Muhammad Rizwan Asghar
Orcid: 0000-0002-9607-376XAffiliations:
- The University of Auckland, NZ
According to our database1,
Muhammad Rizwan Asghar
authored at least 92 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions.
ACM Comput. Surv., August, 2024
Secur. Priv., 2024
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system.
Comput. Secur., 2024
Comput. Networks, 2024
2023
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023
2022
Secur. Priv., 2022
IET Blockchain, 2022
2021
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage.
ACM Trans. Priv. Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems.
IEEE Trans. Dependable Secur. Comput., 2021
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19.
Secur. Priv., 2021
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations.
J. Comput. Secur., 2021
Computing, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Analysing performance issues of open-source intrusion detection systems in high-speed networks.
J. Inf. Secur. Appl., 2020
Trans. Emerg. Telecommun. Technol., 2020
A Business and Legislative Perspective of V2X and Mobility Applications in 5G Networks.
IEEE Access, 2020
Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Energy Efficient Wireless Body Area Networks: Proximity-based Clustering in Medical Implants.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020
2019
J. Inf. Secur. Appl., 2019
Comput. Networks, 2019
Comput. Networks, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical Data.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
IEEE Access, 2018
Technologies and Solutions for Location-Based Services in Smart Cities: Past, Present, and Future.
IEEE Access, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Veh. Commun., 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources.
Proceedings of the 13th IEEE International Conference on e-Science, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016
Proceedings of the CLOSER 2016, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
PhD thesis, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments.
IACR Cryptol. ePrint Arch., 2013
Comput. Secur., 2013
Proceedings of the 10th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2013
Proceedings of the CCSW'13, 2013
2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011