Journal Articles:
Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph
IEEE Big Data Mining and Analytics, 2023
Haitham Mahmoud, Muhammad Ajmal Azad, Junaid Arshad and Adel Aneiba
A Framework for Decentralised, Real-time Reputation Aggregation in IoV
IEEE Internet of Things Magazine, 2023
SM Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed, Tahir Sharif
A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
Information 14 (2), 129, 2023
NS Safa, F Mitchell, C Maple, MA Azad, M Dabbagh
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities
Transactions on Emerging Telecommunications Technologies 33 (10), e4173
HF Atlam, MA Azad, M Altamimi, N Fadhel
Role of Blockchain and AI in Security and Privacy of 6G
AI and Blockchain Technology in 6G Wireless Network, 93-115
J Arshad, MA Azad, A Prince, J Ali, TG Papaioannou
REPUTABLE–A Decentralized Reputation System for Blockchain-Based Ecosystems
IEEE Access 10, 79948-79961
HF Atlam, MA Azad, NF Fadhel
Efficient NFS model for risk estimation in a risk-based access control model
Sensors 22 (5)
Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Rizvi, Junaid Arshad, Hany Atlam
DEEPSEL: A Novel Feature Selection for Early Identification of Malware in Mobile Applications
Accepted In Elsevier Future Generation Computer Systems, 2021
Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, and Tahir Sharif
A Comprehensive Survey on Secure Software defined Network for the Internet of Things
IET Transactions on Emerging Telecommunications Technologies, 2021
Syed Khurram Rizvi, Muhammad Ajmal Azad and Moazam Faraz
Spectrum of Advancements and Developments in Multidisciplinary Domains for Generative Adversarial Networks (GANs)
Springer Archives of Computational Methods in Engineering, 2021
Samiran Bag, Muhammad Ajmal Azad and Feng Hao
DRE based cumulative e-voting scheme without tallying authorities,
International Journal of Applied Cryptography, 2020
Muhammad Ajmal Azad, Juanid Arshad, Akmal Ali, Farhan Riaz, Sidra Abdullah, Muhammad Imran, and Farhan Ahmad
First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications
IEEE The Internet of Things Journal, 2020
Muhammad Ajmal Azad, Samiran Bag, Feng Hao and Farhan Ahmad
Sharing is Caring: A Collaborative Framework for Sharing Security Alerts
Elsevier Computer Communications, 2020
Shazia Tabassum, Muhammad Ajmal Azad, and João Gama
Profiling High Leverage Points for Detecting Anomalous Users in Telecom Data Networks
Springer Annals of Telecommunications,2020 [Inpress]
[Download]
Geetanjali Rathee, Farhan Ahmad, Fatih Kurugollu, Muhammad Ajmal Azad, Razi Iqbal, and Muhammad Imran
RT-BIoV: A Cognitive Radio Technique for Blockchain-enabled Internet of Vehicles
IEEE Transactions on Intelligent Transportation Systems, 2020 [Inpress]
[Download]
Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, and Feng Hao
Privacy-preserving Crowd-sensed trust aggregation in the User-centeric Internet of People Networks
ACM Transactions on Cyber-Physical Systems,2020
[Download]
Junaid Arshad , Muhammad Ajmal Azad , Roohi Amad , Khaled Salah , Mamoun Alazab, and Razi Iqbal
A Review of Performance, Energy, and Privacy of Intrusion Detection Systems for IoT
In MDPI Electronics, 2020
[Download]
Muhammad Ajmal Azad, Samiran Bag, Feng Hao, and Andrii Shalaginov
Decentralized Self-enforcing Trust Management System for Social Internet of Things
IEEE The Internet of Things Journal, 2019
[Download]
Muhammad Ajmal Azad, Mamoun Alazab, Farhan Riaz, Junaid Arshad, and Tariq Abdullah
Socioscope: I Know Who You Are, A Robo, Human Caller or Service Number
Elsevier Future Generation Computer Systems, 2019
[Download]
Charith Perera, Mahmoud Barhamgi, Arosha Bandara, Muhammad Ajmal Azad, Blaine Price, and Bashar Nuseibeh
Designing Privacy-aware Internet of Things Applications
Elsevier Information Science,2019
[Download]
Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, and Feng Hao
Authentic-Caller: Self-enforcing Authentication in a Next Generation Network
IEEE Transactions on Industrial Informatics, 2019
[Download]
Mohammad Aamir Ali, Muhammad Ajmal Azad, Mario Parreno Centeno, Feng Hao, and Aad Van Moorsel
Consumer-Facing Technology Fraud: Economics, Attack Methods, and Potential Solutions
Elsevier Future Generation Computer Systems, 2019
[Download]
Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, and Feng Hao
TrustVote: Privacy-preserving Node Ranking in Vehicular Networks
IEEE The Internet of Things Journal, 2019
[Download]
Samiran Bag, Muhammad Ajmal Azad, and Feng Hao
PriVeto: A Fully Private Two Round Veto Protocol
IET Information Security, 2019
[Download]
Muhammad Ajmal Azad, Junaid Arshad, Shazia Mahmoud, Khaled Salah, and Muhammad Imran
A Privacy-preserving Framework for Smart Context-aware Healthcare Applications
Transactions on Emerging Telecommunications Technologies, 2019
[Download]
N.Nizamuddin, Khaled Salah, Muhammad Ajmal Azad, Junaid Arshad, and Habib Ur Rehman
Decentralized Document Version Control using Ethereum Blockchain and IPFS
Elsevier Computer and Electrical Engineering, 2019
[Download]
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mehdi Sookhak, and Mohammad Dabbagh
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
Elsevier Future Generation Computer Systems, 2019
[Download]
Farhan Riaz, Muhammad Ajmal Azad, Junaid Arshad, and Muhammad Imran
Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor
Elsevier Future Generation Computer Systems,2019
[Download]
Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Razi Iqbal, Muhammad Imran Tariq, and Tariq Umer
Performance Analysis of Content Discovery for Ad-hoc Tactile Network
Elsevier Future Generation Computer Systems,2018
[Download]
Muhammad Ajmal Azad, Samiran Bag, Feng Hao, and Khaled Salah
M2M-REP: Reputation System for Machines in the Internet of Things
Elsevier Computers & Security, Volume 79,2018.
[Download]
Junaid Arshad, Muhammad Ajmal Azad, Moh. Abdellatif, Habib Ur Rehman, and Khaled Saleh
COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things
IET Networks 2018
[Download]
Muhammad Ajmal Azad, Samiran Bag, and Feng Hao
PrivBox: Verifiable Decentralized Reputation System for online Marketplaces
In Elsevier Future Generation Computer Systems,2018
[Download]
Samiran Bag, Muhammad Ajmal Azad, and Feng Hao
A Privacy-aware Decentralized and Personalized Reputation System
Elsevier Computers & Security, 2018, Vol 77.
[Download]
Muhammad Ajmal Azad, Ricardo Morla, and Khaled Saleh
Systems and Methods for SPIT Detection in VoIP: Survey and Future Directions
Elsevier Computers & Security, 2018, Vol 77.
[Download]
Muhammad Ajmal Azad, Junaid Arshad, and Farhan Riaz
[Book Chapter] SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis
Springer Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
[Download]
Muhammad Ajmal Azad and Ricardo Morla
Rapid Detection of Spammers through Collaborative Information Sharing across Multiple Service Providers
Elsevier Future Generation Computer Systems, 2018
[Download]
Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, and Feng Hao
privy: Privacy-Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams
IEEE Transaction on Emerging Topic Computing, 2017
[Download]
Muhammad Ajmal Azad and Ricardo Morla
Early Identification of Spammers Through Identity Linking, Social Network, and Call Features
Elsevier Journal of Computational Sciences,2016.
[Download]
Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, and Khaled Salah
Clustering VoIP Caller for SPIT Identification
John Wiley and Sons Journal of Communication and Security Networks,2016.
[Download]
Muhammad Ajmal Azad and Ricardo Morla
Caller-REP: Detecting unwanted Calls with Caller Social Strength
Elsevier Computers & Security, 2013.
[Download]
Junaid Arshad, Muhammad Ajmal Azad, Imran Ali Jokhio, and Paul Townend
Intrusion damage assessment for multi-stage attacks for clouds
IET Communications, 2013.
[Download]
Refereed Conference and Workshop Articles:
Threat Miner-A Text Analysis Engine for Threat Identification Using Dark Web Data
N Deguara, J Arshad, A Paracha, MA Azad
2022 IEEE International Conference on Big Data (Big Data), 3043-3052
Muhammad Sadiq Hassan Zada, Bo Yuan, Ashiq Anjum, Muhammad Ajmal Azad, Wajahat Ali Khan, and Stephan Reiff-Marganiec
Large-scale Graph Integration Using Graph Probabilistic Dependencies (GPDs)
IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (2020)
Samiran Bag, Muhammad Ajmal Azad, and Feng Hao
E2E Verifiable Borda Count Voting System without Tallying Authorities
14th International Conference on Availability, Reliability, and Security (ARES), 2019
[Download]
Junaid Arshad, Moh. Abdellatif, Muhammad Mubashir Khan, and Muhammad Ajmal Azad
[C] A Novel Framework for Collaborative Intrusion Detection for M2M Networks
9th International Conference on Information and Communication Systems, 2018
[Download]
Muhammad Ajmal Azad, Samiran Bag, and Feng Hao
[C] M2M-REP: Reputation of Machines in the Internet of Things
12th International Conference on Availability, Reliability, and Security (ARES), 2017.
[Download]
Muhammad Ajmal Azad and Samiran Bag
[C] Decentralized Privacy-Aware Collaborative Filtering of Smart Spammers in a Telecommunication Network
32nd ACM Symposium on Applied Computing, Computer Security Track (SAC-SEC), 2017.
[Download]
Muhammad Ajmal Azad and Syed Khurram Rizvi
[C] Caller Centrality: Identifying Telemarketers in VoIP Network
11th International Conference on Availability, Reliability, and Security (ARES), 2016.
[Download]
Muhammad Ajmal Azad and Ricardo Morla
[C] ID-CONNECT: Combining Network and Call Features to Link Different Identities
18th IEEE Conference on Computational Science and Engineering (18th IEEE CSE, Privacy, Trust and Security Track), 2015.
[Download]
2010-2016
Muhammad Ajmal Azad and Ricardo Morla
[C] Caller Centrality: Identifying SPIT caller in VoIP
1st Ph.D. Students Conference in Electrical and Computer Engineering, 2012.
[Download]
Muhammad Ajmal Azad and Ricardo Morla
[C] Mitigating SPIT with Social Strength
11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), 2012.
[Download]
Muhammad Ajmal Azad, Muhammad Imran Tariq, and Syed Khurram Rizvi
[C] IMS fault localization issues and challenges
15th International Multi-topic Conference, 2012.
[Download]
Muhammad Ajmal Azad and Ricardo Morla
[C] Multistage SPIT detection in Transit VoIP
19th International Conference on Software, Telecommunications, and Computer Networks (SoftCOM), 2011.
[Download]
Muhammad Imran Tariq, Muhammad Ajmal Azad, Razvan Beuran, and Yoichi Shinoda
[C] Performance Analysis of VoIP Codecs over BE WiMAX Network
3rd International Conference on Computer and Electrical Engineering (ICCEE), 2010.
[Download]
Muhammad Ajmal Azad, Muhammad Imran Tariq, and Tauseef Jamal
[C] SBC for Resource Allocation In IMS Network
International Conference on Intelligence and Information Technology (ICIIT), 2010.
[Download]
Rashid Mahmood and Muhammad Ajmal Azad
[C] SIP Messages Delay Analysis in Heterogeneous Network
International Conference on Wireless Communication and Sensor Computing, 2010.
[Download]
Muhammad Naeem, Zahir Ahmed, Rashid Mahmood, and Muhammad Ajmal Azad
[C] QOS Based Performance Measurement of Secure on Demand Routing Protocols for MANET’s
International Conference on Wireless Communication and Sensor Computing, 2010.
[Download]
Muhammad Ajmal Azad, Rashid Mahmood, and Tahir Mehmood
[C] A Comparative Analysis of DCCP Variants (CCID2, CCID3), TCP and UDP for Mpeg4 Video Applications
3rd International Conference on Information and Communication Technologies, 2009.
[Download]
Junaid Arshad and Muhammad Ajmal Azad
[C] Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks
International Workshop on Wireless Ad Hoc and Sensor Networks, 2006.
[Download]