About

Dr. Mian Muhammad Waseem Iqbal is working as Associate Professor in the Military College of Signals . Dr. Mian Muhammad Waseem Iqbal has a PhD in Information Security . Dr. Mian Muhammad Waseem Iqbal has published 76 research articles & conference papers having a citation count of 1360 , carried out 12 projects and filed 1 intellectual property.

Research Tags

Computer Forensics Cyber Security

Research Projects

12

Industry Projects

0

Amount Granted

2.1 M

Publications

76

Citations

1360

Intellectual Property

1
Publication Types
Project Types
Publications by Year
Projects by Year

Research Collaborators

Education

PhD Information Security 2017- 2021
NUST, Islamabad , Pakistan
MS Information Security 2008- 2012
NUST, Islamabad , Pakistan
B.Sc (Hon) Computer Science 2004- 2008
BSE, Karachi , pakistan (Duplicate)

Experience

Associate Professor 2024- Present
Military College of Signals , NUST
Associate Professor 2024- 2024
Military College of Signals , NUST
Associate Professor 2023- 2024
Military College of Signals , NUST
Associate Professor 2022- 2023
Military College of Signals , NUST
Assistant Professor 2021- 2015
Military College of Signals , NUST
Assistant Professor 2015- 2022
Military College of Signals , NUST
Lecturer 2012- 2021
Military College of Signals , NUST

Awards

Invited Speaker 2017
Invited Speaker for 7th International Conference on Internet Security: Enhancing Information Exchange Safeguards, Almaty, Kazakhstan 19-23 Dec 2017
University Best Teacher 2016
Awarded Over All University Best Teacher
Scholarship 2008
Awarded Merit Based Scholarship throughout Bachelors Degree - Computer Science Department, University of Peshawar

Memberships

12
Research Projects
0
Industrial Projects
12
National Projects
0
International Projects
2.1M
Total Funding (PKR)
Suspicious Speech Tracking Using Machine Learning 2020
Project Status: Completed Rs: 0.0 M Approval Date: 2020-05-14 Completion Date: 2021-12-31
Funding Agency: Ignite - National Technology Fund
Suspicious Speech Tracking Using Machine Learning 2021
Project Status: Completed Rs: 0 M Approval Date: 2021-06-30 Completion Date: 2021-12-31
Funding Agency: IGNITE
Cryptographic Algorithm Design and Analysis Differential Cryptanalysis of SPN in the field of Cyber Security 2021
Project Status: Approved_inprocess Rs: 0.2 M Approval Date: 2021-08-23 Completion Date: N/A
Funding Agency: NESCOM
Cryptographic Algorithm Design and Analysis Liner Cryptanalysis of SPN in the field of Cyber Security 2021
Project Status: Approved_inprocess Rs: 0.1 M Approval Date: 2021-08-23 Completion Date: N/A
Funding Agency: NESCOM
Smart Secure USB 2020
Project Status: Completed Rs: 0.1 M Approval Date: 2020-08-04 Completion Date: 2020-11-05
Funding Agency: IGNITE
Hardware Cyber Threat and Analysis 2017
Project Status: Completed Rs: 0.3 M Approval Date: 2017-12-11 Completion Date: 2019-10-18
Funding Agency: NESCOM
CAART Configuration Assessment and Remediation Toolkit in the field of Information / Cyber Security 2021
Project Status: Approved_inprocess Rs: 0.2 M Approval Date: 2021-08-23 Completion Date: N/A
Funding Agency: NESCOM
Evalutation of Vulnerability Scanner 2020
Project Status: Completed Rs: 0.2 M Approval Date: 2020-02-20 Completion Date: 2021-02-17
Funding Agency: NESCOM
Smart Street Light System 2019
Project Status: Completed Rs: 0.0 M Approval Date: 2019-09-24 Completion Date: 2019-11-04
Funding Agency: IGNITE
Smart Secure USB-SSU128 2020
Project Status: Completed Rs: 0.4 M Approval Date: 2020-02-20 Completion Date: 2021-02-17
Funding Agency: NESCOM
ICT Hardware based Cyber Threat Analysis 2017
Project Status: Completed Rs: 0.1 M Approval Date: 2017-02-13 Completion Date: 2019-01-30
Funding Agency: NESCOM
Hardware Cyber Threat Analysis 2017
Project Status: Approved_inprocess Rs: 0.3 M Approval Date: 2017-12-11 Completion Date: N/A
Funding Agency: NESCOM
52
Research Articles
21
Conference Proceedings
0
Books
0
Book Chapters
6
Editorial Activities
CATcAFSMs: Context-based adaptive trust calculation for attack detection in fog computing based smart medical systems 2024
AL
Alishba Nawaz
AY
Ayesha Altaf (UET Lahore)
AB
Abrar Almjally (Imam Mohammad Ibn Saud Islamic University)
HA
Hatoon AlSagri, (Imam Mohammad Ibn Saud Islamic University)
BA
Bayan Alabdullah (Princess Nourah bint Abdulrahman University)
Journal: Expert Systems, Pages 1-20
Impact Factor: 3.000 Citations: 0 Quartile: 2
SDG 9
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems 2024
KH
Khwaja Mansoor
SH
Shynar Zhenisbekovna (Al-Farabi Kazkhstan University)
AB
Abdellah Chehri (Royal Military College of Canada)
Journal: Internet of Things, Volume:27, Article Number: 101228
Impact Factor: 6.0 Citations: 19 Quartile: 1
SDG 3
Forensic Investigation to detect forgeries in ASF Files of Contemporary IP Cameras 2018
RA
Rashid Masood Khan (-)
MA
Maroof Pasha (Bahauddin Zakariya University Multan Pakistan)
Journal: The Journal of Supercomputing, Page 1–22
Impact Factor: 2.157 Citations: 0 Quartile: 2
AndroKit: A Toolkit for Forensics Analysis of Web Browsers on Android Platform 2018
MU
Muhammad Asim (-)
YI
Yin Zhang (Zhongnan University of Economics and Law (ZUEL), China)
Journal: Future Generation Computer Systems, Volume 94, Pages 781-794
Impact Factor: 5.768 Citations: 13 Quartile: 1
Correlation power analysis of modes of encryption in AES and its countermeasures 2018
SH
Shah Fahd (-)
SA
Salman Waheed (International Islamic University)
Journal: Future Generation Computer Systems, NULL
Impact Factor: 5.768 Citations: 23 Quartile: 1
CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network using SDN 2021
Journal: IEEE Internet of Things Journal, Volume: 9, Issue: 14, Page(s): 11725 - 11736, 15 July 2022
Impact Factor: 9.471 Citations: 5 Quartile: 1
SDG 9
Privacy and security federated reference architecture for Internet of Things 2023
MU
Musab Kamal
IJ
Ijaz Ahmad (Majan University College)
Journal: Frontiers of Information Technology & Electronic Engineering, Volume 24, Pages 481-508
Impact Factor: 2.545 Citations: 10 Quartile: 2
SDG 9
Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings 2024
Journal: IEEE Transactions on Emerging Topics in Computational Intelligence, Volume 8, Issue 2
Impact Factor: 5.3 Citations: 8 Quartile: 2
SDG 9
Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems 2023
AI
Aiman Almas
AY
Ayesha Altaf (UET Lahore)
KA
Kashif Saleem (King Saud University)
SH
Shynar Mussiraliyeva (Al-Farabi Kazakh National University)
MU
Muhammad Wajahat Iqbal
Journal: IEEE Internet of Things Journal, Early Access
Impact Factor: 10.238 Citations: 18 Quartile: 1
SDG 9
PRIDA-ME: A Privacy-Preserving, Interoperable and Decentralized Authentication Scheme for Metaverse Environment 2025
AB
Abdellah Chehri (Royal Military College of Canada)
ME
Mehmood Ul Hassan
Journal: IEEE Open Journal of the Communications Society, Volume: 6, Pages 493-515
Impact Factor: 6.300 Citations: 2 Quartile: 1
SDG 9
Reliability through an optimal SDS controller’s placement in a SDDC and smart city 2024
SH
Shynar Mussiraliyeva (Al-Farabi Kazakh National University)
SA
Saddaf Rubab (Sharjah University)
Journal: Cluster Computing, Pages: 22
Impact Factor: 4.4 Citations: 0 Quartile: 1
SDG 8 SDG 9 SDG 11
CATSWoTS: Context Aware Trustworthy Social Web of Things System 2019
Journal: Sensors, Volume: 19, Issue: 14, Article Number: 3076,
Impact Factor: 3.275 Citations: 15 Quartile: 1
Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web 2019
Journal: Forensic Science International, Volume 299, Pages 59-73
Impact Factor: 2.108 Citations: 41 Quartile: 1
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems 2019
Journal: Journal of Medical Systems, Volume 43, Issue 11, Article Number 324
Impact Factor: 3.058 Citations: 21 Quartile: 1
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC 2019
Journal: IEEE Systems Journal , -
Impact Factor: 3.987 Citations: 0 Quartile: 1
ARP Overhead Reduction Framework for Software Defned Data Centers 2022
Journal: Journal of Network and Systems Management, Volume 30, Article Number 50
Impact Factor: 2.026 Citations: 4 Quartile: 3
SDG 9
Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size 2023
FI
Firdous Kausar (Sultan Qaboos University)
MO
Mostefa Mesbah (Sultan Qaboos University)
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
IK
Ikram Sayyed (Gachon University)
Journal: Mobile Networks and Applications , Pages 1-11
Impact Factor: 3.8 Citations: 4 Quartile: 2
SDG 9
The reality of backdoored S-Boxes—An eye opener 2024
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
IJ
Ijaz Khalid (Quaid-i-Azam University)
Journal: Journal of Information Security and Applications, Volume 80, Article Number 103674
Impact Factor: 5.6 Citations: 5 Quartile: 2
SDG 9
A game model design using test bed for Malware analysis training 2022
Journal: Information and Computer Security, Volume 23, Issue 1, Pages 1-18
Impact Factor: N/A Citations: 1 Quartile: N/A
SDG 9
Background subtraction in videos using LRMF and CWM algorithm 2021
WA
Wajhia Munir (-)
NA
Nazish Zulfiqar (-)
AW
Awais Ahmad (Air University)
Journal: Journal of Real-Time Image Processing, Pages 1-12
Impact Factor: 2.293 Citations: 6 Quartile: 3
An improved hybrid model for cardiovascular disease detection using machine learning in IoT 2023
AR
Arsalan Naseer
MU
Muhammad Muheet Khan
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
IJ
Ijaz Ahmad (University of Oulu)
Journal: Expert Systems, Pages 1-19
Impact Factor: 3.3 Citations: 5 Quartile: 2
SDG 3
A novel trust management model for edge computing 2021
RA
Rabia Latif (Prince Sultan University)
MA
Malik Uzair Ahmed
AW
Awais Ahmad (Air University)
Journal: Complex & Intelligent Systems, Pages 1-17
Impact Factor: 4.927 Citations: 11 Quartile: 2
SDG 9
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes 2021
BI
Bilal Rauf (-)
PA
Pan Deng (Beihang University)
JI
Jiafu Wan (South China University of Technology)
Journal: IEEE Internet of Things Journal, Volume 8, Issue 12, Pages 9622-9633
Impact Factor: 10.238 Citations: 65 Quartile: 1
Enhanced Metamorphic Techniques-A Case Study Against Havex Malware 2021
ZA
Zainab Mumtaz (-)
WA
Waqas Aman (Sultan Qaboos University)
Journal: IEEE Access, Volume 9, Pages 112069-112080
Impact Factor: 3.476 Citations: 6 Quartile: 2
Forensic Analysis of Social Networking Applications on an Android Smartphone 2021
AN
Anoshia Manahil (-)
MO
Mohsin Iftikhar (Charles Stuart University)
KH
Khwaja Mansoor (Air University)
Journal: Wireless Communications and Mobile Computing, Volume 2021, Article ID 5567592, 36 pages
Impact Factor: 2.146 Citations: 23 Quartile: 3
Enterprise Integration Patterns in SDN: A Reliable, Fault-Tolerant Communication Framework 2021
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
AB
Abdul Waheed (National University of Computer and Emerging Sciences)
Journal: IEEE Internet of Things Journal, Volume 8, Issue 8, Pages 6359-6371
Impact Factor: 10.238 Citations: 9 Quartile: 1
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art 2018
MU
Muhammad Yaseen
ME
Mehmet A. Orgun (Macquarie University)
KA
Kashif Saleem (King Saud University)
JA
Jalal Al- Muhtadi (King Saud University)
A
Abdelouhid Derhab (King Saud University)
Journal: Telematics and Informatics, Volume:35, Issue:4, Page:702-726
Impact Factor: 5.273 Citations: 19 Quartile: 1
Carving of the OOXML document from volatile memory using unsupervised learning techniques 2022
Journal: Journal of Information Security and Applications , Volume 65, Article Number 103096
Impact Factor: 3.872 Citations: 7 Quartile: 2
Encryption and Re-Randomization Techniques for Malware Propagation 2021
AH
Ahsan Rasheed Abbasi
SH
Shynar Mussiraliyeva (Al-Farabi Kazakh National University)
A
Awais Ur Rehman (University of South Asia)
Journal: IEEE Access, Volume 9, Pages 132522-132532
Impact Factor: 3.367 Citations: 2 Quartile: 2
SDG 9
Offensive Language Detection for Low Resource Language Using Deep Sequence Model 2024
AN
Anas Ali Khan
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
Journal: IEEE Transactions on Computational Social Systems, Volume 11, Issue 4, Pages 5210-5218
Impact Factor: 4.500 Citations: 5 Quartile: 1
SDG 9
Hand-based Multibiometric Systems: State-of-the-Art and Future Challenges 2021
AN
Anum Aftab
FA
Farrukh Aslam Khan (King Saud University)
MU
Muhammad Khurram Khan (King Saud University)
Journal: PeerJ Computer Science, Volume 7, Article Number e707
Impact Factor: 2.411 Citations: 15 Quartile: 2
SDG 9
An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society 2022
SH
Shahzad Khan
AB
Abdul Waheed (Northern University)
GU
Gulzar Mehmoo (IQRA National University)
SH
Shawal Khan (COMSATS University Islamabad)
MA
Mahdi Zareei (School of Engineering and Sciences)
RA
Rajesh Roshan Biswal (School of Engineering and Sciences)
Journal: Sensors, Volume 22(1), Article Number 336
Impact Factor: 3.576 Citations: 16 Quartile: 1
SDG 9
Behavioral Based Insider Threat Detection Using Deep Learning 2021
RA
Rabia Latif (Prince Sultan University)
RI
Rida Nasir
Journal: IEEE Access, Volume 9, Pages 143266-143274
Impact Factor: 3.367 Citations: 65 Quartile: 2
SDG 9
PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes 2022
Journal: IEEE Sensors, Volume 22, Issue 18, Pages 17677-17690
Impact Factor: 3.301 Citations: 32 Quartile: 2
Demographical Based Sentiment Analysis for Detection of Hate Speech Tweets for Low Resource Language
Kamal Safdar
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
Journal: ACM Transactions on Asian and Low-Resource Language Information Processing,
Impact Factor: 2.0 Citations: 0 Quartile: 4
SDG 9
Forensic analysis of image deletion applications 2022
Journal: Multimedia Tools and Applications, Pages 1-28
Impact Factor: 2.757 Citations: 1 Quartile: 2
SDG 9
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs 2022
ZE
Zeeshan Zulkifl
A
Abdul Rehman
S
Saqib Saeed (Imam Abdulrahman Bin Faisal University)
A
Abdullah M. Almuhaideb (Imam Abdulrahman Bin Faisal University)
Journal: IEEE Access, Volume 10, Pages 15644-15656
Impact Factor: 3.367 Citations: 63 Quartile: 2
SDG 3 SDG 9
BSLPSDN: Base station location privacy via software-defined networking (SDN) in wireless sensor networks 2023
SA
Saddaf Rubab (University of Sharjah)
AB
Abdul Waheed Khan (Pak-Austria Fachhochschule Institute of Applied Sciences and Technology)
WA
Waqas Aman (Sultan Qaboos University)
Journal: International Journal of Communication Systems, Volume: 36, Issue: 17, Articel Number: e5601 Pages: 25
Impact Factor: 2.1 Citations: 1 Quartile: 3
SDG 9
From trust to truth: Advancements in mitigating the Blockchain Oracle problem 2023
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
AS
Asad Raza (New Gersey Institute of Technology)
Journal: Journal of Network and Computer Applications, Volume 217, Article Number 103672
Impact Factor: 8.7 Citations: 28 Quartile: 1
SDG 9
Detection of non-trivial preservable quotient spaces in S-Box(es) 2023
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
Journal: Neural Computing and Applications, Pages 1-13
Impact Factor: 6.0 Citations: 0 Quartile: 2
SDG 9
An Improved Multiexposure Image Fusion Technique 2023
NA
Nazish Zulfiqar
AW
Awais Ahmad (Imam Mohammad Ibn Saud Islamic University)
WA
Wajiha Munir
Journal: Big Data, Pages 1-10
Impact Factor: 4.426 Citations: 1 Quartile: 1
SDG 4
Identity-based attack detection using received signal strength in MIMO systems 2023
RA
Raees Ahmad Sher
AH
Ahmad Cheema (Lakehead University)
IK
Ikram Sayyed (Gachon University)
J
Jaehyuk Choi (Gachon University)
Journal: AEU - International Journal of Electronics and Communications, Volume 168, Article Number 154709
Impact Factor: 3.169 Citations: 1 Quartile: 2
SDG 9
A social qualitative trust framework for Fog computing 2022
MA
Mahnoor Hamza
AW
Awais Ahmad (Air University)
MU
Muhammad Babar (Allama Iqbal Open University)
Journal: Computers & Electrical Engineering, Volume 102, Article Number 108195
Impact Factor: 4.3 Citations: 7 Quartile: 2
SLF-ADM: Securing Linux frontiers: Advanced persistent threat (APT) detection using machine learning 2025
DA
Dawood Al Abri (Sultan Qaboos University)
YA
Yawar Abbas (Sunway University)
S
S Sohaib Karim
Journal: Neural Computing and Applications, Pages 1-20
Impact Factor: N/A Citations: 0 Quartile: N/A
SDG 9
USB Storage Device Forensics for Windows 10 2018
Journal: Journal of Forensic Sciences, Volume 63, Issue 3, Pages 657-983
Impact Factor: 1.438 Citations: 4 Quartile: 3
On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions 2021
Journal: PeerJ Computer Science, Volume 7, Article Number e507
Impact Factor: 2.411 Citations: 62 Quartile: 2
A Survey of Authentication Schemes in Telecare Medicine Information Systems 2017
MU
Muhammad Umair Aslam (-)
AB
Abdelouahid Derhab (King Saud University)
KA
Kashif Saleem (King Saud University)
ME
Mehmet Orgun (Macquarie University)
BA
Baber Aslam (-)
Journal: Journal of Medical Systems, Vol.41:14, Pages 1-26
Impact Factor: 2.098 Citations: 37 Quartile: 2
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions 2018
MU
Muneeb Ahmed Sahi (-)
KA
Kashif Saleem (King Saud University)
XI
Xiaodong Yang (Xidian University)
AB
Abdelouahid Derhab (King Saud University)
ME
Mehmet A. Orgun (Macquarie University)
AS
Asif Yaseen (The University of Queensland)
Journal: IEEE Access, Volume:6, Page:464-478
Impact Factor: 4.098 Citations: 131 Quartile: 1
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment 2018
MU
Muhammad Babar (-)
FA
FAZLULLAH KHAN (Abdul Wali Khan University)
AB
ABID YAHYA (Botswana International University of Science and Technology)
ZH
ZHIYUAN TAN (Edinburgh Napier University)
J
JOSEPH M. CHUMA (Botswana International University of Science and Technology)
Journal: IEEE Access, NULL
Impact Factor: 4.098 Citations: 26 Quartile: 1
SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks 2020
Journal: IEEE Communications Surveys & Tutorials, Volume 22, Issue 2, Pages 1337-1371
Impact Factor: 25.249 Citations: 177 Quartile: 1
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols 2020
AN
Anum Sajjad (-)
RA
Rabia Latif (Prince Sultan University)
R
Rana Aamir Raza (Bahauddin Zakariya University)
Journal: IEEE Access, Volume 8, Pages 139903-139917
Impact Factor: 3.367 Citations: 8 Quartile: 2
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security 2020
ME
Mehmood Daneshmand (Stevens Institute of Technology)
Journal: IEEE Internet of Things Journal, Volume 7, Issue 10, Pages 10250-10276
Impact Factor: 9.471 Citations: 310 Quartile: 1
Leveraging Cryptographic Primitives of Blockchain for Trust in Smart Systems
HA
Hafiz Asif Khalil
MU
Muhammad Atif Khalil
Conference: The International Conference on Computing Research (ICCoR 2024)
Citations: N/A
SDG 9
Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment
Conference: 5th International Conference on Advancements in Computational Sciences (ICACS)
Citations: N/A
Big Data-An evolving concern for forensic investigators
Conference: 2015 1st International Conference on Anti-Cybercrime, ICACC 2015
Citations: N/A
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
AT
Atiya Hai (University of Surrey)
Conference: 15th International Symposium on Foundations & Practice of Security (FPS – 2022)
Citations: N/A
Smart Secure USB SSU-256
MU
Muhammad Ehsan ul Haq
ZE
Zeeshan Ali
MU
Muhammad Taimoor Ali
RU
Ruqiya Fazal
Conference: ICGS3 2021 : 13th International Conference on Global Security, Safety & Sustainability
Citations: N/A
Integrated Security Model for Managing the Security Non-functional Requirements at Architectural Design of Internet-Based Systems
MU
Muhammad Babar
SH
Shahid Azeem (National Database and Registration Authority)
Conference: 2018 International Conference on Frontiers of Information Technology (FIT)
Citations: N/A
Vulnerability Assessment of Pakistan Government Websites
Conference: 2021 International Conference on Communication Technologies (ComTech)
Citations: N/A
MAD-Malicious Activity Detection Framework in Federated Cloud Computing
AK
Akash Gerard
RA
Rabia Latif (Prince Sultan University)
TA
Tanzila Saba (Prince Sultan University)
NA
Naqash Gerard
Conference: IEEE 13th International Conference on Developments in eSystems Engineering (DeSE)
Citations: 2
DTMSim-IoT: A Distributed Trust Management Simulator for IoT Networks
SY
Syed Wasif Abbas Hamdani
AB
Abdul Waheed Khan (National University of Computer and Emerging Sciences)
Conference: 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
Citations: 2
Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
NA
Naqash Gerard (-)
AH
Ahmed Husnain (-)
AK
Akash Gerard (-)
RA
Rabia Latif (Prince Sultan University)
RA
Rabia Latif (Prince Sultan University)
Conference: 11th International Conference on Applied Human Factors and Ergonomics
Citations: N/A
Framework for Calculating Applications’ Authenticity using Free Tools
KA
Kashif Saleem (King Saud University)
RI
Rida Zojaj Naeem (-)
RI
Rida Zojaj Naeem (-)
Conference: 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC)
Citations: N/A
A Framework to Determine Applications’ Authenticity
RI
Rida Zojaj Naeem (-)
KA
Kashif Saleem (King Saud University)
Conference: The 16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC)
Citations: N/A
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
ME
Mehmood Hassan (-)
KH
Khwaja Mansoor (-)
Conference: 2019 International Conference on Applied and Engineering Mathematics (ICAEM)
Citations: N/A
Forensic Analysis of LinkedIn?s Desktop Application on Windows 10 OS
SA
Saman Bashir (-)
KA
Kashif Saleem (King Saud University)
Conference: 16th International Conference on Information Technology-New Generations (ITNG 2019)
Citations: N/A
Feasibility Analysis for Incorporating/Deploying SIEM for Forensics Evidence Collection in Cloud Environment
Conference: 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)
Citations: N/A
Internet of things (IoT) design considerations for developers and manufacturers
Conference: 2017 IEEE International Conference on Communications Workshops (ICC Workshops)
Citations: N/A
Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity
Conference: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
Citations: N/A
Analysis of Windows OS's File Carving Techniques: A Systematic Literature Review
Conference: 16th International Conference on Information Technology-New Generations (ITNG 2019)
Citations: N/A
Decentralized Authentication for Secure Cloud Data Sharing
Conference: 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2018)
Citations: N/A
A comprehensive people, process and technology (PPT) application model for Information Systems (IS) risk management in small/medium enterprises (SME),
MU
Muhammad Imran Javaid (-)
Conference: IEEE 2017 International Conference on Communication Technologies (ComTech)
Citations: N/A
Internet of Things (IoT) Design Considerations for Developers and Manufacturers
Conference: ICC2017: WT04-5thIEEE International Workshop on Smart Communication Protocols and Algorithms
Citations: N/A
2021
Editor in Chief of Journal
Impact Factor: 3.576
2020
Edited Journal Issue / Proceeding / Book
Impact Factor: 9.936
2020
Reviewed Papers for Journals
Impact Factor: 9.515
2020
Reviewed Papers for Journals
Impact Factor: 3.819
2021
Reviewed Papers for Journals
Impact Factor: 9.515
2019
Reviewed Papers for Journals
Impact Factor: 3.458
0
Copyrights
1
Patents
0
Industrial Designs
0
Trademarks
Solar Infinity (SI-1) – Critical Load Management for Optimal use of Green Energy/an Adaptive Optimal Green Energy Solution 2021
Status: Filed Approval Date: 24-Aug-2021
Workshop on Digital Forensics 2020
Submission Date: 14-Dec-2020 Completion Date: 15-Dec-2020
Partner: Lahore Garrision University
0
Total Supervisions
0
PhD Supervisions
0
MS Supervisions
Loading...

Loading PhD supervisions...

Loading...

Loading MS supervisions...