Saif Ur Rehman Malik

Orcid: 0000-0001-8195-1630

According to our database1, Saif Ur Rehman Malik authored at least 65 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning.
Future Gener. Comput. Syst., December, 2023

SecurePrivChain: A decentralized framework for securing the global model using cryptography.
Future Gener. Comput. Syst., May, 2023

Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain.
IEEE Internet Things J., 2023

2022
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing.
Wirel. Pers. Commun., 2022

A Novel Privacy Paradigm for Improving Serial Data Privacy.
Sensors, 2022

A strong construction of S-box using Mandelbrot set an image encryption scheme.
PeerJ Comput. Sci., 2022

(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022

Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins.
CoRR, 2022

Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599].
Comput. Secur., 2022

Probabilistic modelling of deception-based security framework using markov decision process.
Comput. Secur., 2022

Towards enhanced threat modelling and analysis using a Markov Decision Process.
Comput. Commun., 2022

Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins.
Comput. Ind., 2022

2021
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers.
IEEE Trans. Cloud Comput., 2021

EFFORT: Energy efficient framework for offload communication in mobile cloud computing.
Softw. Pract. Exp., 2021

A cache-based approach toward improved scheduling in fog computing.
Softw. Pract. Exp., 2021

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021

F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.
Sensors, 2021

Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes.
Comput. Secur., 2021

A User-Centric QoS-Aware Multi-Path Service Provisioning in Mobile Edge Computing.
IEEE Access, 2021

Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System.
IEEE Access, 2021

2020
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
Wirel. Commun. Mob. Comput., 2020

Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation.
IT Prof., 2020

WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.
Inf. Sci., 2020

FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network.
IEEE Internet Things J., 2020

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020

Moving Toward 5G: Significance, Differences, and Impact on Quality of Experience.
IEEE Consumer Electron. Mag., 2020

Application of formal methods to modelling and analysis aspects of business process reengineering.
Bus. Process. Manag. J., 2020

2019
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud.
Int. J. Distributed Sens. Networks, 2019

Convergence time analysis of OSPF routing protocol using social network metrics.
Future Gener. Comput. Syst., 2019

Data offloading in IoT environments: modeling, analysis, and verification.
EURASIP J. Wirel. Commun. Netw., 2019

An efficient privacy preserving protocol for dynamic continuous data collection.
Comput. Secur., 2019

Order preserving secure provenance scheme for distributed networks.
Comput. Secur., 2019

Anonymous and formally verified dual signature based online e-voting protocol.
Clust. Comput., 2019

2018
An efficient approach for publishing microdata for multiple sensitive attributes.
J. Supercomput., 2018

Simulator for modeling, analysis, and visualizations of thermal status in data centers.
Sustain. Comput. Informatics Syst., 2018

Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors.
Sustain. Comput. Informatics Syst., 2018

An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018

Improved Generalization for Secure Data Publishing.
IEEE Access, 2018

SLA-Aware Energy Efficient Resource Management for Cloud Environments.
IEEE Access, 2018

Calculating Completeness of Agile Scope in Scaled Agile Development.
IEEE Access, 2018

2017
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++.
IEEE Trans. Serv. Comput., 2017

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017

DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party.
IEEE Trans. Cloud Comput., 2017

Modeling and Analysis of the Thermal Properties Exhibited by Cyberphysical Data Centers.
IEEE Syst. J., 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
Mob. Networks Appl., 2017

RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
J. Sens. Actuator Networks, 2017

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
Comput. Syst. Sci. Eng., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

Identifying Deviations in Software Processes.
IEEE Access, 2017

Fog Computing Over IoT: A Secure Deployment and Formal Verification.
IEEE Access, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

2016
Formal Verification of the xDAuth Protocol.
IEEE Trans. Inf. Forensics Secur., 2016

Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

MATF: a multi-attribute trust framework for MANETs.
EURASIP J. Wirel. Commun. Netw., 2016

Performance analysis of data intensive cloud systems based on data management and replication: a survey.
Distributed Parallel Databases, 2016

2015
Dynamic task mapping for Network-on-Chip based systems.
J. Syst. Archit., 2015

2014
A taxonomy and survey on Green Data Center Networks.
Future Gener. Comput. Syst., 2014

Trends and Challenges in Cloud Datacenters.
IEEE Cloud Comput., 2014

2013
Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms.
IEEE Trans. Cloud Comput., 2013

A survey on resource allocation in high performance distributed computing systems.
Parallel Comput., 2013


  Loading...