Muhammad Usman
Orcid: 0000-0002-2528-464XAffiliations:
- University of South Wales, UK
- University of Surrey, UK (former)
- Griffith University, Australia (PhD)
According to our database1,
Muhammad Usman
authored at least 21 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2022
A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic.
IEEE Internet Things J., 2022
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks.
Comput. Networks, 2022
2021
IEEE Trans. Reliab., 2021
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst., 2021
Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory.
IEEE Trans. Emerg. Top. Comput. Intell., 2021
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures.
ACM Comput. Surv., 2021
2020
Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures.
CoRR, 2020
2015
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron., 2015
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks, 2015
2014
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks, 2014
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
2013
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
An energy efficient clique based clustering and routing mechanism in wireless sensor networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
2010
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010
2009
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN.
Proceedings of the High Performance Computing and Applications, 2009
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.
Proceedings of the High Performance Computing and Applications, 2009