Muhammad Asim

Orcid: 0000-0002-2894-7891

Affiliations:
  • National University of Computer and Emerging Sciences, Department of Computer Science, Islamabad, Pakistan
  • Liverpool John Moores University, School of Computing and Mathematical Science, UK (PhD 2010)


According to our database1, Muhammad Asim authored at least 55 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
Sensors, December, 2023

Efficient Approach for Anomaly Detection in IoT Using System Calls.
Sensors, January, 2023

AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes.
J. Ambient Intell. Humaniz. Comput., 2023

HDA-TIP: A Framework for Heterogeneous Data Aggregation for Threat Intelligence Platform.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

2022
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT.
J. Supercomput., 2022

Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022

Machine learning and the Internet of Things security: Solutions and open challenges.
J. Parallel Distributed Comput., 2022

A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties.
Trans. Emerg. Telecommun. Technol., 2022

A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems.
Comput. Networks, 2022

2021
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model.
ACM Trans. Internet Techn., 2021

Orchestration- and choreography-based composition of Internet of Transactional Things.
Serv. Oriented Comput. Appl., 2021

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021

URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models.
J. Netw. Syst. Manag., 2021

CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications.
Trans. Emerg. Telecommun. Technol., 2021

Congestion avoidance in wireless sensor network using software defined network.
Computing, 2021

Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment.
J. Parallel Distributed Comput., 2020

COMITMENT: A Fog Computing Trust Management Approach.
J. Parallel Distributed Comput., 2020

A collaborative healthcare framework for shared healthcare plan with ambient intelligence.
Hum. centric Comput. Inf. Sci., 2020

Immersing citizens and things into smart cities: a social machine-based and data artifact-driven approach.
Computing, 2020

A BBR-based congestion control for delay-sensitive real-time applications.
Computing, 2020

Towards a Quality-of-Thing based approach for assigning things to federations.
Clust. Comput., 2020

A decentralized lightweight blockchain-based authentication mechanism for IoT systems.
Clust. Comput., 2020

DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning.
Comput. J., 2020

Thingsourcing to Enable IoT Collaboration.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Blockchain and Smart Healthcare Security: A Survey.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020

OWL-T for a Semantic Description of IoT.
Proceedings of the New Trends in Databases and Information Systems, 2020

2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019

Remote health monitoring of elderly through wearable sensors.
Multim. Tools Appl., 2019

A Mechanism for Securing IoT-enabled Applications at the Fog Layer.
J. Sens. Actuator Networks, 2019

A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT.
J. Parallel Distributed Comput., 2019

Open challenges in vetting the internet-of-things.
Internet Technol. Lett., 2019

A location-sensitive and network-aware broker for recommending Web services.
Computing, 2019

Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning.
Comput. J., 2019

Towards a Resource-aware Thing Composition Approach.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

2018
Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications.
Sustain. Comput. Informatics Syst., 2018

Security policy monitoring of BPMN-based service compositions.
J. Softw. Evol. Process., 2018

Cloud vs edge: Who serves the Internet-of-Things better?
Internet Technol. Lett., 2018

Thing Federation as a Service: Foundations and Demonstration.
Proceedings of the Model and Data Engineering - 8th International Conference, 2018

2017
An energy-aware service composition algorithm for multiple cloud-based IoT applications.
J. Netw. Comput. Appl., 2017

2015
An energy efficient management scheme for wireless sensor networks.
Int. J. Crit. Comput. Based Syst., 2015

2014
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

An event processing approach for threats monitoring of service compositions.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

A Sensor Relocation Scheme for Wireless Sensor Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Self-organization and management of wireless sensor networks.
PhD thesis, 2010

A self-managing fault management mechanism for wireless sensor networks
CoRR, 2010


  Loading...