Muhammad Ajmal Azad
Orcid: 0000-0003-1707-018XAffiliations:
- University of Derby, Department of Computer Science and Mathematics, Derbz, UK
- University of Warwick, Department of Computer Science, Warwick, UK
- Newcastle University, School of Computing Science, Newcastle Upon Tyne, UK
- University of Porto, Department of Electrical Engineering, Porto, Portugal (PhD 2016)
  According to our database1,
  Muhammad Ajmal Azad
  authored at least 71 papers
  between 2006 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on twitter.com
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
IDENTIFY: Intelligent device identification using device fingerprints and machine learning.
    
  
    Pervasive Mob. Comput., 2025
    
  
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques.
    
  
    Internet Things, 2025
    
  
    Expert Syst. Appl., 2025
    
  
  2024
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
    
  
    ACM Trans. Priv. Secur., 2024
    
  
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT.
    
  
    Internet Things, 2024
    
  
    Inf., 2024
    
  
The application of AI techniques for firearm detection in digital forensic investigation.
    
  
    Int. J. Electron. Secur. Digit. Forensics, 2024
    
  
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph.
    
  
    Big Data Min. Anal., 2024
    
  
  2023
    IEEE Internet Things Mag., June, 2023
    
  
Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63].
    
  
    Future Gener. Comput. Syst., June, 2023
    
  
    Inf., February, 2023
    
  
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
    
  
    CoRR, 2023
    
  
    IEEE Access, 2023
    
  
  2022
    Sensors, 2022
    
  
    Int. J. Appl. Cryptogr., 2022
    
  
DEEPSEL: A novel feature selection for early identification of malware in mobile applications.
    
  
    Future Gener. Comput. Syst., 2022
    
  
    Trans. Emerg. Telecommun. Technol., 2022
    
  
A comprehensive survey on secure software-defined network for the Internet of Things.
    
  
    Trans. Emerg. Telecommun. Technol., 2022
    
  
    Trans. Emerg. Telecommun. Technol., 2022
    
  
    Trans. Emerg. Telecommun. Technol., 2022
    
  
    IEEE Access, 2022
    
  
    Proceedings of the IEEE International Conference on Big Data, 2022
    
  
  2021
    IEEE Trans. Intell. Transp. Syst., 2021
    
  
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
    
  
    ACM Trans. Cyber Phys. Syst., 2021
    
  
On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things.
    
  
    Inf. Process. Manag., 2021
    
  
    IEEE Internet Things J., 2021
    
  
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications.
    
  
    Future Internet, 2021
    
  
    Trans. Emerg. Telecommun. Technol., 2021
    
  
    Comput. Commun., 2021
    
  
  2020
    IEEE Trans. Ind. Informatics, 2020
    
  
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
    
  
    IEEE Trans. Emerg. Top. Comput., 2020
    
  
    IEEE Internet Things J., 2020
    
  
    Future Internet, 2020
    
  
    Future Gener. Comput. Syst., 2020
    
  
Profiling high leverage points for detecting anomalous users in telecom data networks.
    
  
    Ann. des Télécommunications, 2020
    
  
Gaussian Mixture Model Based Probabilistic Modeling of Images for Medical Image Segmentation.
    
  
    IEEE Access, 2020
    
  
    Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020
    
  
  2019
    IEEE Internet Things J., 2019
    
  
    IET Networks, 2019
    
  
Deterrence and prevention-based model to mitigate information security insider threats in organisations.
    
  
    Future Gener. Comput. Syst., 2019
    
  
    Future Gener. Comput. Syst., 2019
    
  
Rapid detection of spammers through collaborative information sharing across multiple service providers.
    
  
    Future Gener. Comput. Syst., 2019
    
  
    Future Gener. Comput. Syst., 2019
    
  
    Future Gener. Comput. Syst., 2019
    
  
    Comput. Electr. Eng., 2019
    
  
    Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
    
  
  2018
    Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
    
  
    Future Gener. Comput. Syst., 2018
    
  
    CoRR, 2018
    
  
    Comput. Secur., 2018
    
  
    Comput. Secur., 2018
    
  
    Comput. Secur., 2018
    
  
    Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
    
  
  2017
Early identification of spammers through identity linking, social network and call features.
    
  
    J. Comput. Sci., 2017
    
  
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network.
    
  
    Proceedings of the Symposium on Applied Computing, 2017
    
  
    Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
    
  
  2016
    Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
    
  
  2015
ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User.
    
  
    Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
    
  
  2013
    Comput. Secur., 2013
    
  
  2012
    Proceedings of the 11th IEEE International Conference on Trust, 2012
    
  
  2011
    Proceedings of the 19th International Conference on Software, 2011
    
  
    Proceedings of the IEEE International Conference on Robotics and Automation, 2011
    
  
  2006
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
    
  
    Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006