Muhammad Ajmal Azad

Orcid: 0000-0003-1707-018X

Affiliations:
  • University of Derby, Department of Computer Science and Mathematics, Derbz, UK
  • University of Warwick, Department of Computer Science, Warwick, UK
  • Newcastle University, School of Computing Science, Newcastle Upon Tyne, UK
  • University of Porto, Department of Electrical Engineering, Porto, Portugal (PhD 2016)


According to our database1, Muhammad Ajmal Azad authored at least 68 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Random transformations to improve mitigation of query-based black-box attacks.
Expert Syst. Appl., 2025

2024
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur., 2024

Verify and trust: A multidimensional survey of zero-trust security in the age of IoT.
Internet Things, 2024

Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features.
Inf., 2024

The application of AI techniques for firearm detection in digital forensic investigation.
Int. J. Electron. Secur. Digit. Forensics, 2024

ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph.
Big Data Min. Anal., 2024

2023
A Framework for Decentralized, Real-Time Reputation Aggregation in IoV.
IEEE Internet Things Mag., June, 2023

Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63].
Future Gener. Comput. Syst., June, 2023

A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT.
Inf., February, 2023

Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
CoRR, 2023

Gabor Contrast Patterns: A Novel Framework to Extract Features From Texture Images.
IEEE Access, 2023

2022
Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model.
Sensors, 2022

End-to-end verifiable cumulative voting without tallying authorities.
Int. J. Appl. Cryptogr., 2022

DEEPSEL: A novel feature selection for early identification of malware in mobile applications.
Future Gener. Comput. Syst., 2022

Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities.
Trans. Emerg. Telecommun. Technol., 2022

A comprehensive survey on secure software-defined network for the Internet of Things.
Trans. Emerg. Telecommun. Technol., 2022

A multivariant secure framework for smart mobile health application.
Trans. Emerg. Telecommun. Technol., 2022

A privacy-preserving framework for smart context-aware healthcare applications.
Trans. Emerg. Telecommun. Technol., 2022

REPUTABLE-A Decentralized Reputation System for Blockchain-Based Ecosystems.
IEEE Access, 2022

Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
CRT-BIoV: A Cognitive Radio Technique for Blockchain-Enabled Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
ACM Trans. Cyber Phys. Syst., 2021

On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things.
Inf. Process. Manag., 2021

A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications.
IEEE Internet Things J., 2021

Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications.
Future Internet, 2021

An intelligent content caching protocol for connected vehicles.
Trans. Emerg. Telecommun. Technol., 2021

Sharing is Caring: A collaborative framework for sharing security alerts.
Comput. Commun., 2021

2020
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network.
IEEE Trans. Ind. Informatics, 2020

privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
IEEE Trans. Emerg. Top. Comput., 2020

Designing privacy-aware internet of things applications.
Inf. Sci., 2020

Decentralized Self-Enforcing Trust Management System for Social Internet of Things.
IEEE Internet Things J., 2020

Risk-Based Access Control Model: A Systematic Literature Review.
Future Internet, 2020

Socioscope: I know who you are, a robo, human caller or service number.
Future Gener. Comput. Syst., 2020

A First Look at Contact Tracing Apps.
CoRR, 2020

A Review of Blockchain in Internet of Things and AI.
Big Data Cogn. Comput., 2020

Profiling high leverage points for detecting anomalous users in telecom data networks.
Ann. des Télécommunications, 2020

Gaussian Mixture Model Based Probabilistic Modeling of Images for Medical Image Segmentation.
IEEE Access, 2020

Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs).
Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020

2019
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.
IEEE Internet Things J., 2019

COLIDE: a collaborative intrusion detection framework for Internet of Things.
IET Networks, 2019

PriVeto: a fully private two-round veto protocol.
IET Inf. Secur., 2019

Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019

Pervasive blood pressure monitoring using Photoplethysmogram (PPG) sensor.
Future Gener. Comput. Syst., 2019

Rapid detection of spammers through collaborative information sharing across multiple service providers.
Future Gener. Comput. Syst., 2019

Performance analysis of content discovery for ad-hoc tactile networks.
Future Gener. Comput. Syst., 2019

Consumer-facing technology fraud: Economics, attack methods and potential solutions.
Future Gener. Comput. Syst., 2019

Decentralized document version control using ethereum blockchain and IPFS.
Comput. Electr. Eng., 2019

E2E Verifiable Borda Count Voting System without Tallying Authorities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

PrivBox: Verifiable decentralized reputation system for online marketplaces.
Future Gener. Comput. Syst., 2018

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT.
CoRR, 2018

A privacy-aware decentralized and personalized reputation system.
Comput. Secur., 2018

Systems and methods for SPIT detection in VoIP: Survey and future directions.
Comput. Secur., 2018

M2M-REP: Reputation system for machines in the internet of things.
Comput. Secur., 2018

Cloud Automation to Run Large-Scale Quantum Chemical Simulations.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

2017
Early identification of spammers through identity linking, social network and call features.
J. Comput. Sci., 2017

Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network.
Proceedings of the Symposium on Applied Computing, 2017

M2M-REP: Reputation of Machines in the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Towards mitigating unwanted calls in voice over IP
PhD thesis, 2016

Clustering VoIP caller for SPIT identification.
Secur. Commun. Networks, 2016

Caller-Centrality: Identifying Telemarketers in a VoIP Network.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

2013
Intrusion damage assessment for multi-stage attacks for clouds.
IET Commun., 2013

Caller-REP: Detecting unwanted calls with caller social strength.
Comput. Secur., 2013

2012
Mitigating SPIT with Social Strength.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Multistage SPIT detection in transit VoIP.
Proceedings of the 19th International Conference on Software, 2011

Uncalibrated Visual Servo control with multi-constraint satisfaction.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

2006
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006


  Loading...