amin Anjomshoaa, A Min Tjoa, “Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE,” IEEE Computer Society, ARES 2007, Vienna, Austria.
Mansoor Ahmed, Amin Anjomshoaa, A Min Tjoa, “User Data Privacy in Web Services Context Using Semantic Desktop‐SemanticLIFE,” Austrian Computer Society Book Series, iiWAS 2007, Jakarta, Indonesia.
Mansoor Ahmed, Amin Anjomshoaa, A Min Tjoa, “Context‐Based Privacy Management of Personal Information Using Semantic Desktop: SemanticLIFE Case Study,” ACM, iiWAS 2008, Linz, Austria.
Abid Khan, Adeel Javed, Mansoor Ahmed, QasimArshad, XiamuNiu, “Mobile Agent Watermarking: Security properties and Attacks revisited,” FIT 2009 (ACM)
Mansoor Ahmed, Amin Anjomshoaa, Muhammad Asfandeyar, Abid Khan, A. Min Tjoa, “Towards an Ontology‐based Solution for Managing License Agreement,” ARES 2010 (IEEE), Krakow, Poland.
Usman Sharif, Abid Khan, and Mansoor Ahmed, “CLUSMA: A Mobile Agent based clustering middleware for Wireless Sensor Networks,” FIT 2009 (ACM).
Stella Mitchell, Shanshan Chen, Mansoor Ahmed, Brian Lowe, Paula Markes, Nick Rejack, Jon Corson-Rikert, Bing He, Ying Ding, and the VIVO collaboration, “The VIVO ontology: Enabling National Networking of Scientists,” Web Science 2011 conference.
Stella Mitchell, Carlo Torniai, Brian Lowe, Jon Corson-Rikert, Melanie Wilson, Mansoor Ahmed, Shanshan Chen, Ying Ding, Nicholas Rejack, Melissa Haendel, The eagle-i Consortium, and VIVO Collaboration, “Aligning Research Resource and Researcher Representation: The eagle-i and VIVO use case,” International Conference on Biomedical Ontology (ICBO 2011).
Bilal Raja, Ahmad Ali, Mansoor Ahmed, Abid Khan, “Framework: Semantics Enabled Role-Based Sentiment Analysis for Drug Abuse on Social Media,” IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE2016).
I. Ahmed, A. Khan, M. S. Khan and M. Ahmed, "Aggregated Signatures for Chaining: A Secure Provenance Scheme" 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, 2016, pp. 2012-2017. doi: 10.1109/TrustCom.2016.0307
Abid Khan, Ayyaz Yaqoob, Kinza Sarwar, Mouzna Tahir, Mansoor Ahmed: “Secure Logging as a Service Using Reversible Watermarking.” FNC/MobiSPC 2017: 336-343
Ahmed Ali, Mansoor Ahmed, Abid Khan, Muhammad Ilyas, Muhammad Saad Razzaq: “A Trust Management System Model for Cloud”, TheInternational Symposium on Networks, Computers and Communications (ISNCC), 2017. ISNCC 2017: 1- 6
Ahmad Ali, Mansoor Ahmed, Muhammad Ilyas and Josef Kueng, “MITIS - An Insider Threats Mitigation Framework for Information Systems”, International Conference on Future Data and Security Engineering, (FDSE 2017). FDSE 2017: 407-415
Mansoor Ahmed, Abid Khan, Osama Sleem, Muhammad Haris, “Malicious URL Filtering: A Fault-Tolerant Approach,” International Symposium on Networks, Computers, and Communications (ISNCC), 2018.
Bibi S., Hussain S., Ahmed M., Zeb M.S. (2019) “A Methodology to Characterize and Compute Public Perception via Social Networks.” In: Rocha Á., Adeli H., Reis L., Costanzo S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 932. Springer, Cham. https://doi.org/10.1007/978-3-030-16187-3_49
Ghazal R., Qadeer N., Malik A.K., Raza B., Ahmed M. (2020) “Intelligent Agent-Based RBAC Model to Support Cyber Security Alliance Among Multiple Organizations in Global IT Systems”. In: Latifi S. (eds) 17th International Conference on Information Technology–New Generations (ITNG 2020). Advances in Intelligent Systems and Computing, vol 1134. Springer, Cham. https://doi.org/10.1007/978-3-030-43020-7_13
K. Ali, J. A. Khan, F. Aizaz and M. Ahmed, "Software Requirements Prioritization in the Context of Global Software Development," 2021 International Conference on Frontiers of Information Technology (FIT), 2021, pp. 13-18, doi: 10.1109/FIT53504.2021.00013.
M. I. Khalid and M. Ahmed, "Blockchain-Based Dynamic Consent Management Systems for Enhancing Quality of Life for People with Disabilities," 2023 IEEE International Smart Cities Conference (ISC2), Bucharest, Romania, 2023, pp. 01-07, doi: 10.1109/ISC257844.2023.10293545.
Ansar, K., Ahmed, M., Khalid, M.I., Helfert, M. (2024). “GDPR-Compliant Data Breach Detection: Leveraging Semantic Web and Blockchain”. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Poniszewska-Marańda, A. (eds) Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Lecture Notes in Networks and Systems, vol 990. Springer, Cham. https://doi.org/10.1007/978-3-031-60328-0_1
Khalid, M.I., Ahmed, M., Ansar, K., Helfert, M. (2024). “Leveraging Blockchain Technologies for Secure and Efficient Patient Data Management in Disaster Scenarios”. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Poniszewska-Marańda, A. (eds) Good Practices and New Perspectives in Information Systems and Technologies. WorldCIST 2024. Lecture Notes in Networks and Systems, vol 990. Springer, Cham. https://doi.org/10.1007/978-3-031-60328-0_2