Muhammad Ajmal Azad
Orcid: 0000-0003-1707-018XAffiliations:
- University of Derby, Department of Computer Science and Mathematics, Derbz, UK
- University of Warwick, Department of Computer Science, Warwick, UK
- Newcastle University, School of Computing Science, Newcastle Upon Tyne, UK
- University of Porto, Department of Electrical Engineering, Porto, Portugal (PhD 2016)
According to our database1,
Muhammad Ajmal Azad
authored at least 68 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
Expert Syst. Appl., 2025
2024
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur., 2024
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT.
Internet Things, 2024
Inf., 2024
The application of AI techniques for firearm detection in digital forensic investigation.
Int. J. Electron. Secur. Digit. Forensics, 2024
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph.
Big Data Min. Anal., 2024
2023
IEEE Internet Things Mag., June, 2023
Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63].
Future Gener. Comput. Syst., June, 2023
Inf., February, 2023
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
CoRR, 2023
IEEE Access, 2023
2022
Sensors, 2022
Int. J. Appl. Cryptogr., 2022
DEEPSEL: A novel feature selection for early identification of malware in mobile applications.
Future Gener. Comput. Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
A comprehensive survey on secure software-defined network for the Internet of Things.
Trans. Emerg. Telecommun. Technol., 2022
Trans. Emerg. Telecommun. Technol., 2022
Trans. Emerg. Telecommun. Technol., 2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
ACM Trans. Cyber Phys. Syst., 2021
On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things.
Inf. Process. Manag., 2021
IEEE Internet Things J., 2021
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications.
Future Internet, 2021
Trans. Emerg. Telecommun. Technol., 2021
Comput. Commun., 2021
2020
IEEE Trans. Ind. Informatics, 2020
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Internet Things J., 2020
Future Internet, 2020
Future Gener. Comput. Syst., 2020
Profiling high leverage points for detecting anomalous users in telecom data networks.
Ann. des Télécommunications, 2020
Gaussian Mixture Model Based Probabilistic Modeling of Images for Medical Image Segmentation.
IEEE Access, 2020
Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020
2019
IEEE Internet Things J., 2019
IET Networks, 2019
Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Rapid detection of spammers through collaborative information sharing across multiple service providers.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. Electr. Eng., 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Future Gener. Comput. Syst., 2018
CoRR, 2018
Comput. Secur., 2018
Comput. Secur., 2018
Comput. Secur., 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
2017
Early identification of spammers through identity linking, social network and call features.
J. Comput. Sci., 2017
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network.
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
2013
Comput. Secur., 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Proceedings of the 19th International Conference on Software, 2011
Proceedings of the IEEE International Conference on Robotics and Automation, 2011
2006
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006