About

Dr. Haider Abbas is working as Professor in the Military College of Signals . Dr. Haider Abbas has a PhD in Cyber Security . Dr. Haider Abbas has published 156 research articles & conference papers having a citation count of 4881 , carried out 8 projects and filed 9 intellectual property.

Research Tags

Research Projects

8

Industry Projects

0

Amount Granted

128.8 M

Publications

156

Citations

4881

Intellectual Property

9
Publication Types
Project Types
Publications by Year
Projects by Year

Research Collaborators

Education

PhD Cyber Security 2006- 2010
Royal lnstitute of Technology , Sweden
MPhil Engineering And Management Of Information Systems 2005- 2006
Royal lnstitute of Technology , Sweden

Experience

Professor 2023- Present
Military College of Signals , NUST
Professor 2021- 2019
Military College of Signals , NUST
Associate Professor 2021- 2021
Military College of Signals , NUST
Associate Professor 2019- 2021
Military College of Signals , NUST
Associate Professor 2017- 2021
Military College of Signals , NUST
Assistant Professor 2017- 2017
Military College of Signals , NUST
Assistant Professor 2010- 2017
Military College of Signals , NUST
Assistant Professor/Head R&D 2013- 2017
King Saud University , KSA ,
Research Fellow 2012- 2013
KIng Saud University , Riyadh KSA ,
Research Assistant 2005- 2010
KTH, Sweden , Stockholm,Sweden ,
Computer Programmer /Lecturer 2003- 2005
B.Z.University , Multan, Pakistan ,

Awards

School/College Best Researcher Awards-2021 2022
Track Chair IEEE: 2021
Track Chair, The 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises 09-11 June 2021, Basque Coast - Bayonne, France
Adjunct Faculty- 2021
Adjunct Faculty, Gachon University South Korea
Editor PeerJ 2021
Associate Editor , PeerJ Computer Science (ISI-Indexed, IF 3.1)
Editor NUST J : 2020
Associate Editor , NUST Journal of Engineering Sciences
Co-Chair IEEE: 2020
Special issue Chair, The 18th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2020), June 22-25 in Calgary, Alta
ACM DS: 2020
Appointed as 1st ACM Distinguished Speaker from Pakistan by ACM - Association for Computing Machinery, United States
Member BOG NITB 2019
Member of the Board of Governors for National Information Technology Board (NITB), Headed by the President of Pakistan¿
Adjunct Faculty- 2019
Foreign Expert / Doctoral Studies Advisor , Al-Farabi Kazakh National University
Keynote Speaker: 2019
Keynote Speaker International Conference on Information & Communication Technologies 'Next Generation Technologies' 16 - 17 November 2019 IBA, Karachi, Pakistan
Workshop Chair : 2019
Workshop Chair International Workshop on Cyber Security and Digital Investigation (CSDI 2019) To be held in conjunction with 16th MobiSPC 2019 ), August 19-21, 2019 Halifax Nova Scotia, Canada
NUST Best Researcher Awrd 2019
Overall NUST University Best Researcher for 2017-2018 among all NUST constituent Colleges and Schools across Pakistan
Editor IEEE : 2019
Associate Editor, The IEEE International Conference on Biomedical and Health Informatics, IEEE BHI 2019, 19 - 22 May 2019 University of Illinois at Chicago, IL, USA
Adjunct Faculty- 2019
Graduate/ Doctoral Studies Advisor , Manchester Metropolitan University
Keynote Speaker: 2018
Keynote Speaker at International Conference on Computer Science and Allied Technologies, Lahore Garrison University, December 2018, Pakistan
Keynote Speaker IEEE: 2018
Keynote Speaker , IEEE International Symposium on Artificial Intelligence and Robotics 2018 (ISAIR2018), November 17-19, 2018, Nanyang, China
Track Chair IEEE: 2018
Track Chair, SSTM, The 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2018), Paris, France
Appreciation Plaque: 2018
Plaque of Appreciation for Cyber Security Training Qatar National Commission for Education, Culture and Science, 2018
Cyber Sec. Panelist 2018
Cyber Security Distinguished Panelist at Launch Conference of Institute of Advanced Studies, Islamabad National University, 2018 at Prime Minister House , Islamabad
Invited Speaker : 2018
Invited Speaker/Resource Person 8th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2018), Doha, Qatar
PCST Award 2018
Research Productivity Award from Pakistan Council for Science and Technology (PCST) 2017
MCS BR Award 2017
MCS- NUST Best Researcher Award
IET Fellow - 2017
Awarded one of the youngest Fellow of The Institution of Engineering and Technology (IET) UK
Appreciation Plaque: 2017
Plaque of Appreciation for Information Security Training from Al-Farabi Kazakh National University, Kazakhstan, 2017
Track Chair IEEE: 2017
Track Chair, The 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2017), Poland
BCS Fellow: 2017
Awarded the Grade of Fellow from The British Computer Society , UK
IST Fellow: 2017
Awarded the Grade of Fellow from The Institute of Science & Technology, UK
Editor IEEE : 2017
Full-Time Associate Technical Editor, IEEE Communications Magazine (Jan 2017 to Dec 2020)( (ISI-Indexed, IF 11.05)
Editor Elsevier : 2017
Full-Time Associate Editor, Journal of Network and Computer Applications (Elsevier) (ISI-Indexed, IF 5.5)
Adjunct Faculty 2016
Graduate Faculty/ Member Advisory Board for Doctoral and Graduate Studies, Florida Institute of Technology (FIT), USA
Co-Chair IEEE: 2016
Track Chair, 17th International Conference on E-health Networking, Application & Services (HealthCom 2016), Munich, Germany
Co-Chair IEEE: 2016
Co-Chair, IEEE International Workshop on Big Data Analytics for Smart and connected Health, 2016, Washington DC, USA
Invited Speaker: 2016
Invited Speaker/ Academic Expert, 6th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2016), Rabat, Morocco
SMIEEE- 2016
Elected to the Grade of Senior Member form Institute of Electrical and Electronics Engineers (SMIEEE), USA
Editor Springer: 2016
Full-Time Associate Editor, Cluster Computing (Springer) (ISI-Indexed, IF 3.4)
Appreciation Plaque: 2015
Plaque of Appreciation for Cyber Security Training from the Training Centre for Islamic Countries (SESRIC), 2015, Ankara, Turkey
Co-Chair IEEE: 2015
Track Chair, International Conference on Information Technology- New Generations, 2015 Las Vegas, USA
Co-Chair IEEE: 2015
Track Chair, The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Belfort, France
Invited Speaker: 2015
Invited Speaker/ Academic Expert, 5th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2015), Ankara, Turkey
Panellist Cyber Security 2015
Expert Panel list 6th Cyber Security Summit, (2015), Riyadh, Saudi Arabia
Invited Speaker: 2015
Invited Speaker at Microsoft Trusting Cloud Workshop (2015), Riyadh, KSA
Editor : 2015
Full-Time Associate Editor, Ad Hoc & Sensor Wireless Networks (ISI-Indexed, IF 0.9)
Appreciation Plaque: 2014
Plaque of Appreciation for Information Security Training from Tanzania Commission for Science & Technology (COSTECH), 2014, Tanzania
Keynote Speaker : 2014
Key Note Speaker at 3rd International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2014), Nabeul, Tunisia
CyberPatriot- 2014
CyberPatriot from NG, US Air force Association, USA
Editor IEEE : 2014
Full-Time Associate Editor, IEEE Access (ISI-Indexed, IF 4.0)
Editor : 2014
Full-Time Associate Editor, KSII Transactions on Internet and Information Systems (ISI-Indexed, IF 0.6)
Appreciation Plaque: 2013
Plaque of Appreciation for Cyber Security Training from Higher Institute of Technological Studies (ISET), 2013, Nabeul, Tunisia
Co-Chair IEEE: 2012
Co-Chair, IEEE Eastern European Regional Conference on the Engineering of Computer-Based Systems (2012), Serbia
Keynote Speaker: 2012
Key Note Speaker AT 2nd COMSATS-ISESCO International Workshop on Internet Security: Enhancing Information Exchange Safeguards, (2012) Jordan
Appreciation Plaque: 2012
Plaque of Appreciation from Royal Scientific Society (RSS), 2012, Amman, Jordan
Editor Springer: 2012
Full-Time Associate Editor, Electronic Commerce Research (Springer) (ISI-Indexed, IF 2.7) (From June 2012 to June 2019)
Appreciation Plaque: 2011
Plaque of Appreciation for Cyber Security Training from Higher Institute for Applied Sciences and Technology (HIAST), 2011, Damascus, Syria
Invited Speaker: 2011
Invited Speaker at Workshop on Internet Security: Enhancing Information Exchange Safeguards, (2011) Damascus, Syria
Invited Speaker: 2009
Invited Speaker at 4th Annual IPID Symposium (2009), London, UK
Invited Speaker: 2009
Invited Speaker at IPID Annual workshop (2009), Orebro, Sweden
Appreciation Plaque:
Plaque of Appreciation for Cyber Security Training from Islamic Educational, Scientific and Cultural Organization (ISESCO), 2016, Rabat, Morocco
Guest Editor IEEE:
Lead Guest Editor, Feature Topic on Cyber security for Critical Infrastructure Systems, IEEE Communications Magazine (IEEE) (ISI-Indexed, IF 11.4)
Guest Editor MIAD
Guest Editor, Mobile Intelligence Assisted by Data Analytics and Cognitive Computing (MIAD), Wireless Communications and Mobile Computing {Impact factor: 1.5, ISI-EI Indexed}
Track Chair IEEE:
Track Chair, The 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2019), Capri, Italy
HEC App Suprsr :
HEC Approved Doctoral Studies Advisor
Director NCSAEL
Founder & Director, National Cyber Security Auditing and Evaluation Lab (NCSAEL), MCS NUST
Member, Association ICT:
Member, Association for Information Systems Special Interest Group on ICT and Global Development, USA
Editor IEEE:
Full-Time Associate Editor, IEEE Transactions on Information Technology in Biomedicine / IEEE Journal of Biomedical and Health Informatics (IEEE) (ISI-Indexed, IF 5.2)
Regional Editor Springer:
Regional Editor (Pakistan & Iran ), Neural Computing and Applications (Springer) (ISI-Indexed, IF 4.7)
Editor Springer:
Associate Editor, Springer Plus (Springer) (ISI-Indexed, IF 0.9) (Till January 2016)
Guest Editor Springer:
Lead Guest Editor, Special Issue on Security and Privacy issues in Cloud Computing, Springer- Annals of Telecommunications (ISI-Indexed, IF 1.4)
Guest Editor Springer:
Lead Guest Editor, Special Issue on Secure Cloud Computing for Mobile Health Services in Springer Peer to Peer Networking and Applications (ISI-Indexed, IF 1.2)
Sec. Editor IEEE :
Section Editor, Security Analytics and Intelligence for Cyber Physical Systems, IEEE Access (ISI-Indexed, IF 4.0)
Guest Editor Springer:
Guest Editor, Special Issue "Smart e-Commerce Integration with Recommender Systems", Electronic Markets (ISI-Indexed, IF 2.8)
Guest Editor Elsevier:
Guest Editor, Special Issue on Cognitive Internet of Things Assisted by Cloud Computing and Big Data, Future Generation Computer Systems (Elsevier) {Impact factor: 6.1, ISI-EI Indexed}
Workshop Chair, IEEE
Workshop Chair, IEEE International Wireless Communications & Mobile Computing Conference (IWCMC 2019) , June 24 — 28, 2019, Tangier, Morocco
Poster Chair IEEE:
Poster/Demo Chair, The 17th IEEE Int’l Conference on Dependable, Autonomic and Secure Computing (DASC 2019) August 5-8, 2019, Fukuoka, Japan
Invited Speaker:
Invited Speaker/ Academic Expert, 4th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' Dar-es-Salaam, Tanzania
University Best Reseacher Award -2022

Memberships

8
Research Projects
0
Industrial Projects
8
National Projects
0
International Projects
128.8M
Total Funding (PKR)
PAK-UK Education Gateway Mobility Partnership Grant For Faculty 2023
Project Status: Approved_inprocess Rs: 2.8 M Approval Date: 2023-03-15 Completion Date: N/A
Funding Agency: British Council
AI STP- Web Appl Security Evaluation and Health Informatics 2022
Project Status: Approved_inprocess Rs: 15.1 M Approval Date: 2022-02-15 Completion Date: N/A
Funding Agency: Army
Al Empowered Anomaly Detection System and MITRE Att@ck Mapping 2020
Project Status: Completed Rs: 2.4 M Approval Date: 2020-12-22 Completion Date: N/A
Funding Agency: National Center in Big Data and Cloud Computing (NCBC)
Rethinking cybersecurity in Pakistan: Human factirs' Essential Role (ReCyP:HER)
Project Status: Approved_inprocess Rs: 19.6 M Approval Date: N/A Completion Date: N/A
Funding Agency: European Union
NetXploit - The Smart Pentester 2019
Project Status: Completed Rs: 15.0 M Approval Date: 2019-09-24 Completion Date: 2019-11-04
Funding Agency: Islamic Development Bank
Temper resistant database log update via blockchain 2019
Project Status: Completed Rs: 0.3 M Approval Date: 2019-01-23 Completion Date: 2020-05-07
Funding Agency: Higher Education Commission
Traffic Accident Prediction Model using Deep Learning and Machine Learning Algorithms 2019
Project Status: Completed Rs: 0.5 M Approval Date: 2019-01-23 Completion Date: 2020-05-07
Funding Agency: HEC
NATIONAL CYBER SECURITY AUDITING AND EVALUATION LAB (NCSAEL) 2018
Project Status: Approved_inprocess Rs: 73.2 M Approval Date: 2018-06-13 Completion Date: N/A
Funding Agency: HEC
102
Research Articles
46
Conference Proceedings
0
Books
0
Book Chapters
30
Editorial Activities
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks 2024
RA
Raja Zeeshan Haider
BA
Baber Aslam
ZA
Zafar Iqbal (Air University)
Journal: International Journal of Information Security, Volume 23, Issue 4, Pages 2531-2545
Impact Factor: 2.400 Citations: 2 Quartile: 2
SDG 9
Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks 2018
GH
Ghada A. Al-Mashaqbeh (The Hashemite University)
JA
Jamal N. Al-Karaki (Abu Dhabi Polytechnic University)
MO
Mohammad Al-Rousan (Jordan University of Science and Technology)
AS
Asad Raza (Abu Dhabi Polytechnic University)
MA
Maruf Pasha (Bahauddin Zakariya University)
Journal: Ad Hoc & Sensor Wireless Networks, NULL
Impact Factor: 0.948 Citations: 0 Quartile: 4
Mobile Intelligence Assisted by Data Analytics and Cognitive Computing 2018
YI
Yin Zhang (Zhongnan University of Economics and Law)
HU
Huimin Lu (Kyushu Institute of Technology)
Journal: Wireless Communications and Mobile Computing, NULL
Impact Factor: 1.396 Citations: 0 Quartile: 3
A Framework to Estimate the Nutritional Value of Food in Real Time Using Deep Learning Techniques 2018
RA
RAZA YUNUS (-)
HI
HIRA NOOR BOKHAR (-)
SY
SYEDA TAZEEN HAIDER (-)
NA
NAUMAN ZAFAR (-)
RA
RAHEEL NAWAZ (Manchester Metropolitan University)
Journal: IEEE Access, Volume 7, Pages 2643-2652
Impact Factor: 4.098 Citations: 89 Quartile: 1
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis 2018
Journal: Journal of Network and Computer Applications, NULL
Impact Factor: 5.273 Citations: 18 Quartile: 1
CrossRec: Cross-Domain Recommendations Based on Social Big Data and Cognitive Computing 2018
YI
Yin Zhang (Zhongnan University of Economics and Law)
XI
Xiao Ma (Zhongnan University of Economics and Law)
SH
Shaohua Wan (Zhongnan University of Economics and Law)
MO
Mohsen Guizan (University of Idaho)
Journal: Mobile Networks and Applications, NULL
Impact Factor: 2.390 Citations: 15 Quartile: 2
Information Diffusion Model Based on Social Big Data 2018
DA
Dawei Jin (Zhongnan University of Economics and Law)
XI
Xiao Ma (Zhongnan University of Economics and Law)
YI
Yin Zhang (Nanjing University)
HA
Han Yu (Zhongnan University of Economics and Law)
Journal: Mobile Networks and Applications, NULL
Impact Factor: 2.390 Citations: 15 Quartile: 2
Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach 2018
Journal: Telecommunication Systems, Volume: 70 Issue: 1 Pages: 123-140 Published: JAN 2019
Impact Factor: 1.707 Citations: 17 Quartile: 3
A Hybrid-Adaptive Neuro-Fuzzy Inference System for Multi-Objective Regression Test Suites Optimization 2018
Journal: Neural Computing and Applications, Pages 1-15
Impact Factor: 4.664 Citations: 21 Quartile: 1
Forensic Investigation to detect forgeries in ASF Files of Contemporary IP Cameras 2018
RA
Rashid Masood Khan (-)
MA
Maroof Pasha (Bahauddin Zakariya University Multan Pakistan)
Journal: The Journal of Supercomputing, Page 1–22
Impact Factor: 2.157 Citations: 0 Quartile: 2
AndroKit: A Toolkit for Forensics Analysis of Web Browsers on Android Platform 2018
MU
Muhammad Asim (-)
YI
Yin Zhang (Zhongnan University of Economics and Law (ZUEL), China)
Journal: Future Generation Computer Systems, Volume 94, Pages 781-794
Impact Factor: 5.768 Citations: 13 Quartile: 1
Correlation power analysis of modes of encryption in AES and its countermeasures 2018
SH
Shah Fahd (-)
SA
Salman Waheed (International Islamic University)
Journal: Future Generation Computer Systems, NULL
Impact Factor: 5.768 Citations: 23 Quartile: 1
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network using SDN 2021
Journal: IEEE Internet of Things Journal, Volume: 9, Issue: 14, Page(s): 11725 - 11736, 15 July 2022
Impact Factor: 9.471 Citations: 5 Quartile: 1
SDG 9
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes 2017
NA
Nazish Yaqoob (-)
AS
Asif Yaseen (The University of Queensland)
Journal: Journal of Information Science and Engineering, Volume 33, No. 6, Special Issue: SI, Pages 1433-1446
Impact Factor: 0.327 Citations: 1 Quartile: 4
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages 2020
Journal: Future Generation Computer Systems, Volume:104, Page:43-59
Impact Factor: 7.187 Citations: 10 Quartile: 1
A deep learning assisted personalized deception system for countering web application attacks 2022
SA
Saad Bin Khalid
BA
Baber Aslam
Journal: Journal of Information Security and Applications, Volume 67, Article Number 103169
Impact Factor: 3.872 Citations: 10 Quartile: 2
SDG 9
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms 2016
MU
Muhammad Yasin (-)
FA
Fahad Ahmed (-)
AN
Anam Sajid (Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology)
FA
Farrukh Aslam Khan (King Saud University)
RA
Rana Aamir Raza Ashfaq (Shenzhen University)
NU
Nur Al Hasan Haldar (King Saud University)
Journal: Journal of Intelligent & Fuzzy Systems, NULL
Impact Factor: 1.261 Citations: 2 Quartile: 3
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges 2016
AN
Anam Sajid (Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology)
Journal: Journal of Medical Systems, Volume 40, Issue 6, Article Number 155
Impact Factor: 2.456 Citations: 95 Quartile: 2
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks 2016
Journal: International Journal of Ad Hoc and Ubiquitous Computing, Volume 23, Issue 1-2, Pages 24-35, Special Issue SI
Impact Factor: 0.705 Citations: 0 Quartile: 4
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems 2016
Journal: Annals of Telecommunications, Volume 71, Issue 9-10, Pages 477-487
Impact Factor: 1.412 Citations: 10 Quartile: 3
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment 2016
Journal: Journal of Medical Systems, -
Impact Factor: 2.456 Citations: 10 Quartile: 2
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism 2015
RA
Ramsha Rizwan (National University of Computer and Emerging Sciences)
FA
Farrukh Aslam Khan (King Saud University)
S
Sajjad Hussain Chauhdary (Advance Technology R&D Center)
Journal: International Journal of Distributed Sensor Networks, Volume 11, Issue 10, Pages 1-17
Impact Factor: 0.906 Citations: 23 Quartile: 3
Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings 2024
Journal: IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 8, Issue 2
Impact Factor: 5.3 Citations: 8 Quartile: 2
SDG 9
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata 2013
AD
Adeela Waqar (-)
AS
Asad Raza (Majan University College)
MU
Muhammad Khurram Khan (King Saud University)
Journal: Journal of Network and Computer Applications, Volume 36, Issue 1, Pages 235-248
Impact Factor: 1.772 Citations: 62 Quartile: 1
Flow Constraint Language for Coordination by Exogenous Connectors 2019
Journal: IEEE Access, Volume 7, Pages 138341-138352
Impact Factor: 3.745 Citations: 5 Quartile: 1
Approximate computing using frequency upscaling 2019
JU
Junqi Huang (University of Nottingham)
T.
T. Nandha Kumar (University of Nottingham)
FA
Fabrizio Lombardi (Northeastern University)
Journal: IET Circuits Devices & Systems , Volume 13, Issue 7, Pages 1018-1026
Impact Factor: 1.290 Citations: 8 Quartile: 4
Trust models of internet of smart things: A survey, open issues, and future directions 2019
AY
Ayesha Altaf (-)
FA
Faiza Iqbal (University of Lahore)
AB
Abdelouahid Derhab (King Saud University)
Journal: Journal of Network and Computer Applications, Volume 137, Pages 93-111
Impact Factor: 5.570 Citations: 92 Quartile: 1
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices − A Review 2019
TA
Tahreem Yaqoob (-)
MO
Mohammed Atiquzzaman (University of Oklahoma)
Journal: IEEE Communications Surveys and Tutorials, Volume 21, Issue 4, Pages 3723-3768
Impact Factor: 23.700 Citations: 198 Quartile: 1
Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy 2019
Journal: IEEE Access, Volume 7, Pages 10718-10733
Impact Factor: 3.745 Citations: 2 Quartile: 1
CATSWoTS: Context Aware Trustworthy Social Web of Things System 2019
Journal: Sensors, Volume: 19, Issue: 14, Article Number: 3076,
Impact Factor: 3.275 Citations: 15 Quartile: 1
Framework for Calculating Return on Security Investment (ROSI) for Security Oriented Organizations 2019
TA
Tahreem Yaqoob (-)
AZ
Azka Arshad (-)
Journal: Future Generation Computer Systems, Volume 95, Pages 754-763
Impact Factor: 6.125 Citations: 21 Quartile: 1
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems 2019
Journal: Journal of Medical Systems, Volume 43, Issue 11, Article Number 324
Impact Factor: 3.058 Citations: 21 Quartile: 1
Smart e-commerce integration with recommender systems 2019
YI
Yin Zhang (Zhongnan University of Economics and Law)
YI
Yi Sun (Beijing University of Posts and Communications)
Journal: Electronic Markets, Volume 29, Issue 2, Pages 219-220
Impact Factor: 2.981 Citations: 24 Quartile: 2
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations 2019
G
Guanglou Zheng (Edith Cowan University)
W
Wencheng Yang (Edith Cowan University)
C
Craig Valli (Edith Cowan University)
R
Rajan Shankaran (Macquarie University)
G
Guanghe Zhang (Jiangxi Normal University)
G
Gengfa Fang (University of Technology Sydney)
JU
Junaid Chaudhry (Embry-Riddle Aeronautical University)
LI
Li Qiao (University of New South Wales)
Journal: IEEE Access, Volume 7,Pages 75629 - 75641
Impact Factor: 3.745 Citations: 11 Quartile: 1
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks 2020
MU
Muhammad Imran (Pakistan Institute of Engineering and Applied Sciences)
MU
Muhammad Hanif Durad (Pakistan Institute of Engineering and Applied Sciences)
FA
Farrukh Aslam Khan (King Saud University)
Journal: IEEE Systems Journal, Volume 14, Issue 2, Pages 1933 - 1944
Impact Factor: 3.931 Citations: 28 Quartile: 1
Blockchain's adoption in IoT: The challenges, and a way forward 2019
IM
Imran Makhdoom (University of Technology)
ME
Mehran Abolhasan (University of Technology)
WE
Wei Ni (Data61-CSIRO)
Journal: Journal of Network and Computer Applications, Volume 125, Pages 251-279
Impact Factor: 5.570 Citations: 411 Quartile: 1
iBike: Intelligent public bicycle services assisted by data analytics 2019
YI
YinZhang (Zhongnan University of Economics and Law)
HA
Haoyu Wen (Zhongnan University of Economics and Law)
FE
Feier Qiu (Zhongnan University of Economics and Law)
ZI
Zie Wang (Zhongnan University of Economics and Law)
Journal: Future Generation Computer Systems, Volume 95, Pages 187-197
Impact Factor: 6.125 Citations: 26 Quartile: 1
Fog computing in internet of things: Practical applications and future directions 2019
RI
Rida Zojaj Naeem (-)
SA
Saman Bashir (-)
Journal: Peer-to-Peer Networking and Applications, Volume 12, pages 1236–1262
Impact Factor: 2.793 Citations: 38 Quartile: 2
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC 2019
Journal: IEEE Systems Journal , -
Impact Factor: 3.987 Citations: 0 Quartile: 1
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis 2019
AN
Anam Mehtab (-)
TA
Tahreem Yaqoob (-)
MA
Malik Najmus Saqib (University of Jeddah)
Journal: Mobile Networks and Applications, Pages 1-13
Impact Factor: 2.602 Citations: 42 Quartile: 2
Accelerated Dynamic MRI Using Kernel-Based Low Rank Constraint 2019
JI
Jiafu Wan (South China University of TechnologyGuangzhouChina)
RA
Raheel Nawaz (Manchester Metropolitan UniversityManchesterUK)
Journal: Journal of Medical Systems, Volume 43, Pages 1-11
Impact Factor: 3.058 Citations: 8 Quartile: 1
Auto-MeDiSine: an auto-tunable medical decision support engine using an automated class outlier detection method and AutoMLP 2020
MA
Maham Jahangir
ME
Mehreen Ahmed
RA
Raheel Nawaz (Manchester Metropolitan University)
Journal: Neural Computing and Applications, Volume:32, Issue:7, Page:2621-2633
Impact Factor: 5.606 Citations: 11 Quartile: 1
SDG 9
Addressing dynamic issues in information security management 2011
CH
Christer Magnusson (Stockholm University)
LO
Louise Yngstrom (Stockholm University)
AH
Ahmed Hemani (KTH Royal Institute of Technology)
Journal: Information Management & Computer Security, Volume 19, No. 1, Pages 5-24
Impact Factor: 0 Citations: 21 Quartile: N/A
SDG 9
Fuzziness based semi-supervised learning approach for intrusion detection system 2017
XI
Xizhao Wang (Shenzhen University)
JO
Joshua Zhexue Huang (Shenzhen University)
YU
Yu-Lin He (Shenzhen University)
RA
Rana Aamir Raza Ashfaq (Shenzhen University)
Journal: Information Sciences, Volume 378, Pages 484-497
Impact Factor: 4.305 Citations: 477 Quartile: 1
SDG 4
Edge Computing in IoT-Based Manufacturing 2018
BA
Baotong Chen (South China University of Technology)
JI
Jiafu Wan (South China University of Technology)
AN
Antonio Celesti (University of Messina)
DI
Di Li (South China University of Technology)
QI
Qin Zhang (South China University of Technology)
Journal: IEEE Communications Magazine, Volume 56, Issue 9, Pages 103-109
Impact Factor: 10.356 Citations: 291 Quartile: 1
Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication 2021
AQ
Aqsa Rashid
YI
Yin Zhang (Zhongnan University of Economics and Law)
Journal: IEEE Network, Volume:35, Issue:5, Page:220-225
Impact Factor: 10.294 Citations: 25 Quartile: 1
Algebraic Side Channel Attack on Trivium and Grain Ciphers 2017
AS
ASIF RAZA KAZMI (-)
XI
XIAODONG YANG (Xidian University)
Journal: IEEE Access, Volume 5, Pages 23958-23968
Impact Factor: 3.557 Citations: 14 Quartile: 1
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems 2017
NU
Nur Al Hasan Haldar (King Saud University)
FA
Farrukh Aslam Khan (King Saud University)
AF
Aftab Ali (King Saud University)
Journal: Neurocomputing, NULL
Impact Factor: 3.241 Citations: 66 Quartile: 1
Secure semantic search using deep learning in a blockchain-assisted multi-user setting 2024
SH
Shahzad Khan
MU
Muhammad Binsawad (King Abdul Aziz University )
Journal: Journal of Cloud Computing, Volume 13, Issue 1, Article Number: 29
Impact Factor: 3.700 Citations: 0 Quartile: 2
SDG 9
Security and privacy issues in cloud computing 2017
OL
Olaf Maennel (Tallinn University of Technology)
SA
Saïd Assar (Télécom École de Management)
Journal: Annals of Telecommunications, Volume: 72, Issue: 5-6, Pages: 233-235
Impact Factor: 1.168 Citations: 27 Quartile: 4
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons 2021
SY
Syed Wasif Abbas Hamdani (-)
AB
Abdul Rehman Janjua (-)
JA
Jahanzaib Malik (-)
MA
Malik Hamza Murtaza (-)
MO
Mohammed Atiquzzaman (University of Oklahoma)
Journal: ACM Computing Surveys, Volume 54, Issue 3, Article Number 57
Impact Factor: 14.324 Citations: 24 Quartile: 1
AdS : An Adaptive Spectrum Sensing Technique for Survivability under Jamming Attack in Cognitive Radio Networks 2021
AB
Abdul B. Subhani (Centex Technologies)
Journal: Computer Communications, Volume 172, Pages 25-34
Impact Factor: 5.047 Citations: 10 Quartile: 1
An Edge Computing Node Deployment Method Based on Improved k-Means Clustering Algorithm for Smart Manufacturing 2021
CH
Chun Jiang (South China University of Technology)
JI
Jiafu Wan (South China University of Technology)
Journal: IEEE Systems Journal, Volume 15, Issue 2, Pages 2230-2240
Impact Factor: 4.802 Citations: 49 Quartile: 2
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes 2021
BI
Bilal Rauf (-)
PA
Pan Deng (Beihang University)
JI
Jiafu Wan (South China University of Technology)
Journal: IEEE Internet of Things Journal, Volume 8, Issue 12, Pages 9622-9633
Impact Factor: 10.238 Citations: 65 Quartile: 1
Robust, Secure, and Adaptive Trust-Oriented Service Selection in IoT-Based Smart Buildings 2021
A
Ayesha Altaf (-)
FA
Faiza Iqbal (University of Lahore)
MA
Mahmoud Daneshmand (Stevens Institute of Technology)
Journal: IEEE Internet of Things Journal, Volume 8, Issue 9, Pages 7497-7509
Impact Factor: 10.238 Citations: 23 Quartile: 1
Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework 2021
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
Journal: IEEE Internet of Things Journal, Volume 8, Issue 8, Pages 6359-6371
Impact Factor: 10.238 Citations: 9 Quartile: 1
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art 2018
MU
Muhammad Yaseen
ME
Mehmet A. Orgun (Macquarie University)
KA
Kashif Saleem (King Saud University)
JA
Jalal Al- Muhtadi (King Saud University)
A
Abdelouhid Derhab (King Saud University)
Journal: Telematics and Informatics, Volume:35, Issue:4, Page:702-726
Impact Factor: 5.273 Citations: 19 Quartile: 1
Security Assessment and Evaluation of VPNs: A Comprehensive Survey 2023
NA
Naina Emmanuel
TA
Tahreem Yaqoob
MU
Muhammad Atiquzzaman (University of Oklahoma)
ZA
Zafar Iqbal
AL
Ali Tanveer
UM
Umer Ashfaq
Journal: ACM Computing Surveys, Volume 55, Issue 13s
Impact Factor: 14.324 Citations: 18 Quartile: 1
SDG 9
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling 2022
SA
Saad Bin Khalid
BA
Baber Aslam
Journal: Journal of Network and Computer Applications, Volume 198, Article Number 103270
Impact Factor: 8.7 Citations: 43 Quartile: 1
SDG 9
Hand-based Multibiometric Systems: State-of-the-Art and Future Challenges 2021
AN
Anum Aftab
FA
Farrukh Aslam Khan (King Saud University)
MU
Muhammad Khurram Khan (King Saud University)
Journal: PeerJ Computer Science, Volume 7, Article Number e707
Impact Factor: 2.411 Citations: 15 Quartile: 2
SDG 9
PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes 2022
Journal: IEEE Sensors, Volume 22, Issue 18, Pages 17677-17690
Impact Factor: 3.301 Citations: 32 Quartile: 2
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks 2021
AY
Ayesha Altaf
FA
Faiza Iqbal (University of Lahore)
TE
Tehsin Kanwal (COMSATS University Islamabad)
Journal: Journal of Systems Architecture, Volume:115, Article Number: 102028
Impact Factor: 5.836 Citations: 28 Quartile: 1
DST-HRS: A topic driven hybrid recommender system based on deep semantics 2020
Journal: Computer Communications, Volume 156, Pages 183-191
Impact Factor: 3.167 Citations: 23 Quartile: 2
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations 2021
AQ
Aqsa Rashid (-)
Journal: Future Generation Computer Systems, Volume 117, Pages 245-258
Impact Factor: 7.307 Citations: 3 Quartile: 1
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis 2018
IJ
Ijaz Ahmad (-)
AS
Asad Raza (-)
KI
Kim-Kwang Raymond Choo ( University of South Australia)
AN
Anam Sajid (Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST))
MA
Maruf Pasha ( Bahauddin Zakariya University)
F
Farrukh Aslam Khan (King Saud University)
Journal: Australian Journal of Forensic Sciences, Volume 50, Issue 2, Pages 183-208
Impact Factor: 1.522 Citations: 1 Quartile: 3
Textual analysis of traitor-based dataset through semi supervised machine learning 2021
Journal: Future Generation Computer Systems, Volume 125, Pages 652-660
Impact Factor: 7.307 Citations: 17 Quartile: 1
SDG 4
Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks 2014
FA
Faisal Bashir Hussain (Bahria University)
Journal: International Journal of Distributed Sensor Networks, Volume 2014, Article ID 979086, 12 pages
Impact Factor: 0.665 Citations: 7 Quartile: 4
A survey on Common Criteria (CC) evaluating schemes for security assessment of IT products 2021
ME
Mehreen Fatima
TA
Tahreem Yaqoob
ZA
Zarmeen Ahmad
RA
Raja Zeeshan
Z
Zia Muhammad
SH
Shynar Mussiraliyeva (Al-Farabi Kazakh National University)
Journal: PeerJ Computer Science, Volume 7, Article Number e701
Impact Factor: 2.411 Citations: 12 Quartile: 2
SDG 9
Forensic analysis of image deletion applications 2022
Journal: Multimedia Tools and Applications, Pages 1-28
Impact Factor: 2.757 Citations: 1 Quartile: 2
SDG 9
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins 2024
SY
Syed Imran Akhtar
IF
Ifra Batool (National University of Computer and Emerging Sciences)
Journal: Journal of Cloud Computing, Volume 13, Article Number: 132
Impact Factor: 3.700 Citations: 0 Quartile: 2
SDG 4
A framework to predict early news popularity using deep temporal propagation patterns 2022
RA
Ramsha Saeed
SA
Sara Asif
SH
Shynar Mussiraliyeva (Al-Farabi, Kazakh National University)
Journal: Expert Systems with Applications, Volume 195, Article Number 116496
Impact Factor: 6.954 Citations: 7 Quartile: 1
SDG 9
Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint 2022
RU
Ruhma Tahir (University of Essex)
MU
Muttukrishnan Rajarajan (University of London)
Journal: Electronics, Volume 11(5), Article Number 818
Impact Factor: 2.397 Citations: 0 Quartile: 3
SDG 9
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu 2022
RA
Ramsha Saeed
MA
Maheen Fatima
Journal: ACM Transactions on Asian and Low-Resource Language Information Processing, Volume 21, Issue 1, Article Number 6, Pages 1-19
Impact Factor: 1.413 Citations: 3 Quartile: 4
Enriching Non-negative Matrix Factorization with Contextual Embeddings for Recommender Systems 2020
Journal: Neurocomputing, Volume: 380, Pages: 246-258
Impact Factor: 5.719 Citations: 48 Quartile: 1
ENCVIDC: an innovative approach for encoded video content classification 2022
FA
Faiqa Amjad
TA
Tahreem Yaqoob
Journal: Neural Computing and Applications, Pages 1-18
Impact Factor: 6.0 Citations: 4 Quartile: 2
SDG 9
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android 2017
FA
Farrukh Aslam Khan (-)
UM
Umar Manzoor (King Abdulaziz University)
AZ
Azhar Khan (-)
AF
Aftab Ali (-)
MA
Maruf Pasha (Bahauddin Zakariya University)
Journal: Journal of Information Science and Engineering, Volume: 33, Issue: 6, Special Issue: SI, Pages:1417-1432
Impact Factor: 0.327 Citations: 0 Quartile: 4
Cognitive computing for intelligent application and service 2020
YI
Yin Zhang (University of Electronic Science and Technology of China)
YU
Yujie Li (Yangzhou University)
Journal: Neural Computing & Applications, Volume 32, Pages 4315-4316
Impact Factor: 5.606 Citations: 3 Quartile: 1
USB Storage Device Forensics for Windows 10 2018
Journal: Journal of Forensic Sciences, Volume 63, Issue 3, Pages 657-983
Impact Factor: 1.438 Citations: 4 Quartile: 3
Context-oriented trust computation model for industrial Internet of Things 2021
AY
Ayesha Altaf (-)
FA
Faiza Iqbal (University of Lahore)
FA
Farrukh AslamKh (King Saud University)
AB
Abdelouahid Derhab (King Saud University)
Journal: Computers & Electrical Engineering, Volume 92, Article Number 107123
Impact Factor: 4.152 Citations: 15 Quartile: 2
A Survey of Authentication Schemes in Telecare Medicine Information Systems 2017
MU
Muhammad Umair Aslam (-)
AB
Abdelouahid Derhab (King Saud University)
KA
Kashif Saleem (King Saud University)
ME
Mehmet Orgun (Macquarie University)
BA
Baber Aslam (-)
Journal: Journal of Medical Systems, Vol.41:14, Pages 1-26
Impact Factor: 2.098 Citations: 37 Quartile: 2
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications 2013
SA
Sarah Irum (-)
AF
Aftab Ali (-)
FA
Farrukh Aslam Khan (-)
Journal: International Journal of Distributed Sensor Networks, NULL
Impact Factor: 0.923 Citations: 35 Quartile: 3
Identifying an OpenID anti-phishing scheme for cyberspace 2016
MO
Moeen Qaemi Mahmoodzadeh (-)
FA
Farrukh Aslam Khan (King Saud University)
MA
Maruf Pasha (Bahauddin Zakariya University)
Journal: Security and Communication Networks, NULL
Impact Factor: 1.067 Citations: 7 Quartile: 4
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges 2016
AN
Anam Sajid (Shaheed Zulfikar Ali Bhutto Institute of Science and Technology)
KA
Kashif Saleem (King Saud University)
Journal: IEEE Access, NULL
Impact Factor: 3.244 Citations: 354 Quartile: 1
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network 2015
Journal: Mobile Information Systems, NULL
Impact Factor: 1.462 Citations: 20 Quartile: 2
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions 2018
MU
Muneeb Ahmed Sahi (-)
KA
Kashif Saleem (King Saud University)
XI
Xiaodong Yang (Xidian University)
AB
Abdelouahid Derhab (King Saud University)
ME
Mehmet A. Orgun (Macquarie University)
AS
Asif Yaseen (The University of Queensland)
Journal: IEEE Access, Volume:6, Page:464-478
Impact Factor: 4.098 Citations: 131 Quartile: 1
Antenna and Propagation Considerations for Amateur UAV Monitoring 2018
NA
Nan Zhao ( Xidian University)
XI
Xiaodong Yang ( Xidian University)
AI
Aifeng Ren ( Xidian University)
Z
Zhiya Zhang ( Xidian University)
WE
Wei Zhao ( Xidian University)
FA
Fangming Hu ( Xidian University)
MA
Masood Ur Rehman ( University of Bedfordshire)
ME
Mehran Abolhasan ( University of Technology Sydney)
Journal: IEEE Access, NULL
Impact Factor: 4.098 Citations: 16 Quartile: 1
A complex event processing framework for an adaptive language learning system 2018
DA
Dawei Jin (Zhongnan University of Economics and Law)
S
Si Shi (Huazhong University of Science and Technology)
YI
Yin Zhang (Zhongnan University of Economics and Law)
G
Guolin Pan (China University of Geosciences)
Journal: Future Generation Computer Systems, NULL
Impact Factor: 5.768 Citations: 14 Quartile: 1
A framework to address inconstant user requirements in cloud SLAs management 2014
WA
Waleed Halboob (King Saud University)
MU
Muhammad Khurram Khan (King Saud University)
FA
Farrukh Aslam Khan (King Saud University)
MA
Maruf Pasha (Bahauddin Zakariya University)
Journal: Cluster Computing-The Journal of Networks Software Tools and Applications, Volume 18, Issue 1, Pages 123-133
Impact Factor: 1.510 Citations: 10 Quartile: 1
A framework for cloud forensics evidence collection and analysis using security information and event management 2016
MU
Muhammad Irfan (-)
YU
Yunchuan Sun ( Beijing Normal University)
AN
Anam Sajid (Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology)
MA
Maruf Pasha (Bahauddin Zakariya University)
Journal: Security and Communication Networks, NULL
Impact Factor: 1.067 Citations: 23 Quartile: 4
A unified framework for automated inspection of handheld safety critical devices in production assemblies 2018
MU
Muhammad Asim Rehmat (University of Engineering and Technology)
MU
Muhammad Shahbaz (University of Engineering and Technology)
AS
Asad Raza ( Abu dhabi poly technic (institute of applied technology))
Journal: Future Generation Computer Systems, NULL
Impact Factor: 5.768 Citations: 4 Quartile: 1
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks 2017
FA
Farrukh Aslam Khan (King Saud University)
MU
Muhammad Imran (National University of Computer and Emerging Sciences)
MU
Muhammad Hanif Durad (Pakistan Institute of Engineering and Applied Sciences)
Journal: Future Generation Computer Systems, NULL
Impact Factor: 4.639 Citations: 40 Quartile: 1
User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications 2021
HU
Huimin Lu (Kyushu Institute of Technology)
YI
Yin Zhang (University of Electronic Science and Technology of China)
YU
Yujie Li (Yangzhou University)
CH
Chi Jiang (Zhongnan University of Economics and Law)
Journal: IEEE Transactions on Intelligent Transportation Systems, Volume 22, Issue 6, Pages 3521-3532
Impact Factor: 9.551 Citations: 183 Quartile: 1
A Manufacturing Big Data Solution for Active Preventive Maintenance 2017
JI
Jiafu Wan (South China University of Technology)
SH
Shenglong Tang (South China University of Technology)
DI
Di Li (South China University of Technology)
SH
Shiyong Wang (South China University of Technology)
CH
Chengliang Liu ( Shanghai Jiao Tong University)
AT
Athanasios V. Vasilakos (Lulea University of Technology)
Journal: IEEE Transactions on Industrial Informatics, NULL
Impact Factor: 5.430 Citations: 381 Quartile: 1
Adaptive Interference Cancellation of ECG Signals 2017
AI
Aifeng Ren (Xidian University)
ZH
Zhenxing Du (Xidian University)
JU
Juan Li (Xidian University)
FA
Fangming Hu (Xidian University)
XI
Xiaodong Yang (Xidian University)
Journal: Sensors, NULL
Impact Factor: 2.475 Citations: 24 Quartile: 2
SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks 2020
Journal: IEEE Communications Surveys & Tutorials, Volume 22, Issue 2, Pages 1337-1371
Impact Factor: 25.249 Citations: 177 Quartile: 1
Efficient Attribute Based Encryption with Repeated Attributes Optimization 2020
HU
Hui Li (Xidian University)
YI
Yinghui Zhang (Xi’an University of Posts and Telecommunications)
TA
Tahreem Yaqoob (-)
Journal: International Journal of Information Security, 1-14
Impact Factor: 1.988 Citations: 3 Quartile: 2
Analytical study of hardware-rooted security standards and their implementation techniques in mobile 2020
NA
Naveeda Ashraf (-)
AS
Ashraf Masood (-)
RA
Rabia Latif (Prince Sultan University)
Journal: Telecommunication Systems , Volume 74, Pages 379-403
Impact Factor: 2.314 Citations: 3 Quartile: 3
Multi-task reading for intelligent legal services 2020
YU
Yujie Li (Yangzhou University)
GA
Gang Hu (Zhongnan University of Economics and Law)
JI
Jinyang Du (Zhongnan University of Economics and Law)
YI
Yin Zhang (University of Electronic Science and Technology of China)
Journal: Future Generation Computer Systems, Volume 113, Pages 218-227
Impact Factor: 7.187 Citations: 1 Quartile: 1
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols 2020
AN
Anum Sajjad (-)
RA
Rabia Latif (Prince Sultan University)
R
Rana Aamir Raza (Bahauddin Zakariya University)
Journal: IEEE Access, Volume 8, Pages 139903-139917
Impact Factor: 3.367 Citations: 8 Quartile: 2
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security 2020
ME
Mehmood Daneshmand (Stevens Institute of Technology)
Journal: IEEE Internet of Things Journal, Volume 7, Issue 10, Pages 10250-10276
Impact Factor: 9.471 Citations: 310 Quartile: 1
A name disambiguation module for intelligent robotic consultant in industrial internet of things 2020
XI
Xiao Ma (Zhongnan University of Economics and Law)
RA
Ranran Wang (Zhongnan University of Economics and Law)
YI
Yin Zhang (University of Electronic Science and Technology of China)
CH
Chi Jiang (Zhongnan University of Economics and Law)
Journal: Mechanical Systems and Signal Processing, Volume 136, Article Number 106413
Impact Factor: 6.823 Citations: 9 Quartile: 1
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices 2020
TA
Tahreem Yaqoob (-)
Journal: IEEE Journal of Biomedical and Health Informatics, Volume: 24 , Issue: 6 , Pages 1752-1761
Impact Factor: 5.772 Citations: 19 Quartile: 1
A Malware Evasion Technique for Auditing Android Anti-Malware Solutions
SA
Samrah Mirza
MA
Mariagrazia Fugini (Politecnico di Milano)
ZA
Zafar Iqbal
ZI
Zia Muhammad
Conference: 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Citations: 11
SDG 9
A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network
RI
Rizwan Ahmed Shaikh
MU
Muhammad Sohaib Khan
FA
Farrukh Naeem
MU
Muhammad Haroon Siddiqi
Conference: 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)
Citations: N/A
SDG 9
C2-DNSWatch: Endpoint Framework for Detecting Command and Control (C2) Connection of Advanced Persistent Threats (APTs)
RA
Raja Zeeshan Haider
BA
Baber Aslam
ZA
Zafar Iqbal (Air University)
Conference: The 13th IEEE International Conference on Communications, Circuits and Systems
Citations: N/A
NLP and ML Synergy: A Novel Approach in Botnet Detection from Sandbox Artifacts
MU
Muhammad Qasim
MU
Muhammad Salman (Macquarie University)
JE
JENS MYRUP PEDERSEN (Aalborg University)
Conference: 2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS)
Citations: N/A
Incorporating Blockchain into Role Engineering: A Reference Architecture Using ISO/IEC/IEEE 42010 Notation
Conference: 17th International Conference on Information Technology–New Generations (ITNG 2020)
Citations: N/A
The Implementation of Encryption Algorithms in MQTT Protocol for IoT Constrained devices
Conference: 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022
Citations: N/A
Is Blockchain Overrated?
AS
Asif Raza Kazmi
AB
Abdul Rauf
Conference: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC)
Citations: N/A
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware
ZI
Zia Muhammad
ZA
Zafar Iqbal
AN
Anique Azhar
AH
Ahsan Yasin
HA
Hasan Iesar
Conference: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC)
Citations: N/A
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization
Conference: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC)
Citations: N/A
Vulnerability Assessment of Pakistan Government Websites
Conference: 2021 International Conference on Communication Technologies (ComTech)
Citations: N/A
Seismic Analysis for Large Span Tunnel Cross Section in Badaling Underground High-Speed Railway Station
PE
Peng Li (Tsinghua University)
ER
Erxiang Song (Tsinghua University)
LO
Longqi Yan (Tsinghua University)
JU
Jun Yang (Tsinghua University)
Conference: 10th Asian Rock Mechanics Symposium
Citations: N/A
Security, Safety and Trust Management (SSTM'17)
EU
Eugenio Orlandi (The Hagues)
FA
Farrukh Aslam Khan (King Saud University)
OL
Oliver Popov (Stockholm University)
Conference: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Citations: N/A
Simulation-based evaluation of frequency upscaled operation of exact/approximate ripple carry adders
H.
H. Junqi (The University of Nottingham)
T.
T. Nandha Kumar (The University of Nottingham)
FA
Fabrizio Lombardi ( Northeastern University)
Conference: 2017 IEEE Int. Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2017
Citations: N/A
Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards
Conference: 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress
Citations: N/A
Profiling vulnerabilities threatening dual persona in android framework
Conference: 2019 International Conference on Advances in the Emerging Computing Technologies (AECT)
Citations: N/A
Fabric fault classification using neural trees
M.
M. Abdulhady (Ele&onic Research Institute)
S.
S. Nassar (Ele&onic Research Institute)
M.
M. Abdulhady (Ele&onic Research Institute)
S.
S. Nassar (Ele&onic Research Institute)
Conference: IEEE International Conference on Systems, Man and Cybernetics
Citations: N/A
Survey on cybersecurity issues in wireless mesh networks based eHealthcare
KA
Kashif Saleem (King Saud University)
KH
Khan Zeb (King Saud University)
AB
Abdelouhid Derhab (King Saud University)
JA
Jalal Al-Muhtadi (King Saud University)
ME
Mehmet A. Orgun (Macquarie University)
AM
Amjad Gawanmeh (Concordia University)
KA
Kashif Saleem (King Saud University)
KH
Khan Zeb (King Saud University)
AB
Abdelouhid Derhab (King Saud University)
JA
Jalal Al-Muhtadi (King Saud University)
ME
Mehmet A. Orgun (Macquarie University)
AM
Amjad Gawanmeh (Concordia University)
Conference: IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
Citations: N/A
Context Based Trust Formation Using Direct User-Experience in the Internet of Things (IoT)
AY
Ayesha Altaf (-)
FA
Faiza Iqbal (University of Lahore)
AY
Ayesha Altaf (-)
FA
Faiza Iqbal (University of Lahore)
Conference: 11th IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
Citations: N/A
Framework for Calculating Applications’ Authenticity using Free Tools
KA
Kashif Saleem (King Saud University)
RI
Rida Zojaj Naeem (-)
RI
Rida Zojaj Naeem (-)
Conference: 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC)
Citations: N/A
A Framework to Determine Applications’ Authenticity
RI
Rida Zojaj Naeem (-)
KA
Kashif Saleem (King Saud University)
Conference: The 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC)
Citations: N/A
Forensic Analysis of LinkedIn?s Desktop Application on Windows 10 OS
SA
Saman Bashir (-)
KA
Kashif Saleem (King Saud University)
Conference: 16th International Conference on Information Technology-New Generations (ITNG 2019)
Citations: N/A
Security Evaluation of IT Products: Bridging the Gap between Common Criteria (CC) and Real Option Thinking
LO
Louise Yngström (KTH Royal Institute of Technology)
AH
Ahmed Hemani (KTH Royal Institute of Technology)
Conference: e World Congress on Engineering and Computer Science 2008
Citations: N/A
Anticipating dormant functionality in malware: A semantics based approach
MU
Muzzamil Noor (-)
Conference: 2013 International Symposium on Biometrics and Security Technologies
Citations: N/A
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
NA
Natasha Arjumand Shoaib Mirza (-)
FA
Farrukh Aslam Khan (King Saud University)
JA
Jalal Al Muhtadi (King Saud University)
Conference: 2014 International Symposium on Biometrics and Security Technologies (ISBAST)
Citations: N/A
Analyzing feasibility for deploying very fast decision tree for DDoS attack detection in cloud-assisted WBAN
SA
Saïd Assar (Institut Mines-Télécom)
Conference: 10th International Conference, ICIC 2014
Citations: 13
Detection and prevention of black hole attacks in mobile ad hoc Networks
FA
Farrukh Aslam Khan (-)
MO
Mohsin Iftikhar (King Saud University)
Conference: ADHOC-NOW 2014 International Workshops
Citations: N/A
Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing
WA
Waleed Halboob (King Saud University)
KA
Kamel Haouam (King Saud University)
AS
Asif Yaseen (University of Queensland)
Conference: Intelligent Computing Methodologies 10th International Conference, ICIC 2014
Citations: N/A
Option based evaluation: Security evaluation of IT products based on options theory
LO
Louise Yngström (Stockholm University)
AH
Ahmed Hemani (Royal Institute of Technology)
Conference: 2009 First IEEE Eastern European Conference on the Engineering of Computer Based Systems
Citations: N/A
Increasing the Performance of Crab Linux Router Simulation Package Using XEN
ST
Stefan Sundkvist (Royal Institute of Technology)
Conference: First International Conference on Industrial and Information Systems
Citations: N/A
Adaptability infrastructure for bridging IT security evaluation and options theory
LO
Louise Yngström (Stockholm University)
AH
Ahmed Hemani (Royal Institute of Technology)
Conference: Proceedings of the 2nd international conference on Security of information and networks
Citations: N/A
User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment
AD
Adeela Waqar (-)
AS
Asad Raza (-)
Conference: 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Citations: N/A
Securing Internet Information Services (IIS) configuration files
SA
Saneeha Khalid (-)
MA
MarufPasha (Bahauddin Zakariya University)
AS
Asad Raza (Majan University College)
Conference: 2012 International Conference for Internet Technology and Secured Transactions
Citations: N/A
WLAN Location Privacy: A Client Server Based Architecture
MU
Muhammad Junaid Khan (-)
Conference: 2013 10th International Conference on Information Technology: New Generations
Citations: N/A
A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks
ZE
Zeshan Aslam Khan (International Islamic University)
ED
Edison Pignaton de Freitas (Halmstad University)
TO
Tony Larsson (Halmstad University)
Conference: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Citations: N/A
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks
AM
Amna Saeed (-)
AS
Asad Raza (Majan University College)
Conference: 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
Citations: N/A
A Cloud-based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks
FA
Farrukh Aslam Khan (National University of Computer and Emerging Sciences)
AF
Aftab Ali (National University of Computer and Emerging Sciences)
NU
Nur Al Hasan Haldar (-)
Conference: 9th International Conference on Future Networks and Communications
Citations: N/A
Data Warehousing Based Computer Forensics Investigation Framework
WA
Waleed Halboob (King Saud University)
RA
Ramlan Mahmod (Universiti Putra Malaysia)
MU
Muhammad Abulaish (King Saud University)
KA
Kashif Saleem (King Saud University)
Conference: 2015 12th International Conference on Information Technology - New Generations
Citations: N/A
Feasibility Analysis for Incorporating/Deploying SIEM for Forensics Evidence Collection in Cloud Environment
Conference: 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)
Citations: N/A
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform
KA
Kashif Saleem (King Saud University)
JA
Jalal Al-Muhtadi (King Saud University)
ME
Mehmet A. Orgun (Macquarie University)
RA
Rajan Shankaran (Macquarie University)
GU
Guanglou Zheng (Macquarie University)
Conference: 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops)
Citations: N/A
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan
Conference: 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom)
Citations: N/A
Internet of things (IoT) design considerations for developers and manufacturers
Conference: 2017 IEEE International Conference on Communications Workshops (ICC Workshops)
Citations: N/A
Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware
AN
Anum Javaid (-)
MA
Mariagrazia Fugini (Politecnico di Milano)
Conference: IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) held from 27-29 June 2018 in France
Citations: N/A
Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity
Conference: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
Citations: N/A
A Structured approach for Internalizing Externalities Caused by IT Security Mechanisms
CH
Christer Magnusson (Stockholm University)
LO
Louise Yngström (Stockholm University)
AH
Ahmed Hemani (Royal Institute of Technology)
Conference: 2010 Second International Workshop on Education Technology and Computer Science
Citations: N/A
Feasibility analysis for deploying a centralized information exchange infrastructure in Pakistan
FA
Faraz Hameed1 (Stockholm University)
MA
Maruf Pasha (Bahauddin Zakariya University)
LO
Louise Yngström (Stockholm University)
Conference: Proc. SIG Globdev 5th Annual Conference
Citations: N/A
Internet of Things (IoT) Design Considerations for Developers and Manufacturers
Conference: ICC2017: WT04-5thIEEE International Workshop on Smart Communication Protocols and Algorithms
Citations: N/A
2022
Editor in Chief of Journal
Impact Factor: 0
2022
Editor in Chief of Journal
Impact Factor: 3.2
2022
Editor in Chief of Journal
Impact Factor: 7.5
2022
Editor in Chief of Journal
Impact Factor: 5.2
2022
Editor in Chief of Journal
Impact Factor: 13.4
2021
Editor in Chief of Journal
Impact Factor: 6.9
2021
Editor in Chief of Journal
Impact Factor: 5.7
2021
Editor in Chief of Journal
Impact Factor: 10.5
2021
Editor in Chief of Journal
Impact Factor: 13.4
IEEE Journal of Biomedical and Health Informatics 2020
Editor in Chief of Journal
Impact Factor: 7.021
2021
Editor in Chief of Journal
Impact Factor: 3.2
2021
Editor in Chief of Journal
Impact Factor: 5.3
2018
Edited Journal Issue / Proceeding / Book
Impact Factor: 0.948
2018
Edited Journal Issue / Proceeding / Book
Impact Factor: 4.098
2018
Edited Journal Issue / Proceeding / Book
Impact Factor: 1.851
2018
Edited Journal Issue / Proceeding / Book
Impact Factor: 5.273
2020
Edited Journal Issue / Proceeding / Book
Impact Factor: 11.4
2018
Editor in Chief of Journal
Impact Factor: 4.217
2018
Editor in Chief of Journal
Impact Factor: 4.664
2016
Edited Journal Issue / Proceeding / Book
Impact Factor: 1.5
2017
Edited Journal Issue / Proceeding / Book
Impact Factor: 1.1
2016
Edited Journal Issue / Proceeding / Book
Impact Factor: 0.7
2015
Edited Journal Issue / Proceeding / Book
Impact Factor: 0.7
2016
Edited Journal Issue / Proceeding / Book
Impact Factor: 1.5
2016
Edited Journal Issue / Proceeding / Book
Impact Factor: 3.6
2016
Edited Journal Issue / Proceeding / Book
Impact Factor: 2.3
2017
Edited Journal Issue / Proceeding / Book
Impact Factor: 3.9
2018
Edited Journal Issue / Proceeding / Book
Impact Factor: 10.3
2017
Editor in Chief of Journal
Impact Factor: 3.8
2020
Editor in Chief of Journal
Impact Factor: 4.7
9
Copyrights
0
Patents
0
Industrial Designs
0
Trademarks
Pasbaan 2022
AH
Ahsan Yasin
AB
Abeer Islam ( Military College of Signals (MCS) )
Status: Licensed Granted Filed Approval Date: 18-Nov-2022
MOBIHAWK 2022
Status: Granted Filed Approval Date: 18-Nov-2022
WebGuard 2022
MU
Muhammad Ehsan ul Haq ( Military College of Signals (MCS) )
SY
Syed Ali Saif Kazmi ( Military College of Signals (MCS) )
MU
Muhammad Usman Khan
Status: Licensed Granted Filed Approval Date: 18-Nov-2022
SVPN - Secure Virtual Private Network 2022
Status: Granted Filed Approval Date: 18-Nov-2022
FEAST- Firmware Extraction and Security Assessment TOOL 2022
Status: Granted Filed Approval Date: 18-Nov-2022
Secure-Virtual Private Network (SVPN) 2022
SY
Syed Ali Saif Kazmi ( Military College of Signals (MCS) )
SH
Shumail Waseem Abbasi ( Military College of Signals (MCS) )
US
Usman Arshad
Status: Licensed Approval Date: 30-Aug-2022
SPOT: Source Protect Obfuscator Tool 2022
AB
Abdul Hannan ( Military College of Signals (MCS) )
Status: Licensed Granted Filed Approval Date: 16-Jun-2022
WEBSAT: Web Application Security Assessment Toolkit 2021
Status: Filed Approval Date: 01-Jan-2021
WOSCoT- Windows operating System Security Compliance Toolkit 2020
No training records found for this faculty member
0
Total Supervisions
0
PhD Supervisions
0
MS Supervisions
Loading...

Loading PhD supervisions...

Loading...

Loading MS supervisions...