Muhammad Asim
Muhammad Asim
Verified email at - Homepage
Cited by
Cited by
Remote health monitoring of elderly through wearable sensors
M Al-Khafajiy, T Baker, C Chalmers, M Asim, H Kolivand, M Fahim, ...
Multimedia Tools and Applications 78 (17), 24681-24706, 2019
An energy-aware service composition algorithm for multiple cloud-based IoT applications
T Baker, M Asim, H Tawfik, B Aldawsari, R Buyya
Journal of Network and Computer Applications 89, 96-108, 2017
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
N Tariq, M Asim, F Al-Obeidat, Z Farooqi, T Baker, M Hammoudeh, I Ghafi
sensors 19 (8), 1788, 2019
A decentralized lightweight blockchain-based authentication mechanism for IoT systems
U Khalid, M Asim, T Baker, PCK Hung, MA Tariq, L Rafferty
Cluster Computing, 1-21, 2020
A Mechanism for Securing IoT-enabled Applications at the Fog Layer
N Abbas, M Asim, N Tariq, T Baker, S Abbas
Journal of Sensor and Actuator Networks 8 (1), 16, 2019
A collaborative healthcare framework for shared healthcare plan with ambient intelligence
AR Javed, MU Sarwar, MO Beg, M Asim, T Baker, H Tawfik
Human-centric Computing and Information Sciences 10 (1), 1-21, 2020
A fault management architecture for wireless sensor network
M Asim, H Mokhtar, M Merabti
Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08 …, 2008
AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes
AR Javed, MO Beg, M Asim, T Baker, AH Al-Bayatti
Journal of Ambient Intelligence and Humanized Computing, 1-14, 2020
A self-managing fault management mechanism for wireless sensor networks
M Asim, H Mokhtar, M Merabti
arXiv preprint arXiv:1011.5072, 2010
Blockchain and Smart Healthcare Security: A Survey
N Tariq, A Qamar, M Asim, FA Khan
Procedia Computer Science 175, 615-620, 2020
A cellular approach to fault detection and recovery in wireless sensor networks
M Asim, H Mokhtar, M Merabti
Sensor Technologies and Applications, 2009. SENSORCOMM'09. Third …, 2009
DeepDetect: Detection of distributed denial of service attacks using deep learning
M Asad, M Asim, T Javed, MO Beg, H Mujtaba, S Abbas
The Computer Journal, 2019
COMITMENT: A Fog Computing Trust Management Approach
M Al-khafajiy, T Baker, M Asim, Z Guo, R Ranjan, A Longo, D Puthal, ...
Journal of Parallel and Distributed Computing, 2019
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ...
Software: Practice and Experience, 2019
Limitations of simulation tools for large-scale wireless sensor networks
MZ Khan, B Askwith, F Bouhafs, M Asim
Advanced Information Networking and Applications (WAINA), 2011 IEEE …, 2011
Cloud-SEnergy: A Bin-Packing Based Multi-Cloud Service Broker for Energy Efficient Composition and Execution of Data-intensive Applications
T Baker, B Aldawsari, M Asim, H Tawfik, Z Maamar, R Buyya
Sustainable Computing: Informatics and Systems, 2018
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
N Tariq, M Asim, Z Maamar, MZ Farooqi, N Faci, T Baker
Journal of Parallel and Distributed Computing 134, 198-206, 2019
Cloud versus Edge: Who Serves the Internet‐of‐Things Better?
Z Maamar, T Baker, M Sellami, M Asim, E Ugljanin, N Faci
Internet Technology Letters, e66, 0
Security policy monitoring of BPMN‐based service compositions
M Asim, A Yautsiukhin, AD Brucker, T Baker, Q Shi, B Lempereur
Journal of Software: Evolution and Process, e1944, 2018
A smartphone sensors-based personalized human activity recognition system for sustainable smart cities
AR Javed, R Faheem, M Asim, T Baker, MO Beg
Sustainable Cities and Society 71, 102970, 2021
The system can't perform the operation now. Try again later.
Articles 1–20