Dr. Muhammad Asim
Dr. Muhammad Asim
Professor
HEC Approved PhD Supervisor
Education
P.hD (Computer Science), Liverpool John Moore University, UK, 2010
MS (Computer Science), Liverpool University, UK, 2006
BS (Computer Science), University of Peshawar, 2004
Summary
Dr Muhammad Asim is an Professor at the Department of Computer Science, National University of Computer and Emerging Sciences, Pakistan. Having attained a Ph.D. from Liverpool John Moores University, he researches in the fields of Cyber Security, Computer Networks, Network Security, and Internet of Things. His research is not only academically focused but worked on various research issues in collaboration with industrial partners such as SAP, THALES, SINTEF, CNR across the EU.
Publications
Journal Papers
- M. Asad, M. Asim, T. Javed, M. Beg, et al, DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning, The Computer Journal, 2019, https://doi.org/10.1093/comjnl/bxz064
- T. Baker, M. Asim, “A New Energy-aware Service Composition Framework for Multi-cloud based Data-intensive Applications” Journal of Network and Computer Applications, 2017, No. 89, pp. 96-108
- E. Ugljanin, E. Kajan, Z. Maamar, M. Asim, V. Burégio, Immersing citizens and things into smart cities: a social machine-based and data artifact-driven approach,Computing (2020). https://doi.org/10.1007/s00607-019-00774-9.
- N. Abbas, M. Asim, N. Tariq, T. Baker, S. Abbas, A Mechanism for Securing IoT-enabled Applications at the Fog Layer, Journal of Sensor and Actuator Networks, 8 (1), 2019.
- ? M. Zakaria, E. Kajan, M. Asim, T. Baker, “Open Challenges in Vetting the Internet-of-Things”, Internet Technology Letters, p.e129, https://onlinelibrary.wiley.com/doi/pdf/10.1002/itl2.129
- M. Asim, A. Yautsiukhin, A. Brucker, “Security Policy Monitoring of BPMN-based Service Compositions” Journal of Software: Evolution and Process, 2018
- A. Rehman, O.beg, M. Asim, et.al, AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes, Journal of Ambient Intelligence and Humanized Computing (2020)
- T. Baker, M. Asim, A. MacDermott, et al, A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw: PractExper. 2019;1–16. https://doi.org/10.1002/spe.2688
- N. Tariq, M. Asim, Z. Maamar, Z. Farooqi, N. Faci, T. Baker, A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT, Journal of Parallel and Distributed Computing, 2019
- T. Baker, B. Aldawsari, M. Asim, H. Tawfik, Z. Maamar, Taj Buyya, Cloud-SEnergy: A Bin-Packing Based Multi-Cloud Service Broker for Energy Efficient Composition and Execution of Data-intensive Applications. Sustainable Computing : informatics and systems. ISSN 2210-5379 DOI: https://doi.org/10.1016/j.suscom.2018.05.011 (2018)
- S. Saeed, M. Asim, M. Baker, Z. Maamar, “A location-sensitive and network-aware broker for recommending Web services”. Computing 101(5), 2019, pp 455–475
- M. Al-khafajiy, T. Baker, M. Asim, Z. Guo, et al, COMITMENT: A Fog Computing Trust Management Approach, Journal of Parallel and Distributed Computing, 2019, https://doi.org/10.1016/j.jpdc.2019.10.006
- H. T. Javed, M. O.Beg, H. Mujtaba, H. Majeed, M. Asim, Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised, in The Computer Journal, 2018, https://doi.org/10.1093/comjnl/bxy071
- A. Qamar, M. Asim, Z. Maamar, S. Saeed, and T. Baker, A Quality-of-Things model for assessing the Internet-of-Things nonfunctional properties,Transactions on Emerging Telecommunications Technologies (ETT), 2019
- U. Khalid, M. Asim, T. Baker, et. al, A decentralized lightweight blockchain-based authentication mechanism for IoT systems, Cluster Computing (2020)
- Z. Maamar, T. Baker, M. Sellami, M. Asim, E. Ugljanin, N. Faci, Cloud vs edge: Who serves the Internet-of-Things better? Internet Technology Letters 2018;1:e66. https://doi.org/10.1002/itl2.66 (ISI indexed)