Muhammad Asim
Orcid: 0000-0002-2894-7891Affiliations:
- National University of Computer and Emerging Sciences, Department of Computer Science, Islamabad, Pakistan
- Liverpool John Moores University, School of Computing and Mathematical Science, UK (PhD 2010)
According to our database1,
Muhammad Asim
authored at least 57 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning.
Comput. Secur., 2024
Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms.
Comput. Electr. Eng., 2024
2023
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
Sensors, December, 2023
Sensors, January, 2023
J. Ambient Intell. Humaniz. Comput., 2023
HDA-TIP: A Framework for Heterogeneous Data Aggregation for Threat Intelligence Platform.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
2022
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT.
J. Supercomput., 2022
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
Sensors, 2022
J. Parallel Distributed Comput., 2022
A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties.
Trans. Emerg. Telecommun. Technol., 2022
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems.
Comput. Networks, 2022
2021
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model.
ACM Trans. Internet Techn., 2021
Orchestration- and choreography-based composition of Internet of Transactional Things.
Serv. Oriented Comput. Appl., 2021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models.
J. Netw. Syst. Manag., 2021
CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications.
Trans. Emerg. Telecommun. Technol., 2021
Computing, 2021
Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
2020
Softw. Pract. Exp., 2020
A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment.
J. Parallel Distributed Comput., 2020
J. Parallel Distributed Comput., 2020
A collaborative healthcare framework for shared healthcare plan with ambient intelligence.
Hum. centric Comput. Inf. Sci., 2020
Immersing citizens and things into smart cities: a social machine-based and data artifact-driven approach.
Computing, 2020
Computing, 2020
Clust. Comput., 2020
A decentralized lightweight blockchain-based authentication mechanism for IoT systems.
Clust. Comput., 2020
Comput. J., 2020
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020
Proceedings of the New Trends in Databases and Information Systems, 2020
2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019
Multim. Tools Appl., 2019
J. Sens. Actuator Networks, 2019
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT.
J. Parallel Distributed Comput., 2019
Computing, 2019
Comput. J., 2019
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019
2018
Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications.
Sustain. Comput. Informatics Syst., 2018
J. Softw. Evol. Process., 2018
Internet Technol. Lett., 2018
Proceedings of the Model and Data Engineering - 8th International Conference, 2018
2017
An energy-aware service composition algorithm for multiple cloud-based IoT applications.
J. Netw. Comput. Appl., 2017
2015
Int. J. Crit. Comput. Based Syst., 2015
2014
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014
Proceedings of the Cyberpatterns, 2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010