Usama Ahmed

Learn More
With each passing day, the information and communication technologies are evolving with more and more information shared across the globe using the internet superhighway. The threats to information, while connected to the cyber world are getting more targeted, voluminous, and sophisticated requiring new antifragile and resilient network security mechanisms.(More)
BACKGROUND The inability to smile stands out as a notable difficulty for individuals with facial nerve palsies; a problem that facial reanimation surgery aims to rectify. However, smile reconstruction currently lacks quantitative data by which to objectively measure outcomes. This study aims to identify the relative importance of different oral muscles in(More)
Modern day networks consist of a mix and match of technologies with varying capabilities. Securing such networks is a tedious task and demands a lot of contribution from security professionals. However, failing to conduct an in depth and standardized analysis may result in an imperfect network security design. ITU-T provides recommendation for end-to-end(More)
  • 1