Journal Articles:
29. Hoque, M. M., Ahmad, I., Suomalainen, J., Dini, P., & Tahir, M. (2025). On resource consumption of machine learning in communications network security. Computer Networks, 111600.
28. I. Ahmad, S. Gimhana, I.Ahmad and E. Harjula, "Adaptive Trust Architecture for Secure IoT Communication in 6G," in IEEE Networking Letters, doi: 10.1109/LNET.2025.3566909.
27. Jagatheesaperumal, S. K., Ahmad, I., Höyhtyä, M., Khan, S., & Gurtov, A. (2024). Deep Learning Frameworks for Cognitive Radio Networks: Review and Open Research Challenges. Journal of Network and Computer Applications, 2024, 104051, ISSN 1084-8045,
26. Suomalainen, J., Ahmad, I., Shajan, A., & Savunen, T. (2024). Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence. Future Generation Computer Systems, 107500.
25. I. Ahmad et al., "Communications Security in Industry X: A Survey," in IEEE Open Journal of the Communications Society, vol. 5, pp. 982-1025, 2024, doi: 10.1109/OJCOMS.2024.3356076.
24. Ahmad, I., Gentili, A., Singh, R., Ahonen, J., Suomalainen, J., Horsmanheimo, S., ... & Harjula, E. (2023). Edge computing for critical environments: Vision and existing solutions.
23. R. Singh, I. Ahmad and J. Huusko, "Mixed RF-VLC Relaying Systems for High-Speed Rail Communication," in IEEE Photonics Journal, vol. 15, no. 5, pp. 1-12, Oct. 2023, Art no. 7303812, doi: 10.1109/JPHOT.2023.3303362.
22. Ahmad, I., Rodriguez, F., Huusko, J., & Seppänen, K. (2023). On the Dependability of 6G Networks. Electronics, 12(6), 1472.
21. E. Peltonen, I. Ahmad, et al., "The Many Faces of Edge Intelligence," in IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3210584.
20. I. Ahmad, J. Suomalainen, P. Porambage, A. Gurtov, J. Huusko and M. Höyhtyä, "Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions," in IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3205426.
19. Siddiqui, Shahbaz, Sufian Hameed, Syed Attique Shah, Ijaz Ahmad, Adel Aneiba, Dirk Draheim, and Schahram Dustdar. "Towards Software-Defined Networking-based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects." IEEE Access (2022).
18. Ahmad, I., Asghar, Z., Kumar, T., Li, G., Manzoor, A., Mikhaylov, K., ... & Harjula, E. (2022). Emerging Technologies for Next Generation Remote Health Care and Assisted Living. IEEE Access.
17. D. P. M. Osorio, I. Ahmad, J. D. V. Sanchez, A. Gurtov, J. Scholliers, M. Kutila, and P. Porambage, "Towards 6G-enabled Internet of Vehicles: Security and Privacy," in IEEE Open Journal of the Communications Society, doi: 10.1109/OJCOMS.2022.3143098.
16. T. Ye, G. Li, I. Ahmad, C. Zhang, X. Lin and J. Li, "FLAG: Few-shot Latent Dirichlet Generative Learning for Semantic-aware Traffic Detection," in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2021.3131266.
15. I. Ahmad et al., "An Overview of the Security Landscape of Virtual Mobile Networks," in IEEE Access, doi: 10.1109/ACCESS.2021.3133319.
14. J. Okwuibe, J. Haavisto, I. Kovacevic, E. Harjula, I. Ahmad, J. Islam, M. Ylianttila,"SDN-Enabled Resource Orchestration for Industrial IoT in Collaborative Edge-Cloud Networks," in IEEE Access, vol. 9, pp. 115839-115854, 2021, doi: 10.1109/ACCESS.2021.3105944.
13. I. Ahmad et al., "The Challenges of Artificial Intelligence in Wireless Networks for the Internet of Things: Exploring Opportunities for Growth," in IEEE Industrial Electronics Magazine, vol. 15, no. 1, pp. 16-29, March 2021, doi: 10.1109/MIE.2020.2979272.
12. J. Okwuibe, J. Haavisto, E. Harjula, I. Ahmad and M. Ylianttila, "SDN Enhanced Resource Orchestration for Industrial IoT in Containerized Edge Applications," in IEEE Access, doi: 10.1109/ACCESS.2020.3045563.
11. I. Ahmad et al., "Machine Learning Meets Communication Networks: Current Trends and Future Challenges," in IEEE Access, doi: 10.1109/ACCESS.2020.3041765.
10. J. Suomalainen, A. Juhola, S. Shahabuddin, A. Mämmelä and I. Ahmad, "Machine Learning Threatens 5G Security," in IEEE Access, vol. 8, pp. 190822-190842, 2020, doi: 10.1109/ACCESS.2020.3031966.
09. Kumar, T., Harjula, E., Ejaz, M., Manzoor, A., Porambage, P., Ahmad, I., ... & Ylianttila, M. (2020). BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access (2020).
8. Ahmad, Ijaz, Shahriar Shahabuddin, Tanesh Kumar, Jude Okwuibe, Andrei Gurtov, and Mika Ylianttila. "Security for 5G and Beyond." IEEE Communications Surveys & Tutorials 21, no. 4 (2019): 3682-3722.
7. Harjula, Erkki, Pekka Karhula, Johirul Islam, Teemu Leppänen, Ahsan Manzoor, Madhusanka Liyanage, Jagmohan Chauhan, Tanesh Kumar, Ijaz Ahmad, and Mika Ylianttila. "Decentralized iot edge nanoservice architecture for future gadget-free computing." IEEE Access 7 (2019): 119856-119872.
6. Kumar, Tanesh, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, and Mika Ylianttila. "Securing the Gadget-Free Digital Services." IEEE Computer 2018.
5. Ijaz Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36-43, MARCH 2018.
4. Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Mika Ylianttila, Timo Koskela, Timo Braysy, Antti Anttonen, Vesa Pentikinen, Juha-Pekka Soininen, and Jyrki Huusko. "Towards gadget-free Internet services: A roadmap of the naked world." Telematics and Informatics 35, no. 1 (2018): 82-92..
3. Madhusanka Liyanage, Ijaz Ahmed, Jude Okwuibe, Mika Ylianttila, Oscar López Pérez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, “Enhancing Security of Software Defined Mobile Networks”, in IEEE Access, vol. 5, no. , pp. 9422-9438, 2017. doi: 10.1109/ACCESS.2017.2701416
2. Namal Suneth, Ijaz Ahmad, Saad Saud, Markku Jokinen, Andrei Gurtov, and Mika Ylianttila. "Implementation of OpenFlow based Software Defined Radio Architecture: SDN & R" , in Wireless Networks, Springer, pp. 1–15, 2015. doi: 10.1007/s11276-015-0973-5
1. Ahmad, Ijaz.; Namal, S.; Ylianttila, M.; Gurtov, A., "Security in Software Defined Networks: A Survey," in Communications Surveys & Tutorials, IEEE , vol.17, no.4, pp.2317-2346, Fourthquarter 2015. doi: 10.1109/COMST.2015.2474118
Book:
Liyanage, Madhusanka, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, and Mika Ylianttila, eds. A Comprehensive Guide to 5G Security. John Wiley & Sons, 2018.
Conference Articles
32. Ijaz Ahmad, Muzammal Hoque, Jyrki Huusko, Jani Suomalainen, (2024). Decentralizing 6G Security: Existing Challenges and Future Opportunities. Accepted in IEEE Future Networks, Dubai 2024
31. Ijaz Ahmad, Jani Suomalainen, et al. (2024). Disruptive Technological Directions for 6G Security, Accepted in IEEE Conference on Standards for Communications and Networking, Belgrade, Serbia 2024.
30. R. Singh, I. Ahmad, et al., (2024). A Survey on Security of Terahertz Communications. Accepted in IEEE Future Networks, Dubai 2024
29. Md Muzammal Hoque, Ijaz Ahmad, Mohammad Tahir, (2024). Resource Consumption Analysis of Distributed Machine Learning for the Security of Future Networks. Accepted in The 15th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN), 2024.
28. Jani Suomalainen, Pawani Porambage, Ijaz Ahmad, (2024). On Environmental Sustainability of 6G Security. Accepted in IEEE Future Networks 2024
27. Ijaz Ahmad, Hafiz Faheem Shahid, Ijaz Ahmad, Johirul Islam, Kazi Naymul Haque, Erkki Harjula, (2024). Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring. To appear in 18th International Symposium on Medical Information and Communication Technology, May 15-17, 2024, London, UK
26. Varghese, A., Heikkinen, A., Mähönen, P., Ojanperä, T., & Ahmad, I. (2024). Predictive QoS for Cellular-Connected UAV Communications. To appear in IEEE ICC 2024 (accepted).
25. Ahmad, I., Ahmad, I., & Harjula, E. (2024, May). Adaptive Security in 6G for Sustainable Healthcare. In Nordic Conference on Digital Health and Wireless Solutions (pp. 38-47). Cham: Springer Nature Switzerland.
24. Gentili, A., Horsmanheimo, S., Tuomimäki, L., Hyvärinen, P., Kokkoniemi-Tarkkanen, H., & Ahmad, I. (2023, October). Improving 5G Performance in Critical Environments through MPTCP. In 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall) (pp. 1-5). IEEE.
23. I. Ahmad et al., "Sustainability in 6G Networks: Vision and Directions," 2023 IEEE Conference on Standards for Communications and Networking (CSCN), Munich, Germany, 2023, pp. 202-208, doi:
22. R. Singh, I. Ahmad and J. Huusko, "On Secrecy Performance of Mixed THz-FSO Relaying System," 2023 IEEE Conference on Standards for Communications and Networking (CSCN), Munich, Germany, 2023, pp. 271-277, doi: 10.1109/CSCN60443.2023.10453126.
21. Ahmad I, Malinen J, Christou F, Porambage P, Kirstädter A, Suomalainen J. Security in Intent-Based Networking: Challenges and Solutions. Accepted in IEEE CSC 2023.
20. R. Singh, I. Ahmad and J. Huusko, "The Role of Physical Layer Security in Satellite-Based Networks," 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Gothenburg, Sweden, 2023, pp. 36-41, doi: 10.1109/EuCNC/6GSummit58263.2023.10188370.
19. Seppänen, K., Suihko, T., Höyhtyä, M., Suomalainen, J., Ahmad, I. and Anttonen, A., 2022, October. Software-defined payload concepts for smallsat communication constellations. In 27th Ka and Broadband Communications Conference (Ka). Ka and Broadband Communications.
18. I. Ahmad, S. Lembo, F. Rodriguez, S. Mehnert and M. Vehkaperä, "Security of Micro MEC in 6G: A Brief Overview," 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), 2022, pp. 332-337, doi: 10.1109/CCNC49033.2022.9700577.
17. A Ahmad, E Harjula, M Ylianttila, I Ahmad, “Evaluation of Machine Learning Techniques for Security in SDN”, accepted in IEEE GLOBECOM workshop SecSDN 2020, 1-6
16. Kumar, Tanesh, An Braeken, Vidhya Ramani, Ijaz Ahmad, Erkki Harjula, and Mika Ylianttila. "SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks." In 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM), pp. 1-7. IEEE, 2019.
15. Arif, M., Liinamaa, O., Ahmad, I., Pouttu, A., & Ylianttila, M. (2019, April). On the demonstration and evaluation of service-based slices in 5G test network using NFV. In 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW) (pp. 1-6). IEEE.
14. Kumar, Tanesh, Vidhya Ramani, Ijaz Ahmad, An Braeken, Erkki Harjula, and Mika Ylianttila. "Blockchain Utilization in Healthcare: Key Requirements and Challenges." IEEE International Conference on E-health Networking, Application & Services (IEEE HealthCom 2018)
13. I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, A. Gurtov, "5G Security: Analysis of Threats and Solutions", the 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland, September 2017 (Received Best Paper Award)
12. M. Liyanage Jude Okwuibe ; Ijaz Ahmed ;et al., "Software Defined Monitoring (SDM) for 5G mobile backhaul networks," 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Osaka, 2017, pp. 1-6, doi: 10.1109/LANMAN.2017.7972144
11. Ijaz. Ahmad, M. Liyanage, M. Ylianttila and A. Gurtov, "Analysis of deployment challenges of Host Identity Protocol," 2017 European Conference on Networks and Communications (EuCNC), Oulu, Finland, 2017, pp. 1-6.doi: 10.1109/EuCNC.2017.7980675
10. Tanesh Kumar, Ijaz Ahmad, Madhusanka Liyanage, Mika Ylianttila, “From Gadget to Naked World: A Paradigm shift in Privacy and Identity Management”. To appear in IEEE EUCNC conference, 2017.
09. Ijaz Ahmad, Madhusanka Liyanage, Suneth Namal, Mika Ylianttila, Andrei Gurtov, et al., “New concepts for traffic, resource and mobility management in software-defined mobile networks” in IEEE/IFIP Wireless On-demand Network Systems (WONS) 2016.
08. Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila, Andrei Gurtov, Ahmad Bux, Edgardo Montes, “Leveraging LTE Security with SDN and NFV”, in 10th IEEE International Conference on Industrial & Information Systems 2015.
07. Ijaz Ahmad; Namal, S.; Ylianttila, M.; Gurtov, A., "Towards software defined cognitive networking," in New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on , vol., no., pp.1-5, 27-29 July 2015. doi: 10.1109/NTMS.2015.7266528
06. Jose Costa-Requena, Jesús Llorente Santos, Vicent Ferrer Guasch, Kimmo Ahokas, Gopika Premsankar, Sakari Luukkainen, Ijaz Ahmed, Madhusanka Liyanage, Mika Ylianttila, Oscar López Pérez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca “SDN and NFV Integration in Generalized Mobile Network Architecture” , to be appeared in Proc. of European Conference on Networks and Communications (EUCNC), Paris, France. June 2015.
05. Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila, et al., “Security for Future Software Defined Mobile Networks”, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, 2015, pp. 256-264. doi: 10.1109/NGMAST.2015.43. (Received Best Paper Award)
04. Namal, Suneth; Ahmad, Ijaz; Jokinen, Markku; Gurtov, Andrei; Ylianttila, Mika, "SDN Core for Mobility between Cognitive Radio and 802.11 Networks," Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on , vol., no., pp.272,281, 10-12 Sept. 2014.
03. Namal, Suneth, Ijaz Ahmad, Andrei Gurtov, and Mika Ylianttila, "SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control." In Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, pp. 1-5. IEEE, 2013.
02. Namal, Suneth, Ijaz Ahmad, Andrei Gurtov, and Mika Ylianttila. "Enabling Secure Mobility with OpenFlow." In Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, pp. 1-5. IEEE, 2013.
01. Namal, S., Ahmad, I., Gurtov, A., & Ylianttila, M. (2013). “SDN as an enabler for inter-technology load balancing and admission control”. Proc. of IEEE SDN4FNS, 13.
Patent Application:
1. Pellikka, Jani, Petri Leukkunen, and Ijaz Ahmad. "On-Demand Identity Attribute Verification and Certification For Services." U.S. Patent Application 13/543,190, filed January 9, 2014.
Book Chapters:
10. Suomalainen, Jani, and Ijaz Ahmad. "Cybersecurity for Machines in Satellite–Terrestrial Networks." Integration of MTC and Satellites for IoT toward 6G Era (2024): 245-271.
9. Kumar, Tanesh, Juha Partala, Tri Nguyen, Lalita Agrawal, Ayan Mondal, Abhishek Kumar, Ijaz Ahmad, Ella Peltonen, Susanna Pirttikangas, and Erkki Harjula. "Secure Edge Intelligence in the 6G Era."
8. Fujdiak, Radek, Konstantin Mikhaylov, Martin Stusek, Pavel Masek, Ijaz Ahmad, et al. "Security in low-power wide-area networks: state-of-the-art and development toward the 5G." In LPWAN Technologies for IoT and M2M Applications, pp. 373-396. Academic Press, 2020.
7. Ahmad, I., Suomalainen, J. and Huusko, J. (2019). 5G ‐Core Network Security. In Wiley 5G Ref (eds R. Tafazolli, C.‐L. Wang and P. Chatzimisios). doi:10.1002/9781119471509.w5GRef151
6. Madhusanka Liyanage, Ijaz Ahmed, Jude Okwuibe, et al., “Software Defined Security Monitoring in 5G Networks”, Book Chapter in A Comprehensive Guide to 5G Security (2018).
5. Kumar, Tanesh, Madhusanka Liyanage, Ijaz Ahmad, An Braeken, and Mika Ylianttila. "User Privacy, Identity and Trust in 5G." A Comprehensive Guide to 5G Security (2018): 267-279
4. Shahriar Shahabuddin, Sadiqur Rahaman, Faysal Rehman, Ijaz Ahmad, Zaheer Khan “Evolution of Cellular Systems”. Book Chapter in A Comprehensive Guide to 5G Security (2018).
3. Jude Okwuibe, Madhusanka Liyanage, Ijaz Ahmed, Mika Ylianttila “Cloud and Mobile Edge Computing Security”. Book Chapter in A Comprehensive Guide to 5G Security (2018).
2. Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, and Andrei Gurtov. "Design Principles for 5G Security." Book Chapter in A Comprehensive Guide to 5G Security (2018): 75-98.
1. Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei Gurtov. “Load Balancing in Software Defined Mobile Networks”, Book Chapter in Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture, Edited by M. Liyanage, A. Gurtov and M. Yliantilla, John Wiley & Sons, Ltd., of The Atrium, Chichester, West Sussex PO19 8SQ, 2014.
White Papers:
Large language models in 6G security: challenges and opportunities
6G White Paper on Machine Learning in Wireless Communication Networks
6G White paper: Research challenges for Trust, Security and Privacy
Software Defined and Virtualized Mobile Networks, Sigmona White Paper
Holistic approach to 6G networks, by VTT 2021