Mian Muhammad Waseem Iqbal

Orcid: 0000-0002-3616-2621

Affiliations:
  • National University of Science and Technology, Islamabad, Pakistan


According to our database1, Mian Muhammad Waseem Iqbal authored at least 52 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2024

The reality of backdoored S-Boxes - An eye opener.
J. Inf. Secur. Appl., February, 2024

Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment.
Proceedings of the 5th International Conference on Advancements in Computational Sciences, 2024

2023
Detection of non-trivial preservable quotient spaces in S-Box(es).
Neural Comput. Appl., September, 2023

An Improved Multiexposure Image Fusion Technique.
Big Data, June, 2023

Privacy and security federated reference architecture for Internet of Things.
Frontiers Inf. Technol. Electron. Eng., 2023

From trust to truth: Advancements in mitigating the Blockchain Oracle problem.
J. Netw. Comput. Appl., 2023

Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems.
IEEE Internet Things J., 2023

2022
An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society.
Sensors, 2022

Forensic analysis of image deletion applications.
Multim. Tools Appl., 2022

ARP Overhead Reduction Framework for Software Defined Data Centers.
J. Netw. Syst. Manag., 2022

Carving of the OOXML document from volatile memory using unsupervised learning techniques.
J. Inf. Secur. Appl., 2022

CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN.
IEEE Internet Things J., 2022

A game model design using test bed for Malware analysis training.
Inf. Comput. Secur., 2022

Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022

A social qualitative trust framework for Fog computing.
Comput. Electr. Eng., 2022

FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs.
IEEE Access, 2022

2021
Forensic Analysis of Social Networking Applications on an Android Smartphone.
Wirel. Commun. Mob. Comput., 2021

On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions.
PeerJ Comput. Sci., 2021

Hand-based multibiometric systems: state-of-the-art and future challenges.
PeerJ Comput. Sci., 2021

Background subtraction in videos using LRMF and CWM algorithm.
J. Real Time Image Process., 2021

Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework.
IEEE Internet Things J., 2021

ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes.
IEEE Internet Things J., 2021

Behavioral Based Insider Threat Detection Using Deep Learning.
IEEE Access, 2021

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware.
IEEE Access, 2021

Encryption and Re-Randomization Techniques for Malware Propagation.
IEEE Access, 2021

2020
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC.
IEEE Syst. J., 2020

An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security.
IEEE Internet Things J., 2020

SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks.
IEEE Commun. Surv. Tutorials, 2020

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols.
IEEE Access, 2020

MAD-Malicious Activity Detection Framework in Federated Cloud Computing.
Proceedings of the 13th International Conference on Developments in eSystems Engineering, 2020

DTMSim-IoT: A Distributed Trust Management Simulator for IoT Networks.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm.
Proceedings of the Advances in Neuroergonomics and Cognitive Engineering, 2020

2019
CATSWoTS: Context Aware Trustworthy Social Web of Things System.
Sensors, 2019

MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems.
J. Medical Syst., 2019

AndroKit: A toolkit for forensics analysis of web browsers on android platform.
Future Gener. Comput. Syst., 2019

2018
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.
J. Supercomput., 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018

Correlation power analysis of modes of encryption in AES and its countermeasures.
Future Gener. Comput. Syst., 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.
IEEE Access, 2018

Decentralized Authentication for Secure Cloud Data Sharing.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for Pakistan.
Proceedings of the 2018 IEEE SmartWorld, 2018

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Integrated Security Model for Managing the Security Non-functional Requirements at Architectural Design of Internet-Based Systems.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

2017
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Syst., 2017

Internet of things (IoT) design considerations for developers and manufacturers.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2015
Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure.
Proceedings of the 17th International Conference on E-health Networking, 2015

Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
An Open Source Toolkit for iOS Filesystem Forensics.
Proceedings of the Advances in Digital Forensics X, 2014

2010
Attacks on Bluetooth Security Architecture and Its Countermeasures.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010


  Loading...