Muhammad Taimoor Khan

Learn More
The purpose of this work is two fold: on one hand we want to formalize the behavior of critical components of the self generating and adapting cognitive middleware AWDRAT such that the formalism not only helps to understand the semantics and technical details of the middleware but also opens an opportunity to extend the middleware to support other complex(More)
We present our ongoing work and initial results towards the (behavioral) correctness analysis of the cognitive middleware AWDRAT [6]. Since, the (provable) behavioral correctness of a software system is a fundamental prerequisite of the system's security. Therefore, the goal of the work is to first formalize the behavioral semantics of the middleware as a(More)
Context-awareness is an important issue of pervasive computing applications and ultimately environment. These applications enhance the functionality of pervasive computing services, applications and systems. In this paper we have proposed a novel design of middleware for global pervasive environment. The focus is made on quality of service, reliability,(More)
Lifelong machine learning (LML) models learn with experience maintaining a knowledge-base, without user intervention. Unlike traditional single-domain models they can easily scale up to explore big data. The existing LML models have high data dependency, consume more resources, and do not support streaming data. This paper proposes online LML model (OAMC)(More)
Determining the language-dominant hemisphere is essential for planning epilepsy surgery. A 60-year-old right-handed woman with epilepsy since age 16 failed a partial right anterior lobectomy at age 21. Later, a brain MRI found extensive right-sided cortical dysplasia and periventricular heterotopia. Subsequently, prolonged video-EEG monitoring localized her(More)
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification). We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the(More)