Research Paper Publications:
Total published: 186 (Journals: 110, Conferences: 72, Book Chapter:04)
Number of IEEE Transactions/IEEE Journal/IEEE Magazine research publications: 51
Number of Web of Science (Science Citation Index (SCI)/Science Citation Index Expanded (SCIE)) journal publications: 105
Number of Scopus indexed research publications: 176
Book Chapters
[BC1] M. Wazid and A. K. Das. "Design Principles & Privacy in Cloud Computing," in Chapter 7, Cyber Defense Mechanisms: Security, Privacy, and Challenges, editors G. Kumar, D. K. Saini and N. H. H. Cuong, 2020, CRC Press, Taylor & Francis, USA, Online, DOI: https://doi.org/10.1201/9780367816438. (Indexed in Web of Science, dblp and Scopus)
[BC2] M. Wazid and A. K. Das. "Privacy in Internet of Healthcare Things," in Chapter 10, Data Protection and Privacy in Healthcare: Research and Innovations, editors A. Elngar, A. Pawar and P. Churi, 2020, CRC Press, Taylor & Francis, USA, Accepted. (Indexed in Web of Science, dblp and Scopus)
[BC3] M. Wazid, A. K. Das, B. Bera and D. P. Singh. "IoT & Blockchain Technology based Healthcare Monitoring," in Chapter 7, Blockchains in Digital Healthcare, editors R. M. Visconti, M. D. Borah and G. C. Deka, Jan. 2021, CRC Press, Taylor & Francis, USA, Accepted. (Indexed in Web of Science, dblp and Scopus)
[BC4] S. Thapliyal, M. Wazid, and D. P. Singh. "Blockchain-enabled Intelligent Internet of Things System for Secured Healthcare Applications," in Chapter 5, Ubiquitous and Transparent Security: Challenges and Applications, editors A. S. Kumar, R. K. Dhanaraj, Y. Maleh, M. Alazab, and D. Arockiam, Nov. 2023, CRC Press, Taylor & Francis, USA, Accepted. (Indexed in Web of Science, dblp and Scopus)
International Journals Papers
[J110] M. Wazid, J. Singh, C. Pandey, R. S. Sherratt, A. K. Das, D. Giri, and Y. Park. “Explainable Deep Learning-Enabled Malware Attack Detection for IoT-Enabled Intelligent Transportation Systems,” in IEEE Transactions on Intelligent Transportation Systems, Online 2025. (2024 SCI Impact Factor: 7.9)
[J109] P. Bagchi, A. Roy, M. Wazid, A. K. Das, B. K. Bhargava, and Y. Park. "Big Data Analytics-Envisioned Quantum-Safe Lattice-Based Three-Party Authenticated Key Agreement Protocol for Cloud IoT-Enabled Healthcare Applications," in IEEE Transactions on Dependable and Secure Computing, Accepted, 2025. (2024 SCI Impact Factor: 7.5)
[J108] M. Wazid, J. Singh, A. K. Das, S. Garg, W. Susilo, and M. M. Hassan. "Cloud Storage-Based Secure Big Data Analytics Mechanism for Drone-Assisted Healthcare 5.0 Data Fusion System," in Information Fusion (Elsevier), Online 2025. (2024 SCI Impact Factor: 15.5)
[J107] M. Wazid, A. K. Das, and V. Bhat K. "Quantum Cryptography-Inspired Hypertext Transfer Protocol for Secured Communication Networks: Challenges, Architecture, Applications and Future Research," in Security and Privacy (Wiley), Accepted, 2025. (2024 SCI Impact Factor: 2.1)
[J106] A. Patwal, M. Wazid, J. Singh, D. P. Singh, and A. K. Das. "An Authenticated Key Agreement Method for Secure Big Data Analytics in Next-Generation Wireless Networks-Enabled Smart Farming," in Journal of Systems Architecture (Elsevier), Accepted 2025. (2024 SCI Impact Factor: 4.1)
[J105] A. K. Pandey, A. K. Das, M. Wazid, K. Kaur, Y. Park, M. M. Hassan. "Unmanned Aerial Vehicles Empowering Secure Authentication in Cognitive IoMT for Transformative Knowledge Discovery in Data," in IEEE Internet of Things Journal, Accepted 2025. (2024 SCI Impact Factor: 8.9 )
[J104] C. Patra, D. Giri, B. Kundu, T. Maitra, and M. Wazid, "Rhetorical Structure Theory-Based Machine Intelligence-Driven Deceptive Phishing Attack Detection Scheme," in Journal of Information Security and Applications (Elsevier), Accepted 20025. (2024 SCI Impact Factor: 3.7)
[J103] M. Singh, S. Thapliyal, M. Wazid, D. P. Singh, and A. K. Das. "Designing Generative AI-Envisioned Security Scheme for Server Attacks Protection," in Security and Privacy (Wiley), Accepted, 2025. (2024 SCI Impact Factor: 2.1)
[J102] S. Thapliyal, M. Wazid, and D. P. Singh. "Design of Distributed Denial-of-Service Attack Mechanism for IoT-Driven Data Fusion System," in Cyber Security and Applications (Elsevier), Online, 2025.
[J101] S. Prajapat, D. Kumar, P. Kumar, M. Wazid, A.K. Das, and M. S. Hossain. "Quantum Secure Energy-Efficient Authentication Protocol for Digital Twins-Enabled Transportation Cyber-Physical Systems," in IEEE Transactions on Intelligent Transportation Systems, Feb. 2025. (2023 SCI Impact Factor: 7.9)
[J100] S. Thapliyal, M. Singh, M. Wazid, D. P. Singh, and A.K. Das. "Design of SMOTE Analysis-Based Phishing Attack Detection Scheme for Web of Things Environment," in Security and Privacy (Wiley), Accepted, 2025. (2024 SCI Impact Factor: 2.1)
[J99] S. Mittal, M. Wazid, D. P. Singh, A. K. Das and M. S. Hossain. “A Deep Learning Ensemble Approach for Malware Detection in Internet of Things Utilizing Explainable Artificial Intelligence,” in Engineering Applications of Artificial Intelligence (Elsevier), Vol. 139 (A), pp. 109560, 2025. (2024 SCI Impact Factor: 7.5)
[J98] M. Wazid, S. Mittal, A. K. Das, S. K. H. Islam, Mohammed J. F. Alenazi, A. V. Vasilakos. “Designing Secure Blockchain-Based Authentication and Key Management Mechanism for Internet of Drones Applications,” in Journal of Systems Architecture (Elsevier), Online 2025. (2024 SCI Impact Factor: 3.8)
[J97] M. Wazid, A. K. Das, and Y. Park. “Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research,” in IEEE Open Journal of the Computer Society, Online, 2024. (2022 SCI Impact Factor: 5.9)
[J96] G. Dangwal, S. Mittal, M. Wazid, J. Singh, A. K. Das, D. Giri, and M. J.F. Alenazi. “An Effective Intrusion Detection Scheme for Distributed Network Protocol 3 (DNP3) applied in SCADA-enabled IoT Applications,” in Computers and Electrical Engineering (Elsevier), Accepted, 2024. (2023 SCI Impact Factor: 4.0)
[J95] M. Wazid, S. Nautiyal, A. K. Das, S. Shetty, S. K. H. Islam. “A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare,” in Security and Privacy (Wiley), Online, 2024. (2023 SCI Impact Factor: 1.5)
[J94] G. Dangwal, M. Wazid, S. Nizam, V. Chamola, A. K. Das. “Automotive Cybersecurity Scheme for Intrusion Detection in CAN-Driven Artificial Intelligence of Things,” in Security and Privacy (Wiley), Accepted, 2024. (2023 SCI Impact Factor: 1.5)
[J93] P. Agarwal, M. Wazid, V. K. Singh, A. Srivastava, A. R. Singh, S. Mittal, and A. K. Das. “BCIDS-IoT: A Binary Classification Intrusion Detection Scheme for Internet of Things Communication,” in Security and Privacy (Wiley), Accepted, 2024. (2023 SCI Impact Factor: 1.5)
[J92] S. Saha, A. K. Das, M. Wazid, Y. Park, S. Garg, and M. Alrashoud. “Smart Contract-Based Access Control Scheme for Blockchain Assisted 6G-Enabled IoT-Based Big Data Driven Healthcare Cyber Physical Systems,” in IEEE Transactions on Consumer Electronics, Accepted, 2024. (2022 SCI Impact Factor: 4.3)
[J91] S. Thapliyal, M. Wazid, D. P. Singh, R. Chauhan, A. K. Mishra, and A. K. Das. “Secure Artificial Intelligence of Things (AIoT)-enabled Authenticated Key Agreement Technique for Smart Living Environment,” in Computers and Electrical Engineering (Elsevier), Accepted, 2024. (2022 SCI Impact Factor: 4.3)
[J90] A. K. Mishra, M. Wazid, D. P. Singh, A. K. Das, S. Roy, and S. Shetty. “ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications,” in IEEE Transactions on Network Science and Engineering, Vol. 11(1), pp. 254-269, 2024. (2022 SCI Impact Factor: 6.6)
[J89] M. Wazid, A. K. Mishra, N. Mohd, and A. K. Das. “A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact,” in Cyber Security and Applications (Elsevier), Accepted, 2024.
[J88] M. Wazid, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and M. Guizani. “AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare,” in IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 319-334, 2023. (2021 SCI Impact Factor: 7.231) [Topmost Venue, Rank-1 in Computer Security and Cryptography]
[J87] M. Wazid, A. K. Das, and S. Shetty. “An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things,” in IEEE Transactions on Intelligent Transportation Systems, 2023, DOI: 10.1109/TITS.2023.3338274. (2022 SCI Impact Factor: 8.5)
[J86] M. Wazid, J. Singh, A. K. Das, and J. J. P. C. Rodrigues. “An Ensemble-Based Machine Learning-Envisioned Intrusion Detection in Industry 5.0-Driven Healthcare Applications,” in IEEE Transactions on Consumer Electronics, Online, 2023. (2022 SCI Impact Factor: 4.3)
[J85] A. K. Mishra, M. Wazid, D. P. Singh, A. K. Das, S. Roy, and S. Shetty. “ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications,” in IEEE Transactions on Network Science and Engineering, 2023, Accepted. (2022 SCI Impact Factor: 6.6)
[J84] J. Singh, K. Sharma, M. Wazid, A. K. Das, and A. V. Vasilakos. “An Ensemble-based IoT-enabled Drones Detection Scheme for a Safe Community,” in IEEE Open Journal of the Communications Society, 2023, Accepted. (2022 SCI Impact Factor: 7.9)
[J83] V. Karnatak, A. K. Mishra, M. Wazid, N. Tripathi, J. Singh, and A. K. Das. “A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications,” in Security and Privacy (Wiley), 2023. (2022 SCI Impact Factor: 1.9)
[J82] S. Thapliyal, M. Wazid, D. P. Singh, A. K. Das, and SK H. Islam. “Robust Authenticated Key Agreement Protocol for Internet of Vehicles-Envisioned Intelligent Transportation System,” in Journal of Systems Architecture (Elsevier), 2023, Online. (2021 SCI Impact Factor: 5.836)
[J81] S. Thapliyal, M. Wazid, D. P. Singh, A. K. Das, S. Shetty, and A. Alqahtani. “Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications,” in IEEE Access, 2023, Online. (2022 SCI Impact Factor: 3.9)
[J80] A. K. Mishra, M. Wazid, D. P. Singh, A. K. Das, J. Singh, and A. V. Vasilakos. “Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications,” in Drones, Online, 2023. (2022 SCI Impact Factor: 4.8)
[J79] S. Thapliyal, S. Singh, M. Wazid, D. P. Singh, and A. K. Das. “Design of Blockchain-Enabled Secure Smart Health Monitoring System and Its Testbed Implementation,” in Cyber Security and Applications (Elsevier), 2023.
[J78] P. Kumar, M. Wazid, D. P. Singh, J. Singh, A. K. Das, Y. Park, and J. J. P. C. Rodrigues. “Explainable Artificial Intelligence Envisioned Security Mechanism for Cyber Threat Hunting,” in Security and Privacy (Wiley), 2023, Accepted. (2022 SCI Impact Factor: 1.9)
[J77] J. Singh, K. Sharma, M. Wazid, and A. K. Das. “SINN-RD: Spline Interpolation-envisioned Neural Network-based Ransomware Detection Scheme,” in Computers & Electrical Engineering (Elsevier), 2023, Online. (2021 SCI Impact Factor: 4.152)
[J76] M. Wazid, A. K. Das, and S. Shetty. “BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare,” in IEEE Transactions on Consumer Electronics, Vol. 69(1), pp. 18-28, 2023. (2021 SCI Impact Factor: 4.414)
[J75] M. Wazid, A. K. Das, and S. Shetty. “TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge Enabled IoT Systems,” in IEEE Internet of Things Journal, 2022, Online. (2021 SCI Impact Factor: 10.238)
[J74] M. Wazid, S. Thapliyal, D. P. Singh, A. K. Das, and S. Shetty. “Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems”, in IEEE Transactions on Network Science and Engineering, 2022, Online. (2021 SCI Impact Factor: 5.033)
[J73] M. Wazid, B. Bera, A. K. Das, S. P. Mohanty, and M. Jo, “Fortifying Smart Transportation Security through Public Blockchain”, in IEEE Internet of Things Journal, 2022, Online. (2021 SCI Impact Factor: 10.238)
[J72] M. Wazid, and P. Gope, “BACKM-EHA: A novel blockchain- enabled security solution for IoMT- based e-healthcare applications”, in ACM Transactions on Internet Technology, 2022, Online. (2020 SCI Impact Factor: 3.135)
[J71] M. Wazid, A. K. Das, N. Mohd, and Y. Park. “Healthcare 5.0 Security Framework: Applications, Issues and Future Research Directions,” in IEEE Access, 2022. (2021 SCI Impact Factor: 3.476)
[J70] J. Singh, M. Wazid, A. K. Das, V. Chamola, and M. Guizani. “Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey,” in Computer Communications (Elsevier), 2022, Accepted. (2021 SCI Impact Factor: 5.047)
[J69] M. Wazid, A. K. Das, V. Chamola, and Y. Park, “Uniting Cyber Security and Machine Learning: Advantages, Challenges and Future Research”, in ICT Express (Elsevier), 2022, Accepted. (2021 SCI Impact Factor: 4.754)
[J68] M. Wazid, J. Singh, A. K. Das, S. Shetty, M. K. Khan, and J. J. P. C. Rodrigue. “ASCP-IoMT: AI-enabled Lightweight Secure Communication Protocol for Internet of Medical Things,” in IEEE Access, 2022, Online, DOI: 10.1109/ACCESS.2022.3179418. (2020 SCI Impact Factor: 3.476)
[J67] N. Garg, M. Wazid, J. Singh, D. P. Singh, and A. K. Das. “Security in IoMT-Driven Smart Healthcare: A Comprehensive Review and Open Challenges”, in Security and Privacy (Wiley), 2022, In Production. (2022 SCI Impact Factor: 1.9)
[J66] S. Thapliyal, M. Wazid, D. P. Singh, A. K. Das, A. Alhomoud, A. R. Alharbi, H. Kumar, “ACM-SH: An efficient access control and key establishment mechanism for sustainable smart healthcare”, Sustainability (MDPI), 2022, Accepted. (2020 SCI Impact Factor: 3.89)
[J65] N. Garg, R. Petwal, M. Wazid, D. P. Singh, A. K. Das, and Joel J. P. C. Rodrigues. “On the design of an AI-driven secure communication scheme for Internet of Medical Things environment”, in Digital Communications and Networks (Elsevier), 2022, Accepted. (2021 SCI Impact Factor: 6.348)
[J64] M. Wazid, A. K. Das, K. -K. R. Choo, and Y. Park. “SCS-WoT: Secure Communication Scheme for Web of Things Deployment”, in IEEE Internet of Things Journal, 2021, Online. (2021 SCI Impact Factor: 10.238)
[J63] M. Wazid, A. K. Das, R. Hussain, N. Kumar, and S. Roy. “BUAKA-CS: Blockchain Endowed User Authentication and Key Agreement Scheme for Crowdsourcing System,” in Journal of Systems Architecture (Elsevier), 2021, Online. (2021 SCI Impact Factor: 5.836)
[J62] M. Wazid, A. K. Das, N. Kumar, and M. Alazab. “Designing Authenticated Key Management Scheme in 6G-enabled Network in a Box Deployed for Industrial Applications,” in IEEE Transactions on Industrial Informatics (IEEE TII), Vol. 17 (10), pp. 7174-7184, 2021. (2021 SCI Impact Factor: 11.648)
[J61] M. Wazid, A. K. Das, and Y. Park, “Blockchain-enabled Secure Communication Mechanism for IoT-driven Personal Health Records”, in Transactions on Emerging Telecommunications Technologies (Wiley), 2021, Online. (2021 SCI Impact Factor: 3.310)
[J60] N. Mohd, A. Singh, H. S. Bhadauria and M. Wazid, “An Efficient Node Placement Scheme to Mitigate Routing Attacks in Internet of Battlefield Things”, in Computers & Electrical Engineering (Elsevier), 2021, Online. (2020 SCI Impact Factor: 4.152)
[J59] M. Wazid, B. Bera, A. K. Das, S. Garg, D. Niyato, and M. S. Hossain. “Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment,” in IEEE Internet of Things Magazine, 2021, Accepted.
[J58] M. Wazid, A. K. Das, and YoungHo Park. “Blockchain-Envisioned Secure Authentication Approach in AIoT: Applications, Challenges and Future Research,” in Wireless Communications and Mobile Computing (Wiley-Hindawi), 2021, Accepted. (2020 SCI Impact Factor: 2.336)
[J57] B. Bera, M. Wazid, A. K. Das, and J. J. P. C. Rodrigues. “Securing Internet of Drones Network using AI-envisioned Smart-contract Based Blockchain,” in IEEE Internet of Things Magazine, 2021, Accepted.
[J56] R. Sharma, M. Wazid, P. Gope. “A Blockchain based Secure Communication Framework for Community Interaction,” in Journal of Information Security and Applications, Vol. 58, pp. 102790, 2021. (2020 SCI Impact Factor: 2.327)
[J55] P. Bagga, A. K. Das, M. Wazid, J. J. P. C. Rodrigues, K. -K. R. Choo, and Y. Park. “On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System,” in IEEE Transactions on Vehicular Technology, Jan. 2021, Accepted. (2020 SCI Impact Factor: 5.978)
[J54] A. K. Das, B. Bera, M. Wazid, S. S. Jamal, and Y. Park. “iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment,” in IEEE Access, 2021, Accepted. (2020 SCI Impact Factor: 3.4)
[J53] A. K. Das, B. Bera, M. Wazid, S. S. Jamal, and Y. Park. “On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure,” in IEEE Access, 2021, Accepted. (2020 SCI Impact Factor: 3.4)
[J52] M. Wazid, A. K. Das, S. Shetty, P. Gope, and J. J. P. C. Rodrigues. “Security in 5G-Enabled Internet of Things Communication: Issues, Challenges and Future Research Roadmap,” in IEEE Access, 2021, Accepted. (2020 SCI Impact Factor: 3.745)
[J51] J. Srinivas, A. K. Das, M. Wazid, and A. V. Vasilakos. “Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System,” in IEEE Internet of Things Journal, 2020, Accepted. (2020 SCI Impact Factor: 9.5)
[J50] S. Pundir, M. S. Obaidat, M. Wazid, A. K. Das, D. P. Singh, and J. J. P. C. Rodrigues. “MADP-IIME: Malware Attack Detection Protocol in IoT-Enabled Industrial Multimedia Environment using Machine Learning Approach,” in Multimedia Systems (Springer), 2020, Accepted. (2019 SCI Impact Factor: 1.563)
[J49] N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues, and Y. Park. “BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment,” in IEEE Access, 2020, Accepted. (2018 SCI Impact Factor: 4.098)
[J48] M. Wazid, A. K. Das, V. Bhat K, and A. V. Vasilakos. “LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environments,” in Journal of Network and Computer Applications (Elsevier), Vol. 150, pp. 102496, 2020, DOI: 10.1016/j.jnca.2019.102496. (2018 SCI Impact Factor: 5.273)
[J47] K. Park, S. Noh, H. Lee, A. K. Das, M. Kim, Y. Park, and M. Wazid. “LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme without Verification Table in Medical Internet of Things,” in IEEE Access, 2020, Accepted. (2018 SCI Impact Factor: 4.098)
[J46] P. Bagga, A. K. Das, M. Wazid, J. J. P. C. Rodrigues, and Y. Park. “Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges,” in IEEE Access, 2020, Accepted. (2018 SCI Impact Factor: 4.098)
[J45] M. Wazid, A. K. Das, S. Shetty, and M. Jo. “A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things,” in IEEE Access, 2020. (2018 SCI Impact Factor: 4.098)
[J44] S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park. “Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment,” in Sensors (MDPI), Accepted, 2020. (2018 SCI Impact Factor: 3.031)
[J43] S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park. “Intrusion Detection Protocols in Wireless Sensor Networks integrated to Internet of Things Deployment: Survey and Future Challenges,” in IEEE Access, Vol. 8, pp. 3343-3363, 2020, DOI: 10.1109/ACCESS.2019.2962829. (2018 SCI Impact Factor: 4.098)
[J42] M. Wazid, A. K. Das, J. J. P. C. Rodrigues, S. Shetty, and Y. Park. “IoMT Malware Detection Approaches: Analysis and Research Challenges,” in IEEE Access, 2019, In Press, DOI: 10.1109/ ACCESS.2019.2960412.2019. (2018 SCI Impact Factor: 4.098)
[J41] M. Wazid, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park. “LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT,” in Sensors (MDPI), Vol. 19, No. 24, Article No. 5539, pp. 1-21, 2019, DOI: 10.3390/s19245539. (2018 SCI Impact Factor: 3.031)
[J40] M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues, and Y. Park. “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment,” in IEEE Internet of Things Journal, 2019, Accepted. (2018 SCI Impact Factor: 9.515)
[J39] M. Wazid, P. R. Dsouza, A. K. Das, V. Bhat K, N. Kumar, and Joel J. P. C. Rodrigues. “RAD-EI: A routing attack detection scheme for edge-based IoT environment,” in International Journal of Communication Systems (Wiley), 2019, Accepted. (2018 SCI Impact Factor: 1.779)
[J38] A. K. Das, M. Wazid, A. R. Yannam, J. J. P. C. Rodrigues, and Y. Ho Park. “Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment,” in IEEE Access, Vol. 7, No. 1, pp. 55382-55397, 2019. (2018 SCI Impact Factor: 4.098)
[J37] M. Wazid, A. K. Das, and J. -H. Lee. “User Authentication in a Tactile Internet Based Remote Surgery Environment: Security Issues, Challenges, and Future Research Directions,” in Pervasive and Mobile Computing (Elsevier), 2019, Accepted. (2018 SCI Impact Factor: 2.974)
[J36] M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos, and J. J. P. C. Rodrigues. “Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment,” in IEEE Internet of Things Journal, 2018, In Press, DOI: 10.1109/JIOT.2018.2888821. (2017 SCI Impact Factor: 5.863)
[J35] A. K. Das, M. Wazid, N. Kumar, A. V. Vasilakos, and J. J. P. C. Rodrigues. “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment,” in IEEE Internet of Things Journal, 2018, In Press, DOI: 10.1109/JIOT.2018.2877690. (2017 SCI Impact Factor: 5.863)
[J34] M. Wazid, A. K. Das, and A. V. Vasilakos. “Authenticated key management protocol for cloud-assisted body area sensor networks,” in Journal of Network and Computer Applications (Elsevier), 2018, Accepted. (2017 SCI Impact Factor: 3.991)
[J33] M. Wazid, A. K. Das, R. Hussain, G. Succi, and J. J. P. C. Rodrigues. “Authentication in cloud-driven IoT-based big data environment: survey and outlook,” in Journal of Systems Architecture, 2018, 2018, In Press, DOI: 10.1016/j.sysarc.2018.12.005. (2017 SCI Impact Factor: 0.913)
[J32] M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos. “Design of Secure Key Management and User Authentication Scheme for Fog Computing Services,” in Future Generation Computer Systems (Elsevier), 2018, Accepted. (2017 SCI Impact Factor: 4.639)
[J31] M. Wazid, A. K. Das, and J. -H. Lee. “Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions,” in Journal of Ambient Intelligence Humanized Computing (Springer), 2018, Accepted. (2017 SCI Impact Factor: 1.423)
[J30] J. Srinivas, A. K. Das, M. Wazid, and N. Kumar. “Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things,” in IEEE Transactions on Dependable and Secure Computing, 2018, Accepted. (2017 SCI Impact Factor: 4.410)
[J29] V. Odelu, S. Zeadally, A. K. Das, M. Wazid, D. He. “A Secure Enhanced Privacy-Preserving Authentication in Wireless Mobile Networks,” in Telecommunication Systems (Springer), 2018, Accepted. (2016 SCI Impact Factor: 1.542)
[J28] M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo. “Design of Secure User Authenticated Key Management Protocol for Generic IoT Network,” in IEEE Internet of Things Journal, Vol. 5, No. 1, pp. 269-282, 2018, DOI: 10.1109/JIOT.2017.2780232, (2016 SCI Impact Factor: 7.596)
[J27] M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo. “Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment,” in IEEE Transactions on Dependable and Secure Computing, 2017, Accepted. (2016 SCI Impact Factor: 2.926)
[J26] M. Wazid, A. K. Das, N. Kumar, M. Conti, and A. V. Vasilakos. “A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment,” in IEEE Journal of Biomedical and Health Informatics (Formerly, IEEE Transactions on Information Technology in Biomedicine), 2017, Accepted. (2016 SCI Impact Factor: 3.451)
[J25] M. Wazid, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues. “Secure Three-factor User Authentication Scheme for Renewable Energy Based Smart Grid Environment,” in IEEE Transactions on Industrial Informatics, Vol. 13, No. 6, pp. 3144-3153, 2017. (2016 SCI Impact Factor: 6.764)
[J24] M. Wazid, S. Zeadally, A. K. Das, “Mobile Banking: Malware Threats and Security Solutions”, in IEEE Consumer Electronics Magazine, Vol. 8, No. 2, pp. 56-60, 2019. (2017 SCI Impact Factor: 1.434)
[J23] A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. -K. R. Choo, and Y. Park. “Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment,” in IEEE Journal of Biomedical and Health Informatics (Formerly, IEEE Transactions on Information Technology in Biomedicine), 2017, Accepted. (2016 SCI Impact Factor: 3.451)
[J22] M. Wazid, A. K. Das, M. K. Khan, A. A. -D. A. -Ghaiheb, N. Kumar and A. V. Vasilakos. “Secure Authentication Scheme for Medicine Anti-counterfeiting System in IoT Environment,” in IEEE Internet of Things Journal, 2017, Accepted. (2016 SCI Impact Factor: 7.596)
[J21] M. Wazid, A. K. Das, N. Kumar, V. Odelu, A. G. Reddy, K. Park, and Y. Park. “Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks,” in IEEE Access, 2017, Accepted. (2016 SCI Impact Factor: 3.224)
[J20] S. Challa, M. Wazid, A. K. Das, N. Kumar, A. G. Reddy, E. -J. Yoon, and K. -Y. Yoo. “Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications,” in IEEE Access, Vol. 5, pp. 3028-3043, 2017. (2016 SCI Impact Factor: 3.240)
[J19] A. K. Das, S. Zeadally, M. Wazid. “Lightweight Authentication Protocols For Wearable Devices,” in Computers Electrical Engineering (Elsevier), 2017, Accepted. (2016 SCI Impact Factor: 1.570)
[J18] S. Challa, M. Wazid, A. K. Das, M. K. Khan, “Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions”, in IEEE Consumer Electronics Magazine, 2017, Accepted. (2016 SCI Impact Factor: 1.153)
[J17] V. Odelu, A. K. Das, M. Wazid, M. Conti. “Provably Secure Authenticated Key Agreement Scheme for Smart Grid,” in IEEE Transactions on Smart Grid, 2016, Accepted. (2016 SCI Impact Factor: 6.645)
[J16] M. Wazid, S. Zeadally, A. K. Das, V. Odelu. “Analysis of Security Protocols for Mobile Healthcare,” in Journal of Medical Systems (Springer),Vol. 40, No. 11, pp. 1-10, 2016. (2016 SCI Impact Factor: 2.456)
[J15] F. Wu, L. Xu, S. Kumari, X. Li, J. Shen, K. -K. R. Choo, M. Wazid, and A. K. Das. “A novel and efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment,” in Journal of Network and Computer Applications (Elsevier), Vol. 89, pp. 72-85, 2017. (2016 SCI Impact Factor: 3.500)
[J14] M. Wazid and A. K. Das. “A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks,” in Wireless Personal Communications (Springer), Vol. 94, No. 3, pp. 1165-1191, 2017. (2016 SCI Impact Factor: 0.951)
[J13] V. Odelu, A. Kumar Das, S. Kumari, X. Huang, and M. Wazid. “Provably secure authenticated key agreement scheme for distributed mobile cloud computing services,” in Future Generation Computer Systems (Elsevier), Vol. 68, pp. 74-88, 2017. (2016 SCI Impact Factor: 3.997)
[J12] M. Wazid, A. K. Das, S. Kumari, M. K. Khan. “Design of sinkhole node detection mechanism for hierarchical wireless sensor networks,” in Security and Communication Networks (Wiley), Vol. 9, No. 17, pp. 4596-4614, 2016. (2016 SCI Impact Factor: 1.067)
[J11] A. K. Sutrala, A. K. Das, V. Odelu, M. Wazid, S. Kumari. “Secure anonymity-preserving password-based user authentication and session key agreement protocol for telecare medicine information systems,” in Computer Methods and Programs in Biomedicine (Elsevier), Vol. 135, pp. 167-185, 2016. (2016 SCI Impact Factor: 2.503)
[J10] D. Mishra, A. K. Das, S. Mukhopadhyay, M. Wazid. “A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography,” in Wireless Personal Communications (Springer), 2016, Accepted. (2016 SCI Impact Factor: 0.951)
[J9] S. Kumari, A. K. Das, M. Wazid, X. Li, F. Wu, K. -K. R. Choo, M. K. Khan. “On the design of a secure user authentication and key agreement scheme for wireless sensor networks,” in Concurrency and Computation: Practice and Experience (Wiley), 2016, Accepted. (2016 SCI Impact Factor: 1.133)
[J8] M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, V. Odelu. “Secure anonymous mutual authentication for star two-tier wireless body area networks,” in Computer Methods and Programs in Biomedicine (Elsevier), Vol. 135, pp. 37–50, 2016. (2016 SCI Impact Factor: 2.503)
[J7] M. Wazid, A. K. Das, S. Kumari, X. Li, F. Wu. “Provably secure biometric-based user authentication and key agreement scheme in cloud computing,” in Security and Communication Networks (Wiley), Vol. 9, No. 17, pp. 4103-4119, 2016. (2016 SCI Impact Factor: 1.067)
[J6] M. Wazid and A. K. Das. “An Efficient Hybrid Anomaly Detection Scheme Using K-means Clustering for Wireless Sensor Networks,” in Wireless Personal Communications (Springer), Vol. 90, No. 4, pp 1971-2000, 2016. (2016 SCI Impact Factor: 0.951)
[J5] M. Wazid, A. K. Das, S. Kumari, X. Li, F. Wu. “Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS,” in Security and Communication Networks (Wiley), Vol. 9, No. 13, pp. 1983-2001, 2016. (2016 SCI Impact Factor: 1.067)
[J4] A. K. Das, A. K. Sutrala, S. Kumari, V. Odelu, M. Wazid, X. Li. “An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks,” in Security and Communication Networks (Wiley), Vol. 9, No. 13, pp. 2070-2092, 2016. (2016 SCI Impact Factor: 1.067).
[J3] A. Bijalwan, M. Wazid, E. S. Pilli, R. C. Joshi, “Forensics of Random-UDP Flooding Attacks”, Journal of Networks, VOL. 10, No. 5, pp. 287-293, 2015 (indexed in SCOPUS and DBLP).
[J2] A. Joshi, M. Wazid, R. H. Goudar, “An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force
and Cryptanalytic Attacks”, Procedia Computer Science (Elsevier), Vol. 48, pp. 360-366, 2015 (indexed in SCOPUS).
[J1] D. P. Singh, R. H. Goudar, M. Wazid, “Hiding the Sink Location from the Passive Attack in WSN”, Procedia Engineering (Elsevier), Vol. 64, pp. 16-25, 2013 (indexed in SCOPUS).
Selected Conferences/Workshops Papers
[C63] A. Patwal, M. S. Obaidat, G. Dangwal, M. Wazid, A. K. Das, B. Sadoun, and D. P. Singh. "Enhanced Intrusion Detection System for Securing UAV Networks in Smart Farming Applications,"in IEEE International Conference on Computer, Information and Telecommunication Systems (CITS'25), 16-18 July, 2025, Colmar, France.
[C62] S. Thapliyal, M. Wazid and D. P. Singh. "Design of Voice Based Security Protocol For IoT-Driven AI-Enabled Industry 5.0," in IEEE International Conference on Intelligent and Secure Engineering Solutions (CISES'25), 11-13 August, 2025, Greater Noida, India.
[C61] S. S. Rawat, R. Sharma, B. J. Peter, M Wazid, S. Thapliyal and D. Giri. "A Blockchain-Based Voting System Using Zero-Knowledge Proofs for Enhanced Privacy and Verifiability," in IEEE International Conference on Computing, Intelligence, and Application (CIACON' 25), 18-19 July, 2025, Durgapur, West Bengal, India.
[C60] M. Bhandari, M. S. Obaidat, I. Tomar, A. Gupta, I. Singh, D. Singh, S. Mittal and M. Wazid. "Machine Learning-Envisioned Mechanism for Phishing Attack Identification Through URLs," in IEEE International Conference on Computer, Information and Telecommunication Systems (CITS'25), 16-18 July, 2025, Colmar, France.
[C59] R. Bartwal, A. Semwal, A. S. Pal, A. Mewar, M. Wazid, S. Mittal, N. Mohd, and D. P. Singh. "Design of Blockchain-Envisioned Security Mechanism for Anti-malware as a Service," in IEEE International Conference on Electronics, Computing and Communication Networking Automation Technologies (ICEC2NT), September 03-04, 2025, Pune, India.
[C58] S. Mittal, M. Wazid, D. P. Singh, A. K. Mishra. "An Effective and Secure Transfer Learning-based Mechanism for Drone Detection," in IEEE OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 5.0 (OTCON), April 9-11, 2025, Raigarh, India.
[C57] P. Bhatt, M. S. Obaidat, G. Dangwal, M.Wazid, A. K. Das, and B. Sadoun."Machine Learning-Based Security Mechanism for Detecting Phishing Attacks," in IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI'24), October 16-18, 2024, Beijing, China.
[C56] M. Gupta, S. Mittal, M. Wazid, A. K. Mishra, and D. Giri. "Design of Blockchain-Envisioned Document Verification System," in 6th IEEE International Conference on Computational Intelligence and Networks (CINE 2024), Bhubaneswar India.
[C55] R. Bakshi, S. Lingwal, K. C. Bhatt, S. Thapliyal, M. Wazid, D. P. Singh. "A Robust Machine Learning-Based Mechanism for Detection and Analysis of Malware Attacks," in 6th International Conference Futuristic Trends in Networks and Computing Technologies, Procedia Computer Science, Elsevier, 23-24 December, 2024, Haldwani, India.
[C54] M. P. Jariwala, M. S. Obaidat, M. Wazid, A. K. Mishra and D. P. Singh. "Designing Blockchain-Based Decentralized Scheme for Secure File Storage System," in 13th IEEE International Conference on Computer, Information and Telecommunication Systems (CITS'24), July 17-19, 2024, Girona, Spain.
[C53] N. Gupta, S. Thapliyal, A. Sharma, J. Sheladia, M. Wazid,and D. Giri. "Deep Learning Approach for Malicious URL Detection using CNN, RNN, LSTM and Bi-LSTM models," in 6th IEEE International Conference on Computational Intelligence and Networks (CINE 2024), Bhubaneswar India.
[C52] A. Sharma, S. Thapliyal, M. Wazid, A. K. Mishra, P. Kumar, D. Giri. "A Secure Mechanism for Password Hash Value Generator with the Security Analysis of Various Hashing Algorithms," in 4th International Conference on Computer, Communication, Control & Information Technology (C3IT'24), September 28-29, 2024, Hooghly, India.
[C51] D. Singh, M. Singh, M. Wazid, S. Thapliyal, D. P. Singh, D. Giri and A. Karati. "Design of a Formally Secure Generic Framework for Smart Health Monitoring," 6th ACM International Electronics Communication Conference (IECC), Fukuoka, Japan, July 19-21, 2024.
[C50] V. Karnatak, N. Tripathi, A. K. Mishra, M. Wazid, A. K. Das, M. Guizani and S. Shetty. "AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure," in IEEE International Wireless Communications and Mobile Computing (IWCMC), May 27-31, 2024, Ayia Napa, Cyprus. (Rank "A" Conference of the field)
[C49] Aakash, S. Mittal, M. Wazid, A. K. Mishra, A. K. Das, S. Shetty, M. Guizani. "EM-PAD: An Effective Mechanism for Phishing Attack Detection," in IEEE International Wireless Communications and Mobile Computing (IWCMC), May 27-31, 2024, Ayia Napa, Cyprus. (Rank "A" Conference of the field)
[C48] S. Saha, A. K. Das, S. Mittal, and M. Wazid. "Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications," in IEEE International Conference on Computer Communications (INFOCOM) Workshops: 7th International Workshop on DroneCom: Drone-Assisted Wireless Communications for 5G and Beyond (DroneCom 2024), 20-23 May 2024, Vancouver, Canada, pp. 1-6. [Rank: A* Conference of the field]
[C47] S. Mittal, M. Wazid, D.P. Singh, M. Singh. "An Ensemble Learning Based Approach for Detection of Malware Attacks in IoT Network," in IEEE OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0 (OTCON 3.0), June 5-7, 2024, Raigarh, India.
[C46] S. Rawat, S. Mittal, N. K. Singh, S. Kumar, C. Shakya, M. Wazid, and N. Mohd, "Designing of advanced intrusion detection mechanism for cyber attacks," in 4th International Conference on Machine Learning and Big Data Analytics (ICMLBDA), Springer Proceedings in Mathematics & Statistics Series, May 09-11, 2024, Kurukshetra, India.
[C45] P. Bhutani, S. Thapliyal, M. Wazid, A. K. Mishra, and D. P. Singh."Machine Learning-Envisioned Malware Attack Detection Mechanism for Edge Computing-Based Networks," in 3rd International Conference on Network Security and Blockchain Technology (ICNSBT), Springer Lecture Notes in Networks and Systems Series, June 06-08, 2024, Jalpaiguri, India.
[C44] A. Sharma, M. Wazid, and A. K. Mishra. "Design of a Mechanism for the Analysis of Cybersecurity Breaches and Their Ripple Effect on Global Financial Market," in 3rd International Conference on Network Security and Blockchain Technology (ICNSBT), Springer Lecture Notes in Networks and Systems Series, June 06-08, 2024, Jalpaiguri, India.
[C43] S. Mittal, A. K. Mishra, M. Wazid, D. P. Singh, A. K. Das, and S. Shetty. "Multiclass Classification Approaches for Intrusion Detection in IoT-driven Aerial Computing Environment," in IEEE Global Communications Conference: Selected Areas in Communications: Aerial Communications (GLOBECOM 2023), December 4-8, 2023, Kuala Lumpur, Malaysia. (Rank "B" Conference of the field)
[C42] A. K. Mishra, M. S. Obaidat, H. Bhajpai, P. Trivedi, M. Wazid, D. P. Singh, J. J. P. C. Rodrigues, and B. Sadoun. "Ransomware attacks detection methodology to protect IoT-enabled critical infrastructures," in IEEE Global Communications Conference: Communication QoS, Reliability and Modeling (GLOBECOM 2023), December 4-8, 2023, Kuala Lumpur, Malaysia. (Rank "B" Conference of the field)
[C41] P. Kumar, M. S. Obaidat, P. Pandey, M. Wazid, A. K. Das, and D. P. Singh. "Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme," in IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI 2023), 18 - 20 October 2023, Chongqing, China.
[C40] B. Pant, M. S. Obaidat, S. Singh, M. Pant, M. Wazid, A. K. Das, and K. -F. Hsiao. "SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications," in IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI 2023), 18 - 20 October 2023, Chongqing, China.
[C39] A. K. Mishra, M. Wazid, D. P. Singh, A. K. Das, and M. Guizani. "Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme," in International Wireless Communications and Mobile Computing (IWCMC'23), June 19-23, 2023, Marrakesh, Morocco. (Rank "A" Conference of the field)
[C38] S. Aggarwal, S. Thapliyal, M. Wazid, and D. P. Singh. "Design of a Robust Technique for Fake News Detection," in 4th IEEE Global Conference for Advancement in Technology (GCAT), October 06-08, Bangalore, India.
[C37] D. Singh, M. Wazid, D. P. Singh, A. K. Das, and J. J. P. C. Rodrigues. "Embattle The Security of E-Health System Through A Secure Authentication and Key Agreement Protocol," in International Wireless Communications and Mobile Computing (IWCMC'23), June 19-23, 2023, Marrakesh, Morocco. (Rank "A" Conference of the field)
[C36] S. G. Rawat, M. S. Obaidat, S. Pundir, M. Wazid, A. K. Das, D. P. Singh, K.-F. Hsiao, "A Survey of DDoS Attacks Detection Schemes in SDN Environment," in International Conference on Computer, Information and Telecommunication Systems (CITS'23), July 10-12, 2023, Genoa, Italy.
[C35] M. Naudiyal, S. Thapliyal, V. C. Rana, M. Dhiman, A. Malik, A. K. Mishra, M. Wazid, and D. P. Singh, "Secure Blockchain-based Framework for Smart City Applications," in IEEE World Conference on Communication & Computing (WCONF'23), July 14-16, 2023, Naya Raipur, India.
[C34] C. Negi, A. K. Mishra, A. Verma, Z. Ganguli, S. Thapliyal, M. Wazid, and D. P. Singh, "A Robust Approach for Malware Attacks Detection in the Internet of Things Communications," in IEEE World Conference on Communication & Computing (WCONF'23), July 14-16, 2023, Naya Raipur, India.
[C33] S. G. Rawat, S. Pundir, M. Wazid, D. P. Singh, S. Pundir, "Design of an Efficient Entropy-based DDoS Attacks Detection Scheme in Software-Defined Networking," in IEEE World Conference on Communication & Computing (WCONF'23), July 14-16, 2023, Naya Raipur, India.
[C32] K. Singh, S. Thapliyal, N. Garg, M. Wazid and D. P. Singh, "An Effective Machine Learning-based Malware Detection Approach", Second International Conference on Machine Learning, Deep learning and Computational Intelligence for Wireless Communication (MDCWC), Springer, Signals and Communication Technology Series, Tiruchirappalli, India, 22-24 June 2023.
[C31] A. K. Mishra, M. Wazid and D. P. Singh, "Design of a cloud-based security mechanism for Industry 4.0 communication", IEEE 3rd International Conference on Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India, 26-28 May 2023.
[C30] D. Singh, S. Thapliyal, M. Wazid, D. P. Singh , "Role of Deep Learning in a Secure Telemedicine System with a Case Study of Heart Disease Prediction," in 7th International Conference on ICT for Intelligent Systems (ICTIS), Springer, Smart Innovation, Systems and Technologies (SIST) Series, Ahmedabad, India, 27-28 April 2023.
[C29] P. Pandey, M. Wazid, A. K. Mishra, N. Mohd, D. P. Singh, "Need of Cyber Security, Tools, Uses and Future Research," in IEEE 7th International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 11-12 April, 2023.
[C28] J. Singh, D. Sarkar, M. Wazid, A. Taparia, D. K. Bisure and N. Mohd, "Design of a Contextual IoT Framework for the Improved User Experience and Services", in International Conference on Artificial Intelligence and Internet of Things (ICAII), Springer Lecture Notes in Communications in Computer and Information Science (CCIS) Series, Jamshedpur, India, 10-11 February, 2023.
[C27] A. Sripesh, M. Wazid, D. P. Singh, A. K. Das, and B. Verma. "BAKP-IoDA: Blockchain Driven Authentication and Key Agreement Protocol for Internet of Drones Based Applications," in 28th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2020) Workshop: 5th Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom 2022), Sydney, Australia, October 17-21, 2022. (Rank "A*" Conference of the field)
[C26] S. Barthwal, S. Pundir, M. Wazid, D. P. Singh and S. Pundir, "Design of an energy aware cluster-based routing scheme to minimize energy consumption in wireless sensor networks", International Conference on Advanced Network Technologies and Intelligent Computing (ANTIC-2022), Springer Communications in Computer and Information Science (CCIS), Series, Varanasi, India, 22-24 December, 2022.
[C25] J. Singh, M. Wazid, D. P. Singh, S. Pundir, "An embedded LSTM based scheme for depression detection and analysis", 4th International Conference on Innovative Data Communication Technologies and Application, Procedia Computer Science, Elsevier, Coimbatore, India, November 3-4, 2022.
[C24] N. Lath, K. Thapliyal, K. Kandpal, M. Wazid, A. K. Das and D. P. Singh, "BDESF-ITS: Blockchain-Based Secure Data Exchange and Storage Framework for Intelligent Transportation System," in IEEE International Conference on Computer Communications (INFOCOM)- Artificial Intelligence and Blockchain-Enabled Secure and Privacy-Preserving Air and Ground Smart Vehicular Networks (AIBESVN) Workshop, London, United Kingdom (in virtual mode) 2022. (Rank "A*" Conference of the field)
[C23] S. Thapliyal, M. Wazid and D. P. Singh, "Defining the Convergence of Artificial Intelligence and Cyber Security with a Case Study of Email Spam Detection," in International Conference on Soft Computing and Signal Processing, (ICSCSP'22), Springer, Smart Innovation, Systems and Technologies (SIST) Series, Hyderabad, India, 24-25 June 2022.
[c22] S. Thapliyal, M. Wazid and D. P. Singh, "Blockchain driven Smart Healthcare System: Challenges, Technologies and Future Research", in 6th International Conference on Information and Communication Technology for Intelligent Systems (ICTIS'22), Springer, Smart Innovation, Systems and Technologies (SIST) Series, Ahmedabad, India, 22-23 April 2022.
[c21] S. Barthwal, S. Pundir, M. Wazid and D. P. Singh, "An improved energy conservation routing mechanism in heterogeneous wireless sensor networks", in 6th International Conference on Information and Communication Technology for Intelligent Systems (ICTIS'22), Springer, Smart Innovation, Systems and Technologies (SIST) Series, Ahmedabad, India, 22-23 April 2022.
[C20] N. Garg, M. S. Obaidat, M. Wazid, A. K. Das, and D. P. Singh. "SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications," in 55th IEEE International Conference on Communications (ICC 2021), Montreal, Canada, 2021, Accepted. (Rank "A" Conference of the field)
[C19] M. Wazid, M. S. Obaidat, A. K. Das, and P. Vijayakumar. "SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things," in IEEE Global Communications Conference (GLOBECOM 2020), 7-11 December 2020, Taipei, Taiwan. (Rank "A" Conference of the field)
[C18] M. Wazid, B. Bera, A. Mitra, A. K. Das, and R. Ali. "Private Blockchain-Envisioned Security Framework for AI-Enabled IoT-Based Drone-Aided Healthcare Services," in 26th Annual International Conference on Mobile Computing and Networking (MobiCom 2020) Workshop: 2nd Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom 2020), London, United Kingdom, 21-25 September, 2020, Accepted. (Rank "A*" Conference of the field)
[C17] M. Wazid, A. K. Das, S. Shetty, and Joel J. P. C. Rodrigues. "On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment," in IEEE International Conference on Computer Communications (INFOCOM) Workshops: DroneCom 2020: Drone-Assisted Smart Backhaul Solutions for 5G and Beyond, Toronto, Canada, 6-9 July 2020. (Rank "A*" Conference of the field)
[C16] V. Nauriyal, K. Mittal, S. Pundir, M. Wazid and D. P. Singh, "ANN based multi-class malware detection scheme for IoT Environment", 4th International Conference on ICT for Intelligent Systems (ICTIS'20), Springer, Smart Innovation, Systems and Technologies (SIST) Series, Ahmedabad, India, 15-16 May 2020.
[C15] S. Pundir, D. P. Singh, M. Wazid, "Optimized Low Energy Adaptive Clustering Hierarchy in Wireless Sensor Networks", 5th International Conference on Computing in Engineering and Technology (ICCET), Nanded, India, 9-11 January 2020 (Springer- Advances in Intelligent Systems and Computing (AISC) Series).
[C14] M. Wazid, R. Sharma, A. Katal, R. H. Goudar, P. Bhakuni, A. Tyagi, "Implementation and Embellishment of Prevention of Keylogger Spyware Attacks", International Symposium on Security in Computing and Communications (SSCC), Springer CCIS 2013.
[C13] M. Wazid, A. Katal, R. S. Sachan, R. H. Goudar, D. P. Singh, "Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network", IEEE International Conference on Communication and Signal Processing (ICCSP), 2013.
[C12] M. Wazid, A. Katal, R. H. Goudar, "Hacktivism Trends, Digital Forensic Tools and Challenges: A Survey", IEEE Conference on Information and Communication Technologies (ICT), 2013.
[C11] M. Wazid, A. Katal, R. S. Sachan, R. H. Goudar, "E-TCP for Efficient Performance of MANET under JF Delay Variance Attack", IEEE Conference on Information and Communication Technologies (ICT), 2013.
[C10] R. S. Sachan, M. Wazid, D. P. Singh, R. H. Goudar, "A Cluster Based Intrusion Detection and Prevention Technique for Misdirection Attack inside WSN", IEEE International Conference on Communication and Signal Processing (ICCSP), 2013.
[C9] A. Katal, M. Wazid, R. H. Goudar, "Big Data: Issues, Challenges, Tools and Good Practices", 6th IEEE International Conference on Contemporary Computing (IC3) 2013.
[C8] A. Katal, M. Wazid, R. S. Sachan, D. P. Singh, R. H. Goudar, "Effective Clustering Technique for Selecting Cluster Heads and Super Cluster Head in MANET", IEEE International Conference on Machine Intelligence Research and Advancement (ICMIRA), 2013.
[C7] N. Gupta, M. Wazid, S. Sharma, D. P. Singh, R. H. Goudar, "Coverage Life Time Improvement in Wireless Sensor Networks by Novel Deployment Technique", 1st IEEE International Conference on Emerging Trends in computing, communication and Nanotechnology, 2013.
[C6] S. Sharma, M. Wazid, N. Gupta, D. P. Singh, R. H. Goudar, "Data Recovery with Energy Efficient Task Allocation in Wireless Sensor Networks", 1st IEEE International Conference on Emerging Trends in computing, communication and Nanotechnology, 2013.
[C5] A. Katal, M. Wazid, R. S. Sachan, R. H. Goudar, "Two Way Intrusion Detection and Prevention Techniques for JF Periodic Dropping Attack", IEEE International Conference on Communication and Signal Processing (ICCSP), 2013.
[C4] A. Katal, M. Wazid, R. H. Goudar, "Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission under JF Periodic Dropping Attack", Springer 2nd International Conference on Soft Computing for Problem Solving (SocProS) 2012.
[C3] M. Wazid, R. S. Sachan, R. H. Goudar, "Performance of a LAN under Different Ethernet Wiring Standards", ACM CUBE, 2012.
[C2] M. Wazid, A. Katal, R. H. Goudar, "Cluster and Super Cluster Based Intrusion Detection and Prevention Techniques for JellyFish Reorder Attack", IEEE 2nd International Conference on Parallel, Distributed and Grid Computing (PDGC), 2012.
[C1] M. Wazid, R. K. Singh, R. H. Goudar, "A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques", International Conference on Computer Communication and Networks (CSI- COMNET), 2011.