Dr. Muhammad Asim

Faculty Member

Dr. Muhammad Asim

Professor

HEC Approved PhD Supervisor

Education

P.hD (Computer Science), Liverpool John Moore University, UK, 2010

MS (Computer Science), Liverpool University, UK, 2006

BS (Computer Science), University of Peshawar, 2004

Summary

Dr Muhammad Asim is an Professor at the Department of Computer Science, National University of Computer and Emerging Sciences, Pakistan. Having attained a Ph.D. from Liverpool John Moores University, he researches in the fields of Cyber Security,  Computer Networks, Network Security, and Internet of Things.  His research is not only academically focused but worked on various research issues in collaboration with industrial partners such as SAP, THALES, SINTEF, CNR across the EU.

Publications

Journal Papers

  1. M. Asad, M. Asim, T. Javed, M. Beg, et al, DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning, The Computer Journal, 2019, https://doi.org/10.1093/comjnl/bxz064
  2. T. Baker, M. Asim, “A New Energy-aware Service Composition Framework for Multi-cloud based Data-intensive Applications” Journal of Network and Computer Applications, 2017, No. 89, pp. 96-108
  3. E. Ugljanin, E. Kajan, Z. Maamar, M. Asim, V. Burégio, Immersing citizens and things into smart cities: a social machine-based and data artifact-driven approach,Computing (2020). https://doi.org/10.1007/s00607-019-00774-9.
  4. N. Abbas, M. Asim, N. Tariq, T. Baker, S. Abbas, A Mechanism for Securing IoT-enabled Applications at the Fog Layer, Journal of Sensor and Actuator Networks, 8 (1), 2019.
  5. ? M. Zakaria, E. Kajan, M. Asim, T. Baker, “Open Challenges in Vetting the Internet-of-Things”, Internet Technology Letters, p.e129, https://onlinelibrary.wiley.com/doi/pdf/10.1002/itl2.129
  6. M. Asim, A. Yautsiukhin, A. Brucker, “Security Policy Monitoring of BPMN-based Service Compositions” Journal of Software: Evolution and Process, 2018
  7. A. Rehman, O.beg, M. Asim, et.al, AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes, Journal of Ambient Intelligence and Humanized Computing (2020)
  8. T. Baker, M. Asim, A. MacDermott, et al, A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw: PractExper. 2019;1–16. https://doi.org/10.1002/spe.2688
  9. N. Tariq, M. Asim, Z. Maamar, Z. Farooqi, N. Faci, T. Baker, A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT, Journal of Parallel and Distributed Computing, 2019
  10. T. Baker, B. Aldawsari, M. Asim, H. Tawfik, Z. Maamar, Taj Buyya, Cloud-SEnergy: A Bin-Packing Based Multi-Cloud Service Broker for Energy Efficient Composition and Execution of Data-intensive Applications. Sustainable Computing : informatics and systems. ISSN 2210-5379 DOI: https://doi.org/10.1016/j.suscom.2018.05.011 (2018)
  11. S. Saeed, M. Asim, M. Baker, Z. Maamar, “A location-sensitive and network-aware broker for recommending Web services”. Computing 101(5), 2019, pp 455–475
  12. M. Al-khafajiy, T. Baker, M. Asim, Z. Guo, et al, COMITMENT: A Fog Computing Trust Management Approach, Journal of Parallel and Distributed Computing, 2019, https://doi.org/10.1016/j.jpdc.2019.10.006
  13. H. T. Javed, M. O.Beg, H. Mujtaba, H. Majeed, M. Asim, Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised, in The Computer Journal, 2018, https://doi.org/10.1093/comjnl/bxy071
  14. A. Qamar, M. Asim, Z. Maamar, S. Saeed, and T. Baker, A Quality-of-Things model for assessing the Internet-of-Things nonfunctional properties,Transactions on Emerging Telecommunications Technologies (ETT), 2019
  15. U. Khalid, M. Asim, T. Baker, et. al, A decentralized lightweight blockchain-based authentication mechanism for IoT systems, Cluster Computing (2020)
  16. Z. Maamar, T. Baker, M. Sellami, M. Asim, E. Ugljanin, N. Faci, Cloud vs edge: Who serves the Internet-of-Things better? Internet Technology Letters 2018;1:e66. https://doi.org/10.1002/itl2.66 (ISI indexed)