default search action
Muhammad Ajmal Azad
Person information
- affiliation: University of Derby, Department of Computer Science and Mathematics, Derbz, UK
- affiliation: University of Warwick, Department of Computer Science, Warwick, UK
- affiliation: Newcastle University, School of Computing Science, Newcastle Upon Tyne, UK
- affiliation (PhD 2016): University of Porto, Department of Electrical Engineering, Porto, Portugal
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz:
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph. Big Data Min. Anal. 7(2): 340-356 (2024) - [j49]Suraj Harsha Kamtam, Harjinder Singh Lallie, Muhammad Ajmal Azad:
The application of AI techniques for firearm detection in digital forensic investigation. Int. J. Electron. Secur. Digit. Forensics 16(3): 372-396 (2024) - [j48]Yussuf Ahmed, Muhammad Ajmal Azad, A. Taufiq Asyhari:
Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features. Inf. 15(1): 36 (2024) - [j47]Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad, Harjinder Singh Lallie, Yussuf Ahmed:
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet Things 27: 101227 (2024) - [j46]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. ACM Trans. Priv. Secur. 27(1): 1:1-1:25 (2024) - 2023
- [j45]Abdul Wahab Muzaffar, Farhan Riaz, Tarik Abu-Ain, Waleed Abdel Karim Abu-Ain, Farhan Hussain, Muhammad Umar Farooq, Muhammad Ajmal Azad:
Gabor Contrast Patterns: A Novel Framework to Extract Features From Texture Images. IEEE Access 11: 60324-60334 (2023) - [j44]Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Jah Rizvi, Junaid Arshad, Hany F. Atlam:
Corrigendum to "DEEPSEL: A novel feature selection for early identification of malware in mobile applications" [Future Gener. Comput. Syst. 129 (2022) 54-63]. Future Gener. Comput. Syst. 143: 422 (2023) - [j43]Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed, Tahir Sharif:
A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT. Inf. 14(2): 129 (2023) - [j42]Haitham H. Mahmoud, Muhammad Ajmal Azad, Junaid Arshad, Adel Aneiba:
A Framework for Decentralized, Real-Time Reputation Aggregation in IoV. IEEE Internet Things Mag. 6(2): 44-48 (2023) - [i4]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. CoRR abs/2306.06198 (2023) - 2022
- [j41]Junaid Arshad, Muhammad Ajmal Azad, Alousseynou Prince, Jahid Ali, Thanasis G. Papaioannou:
REPUTABLE-A Decentralized Reputation System for Blockchain-Based Ecosystems. IEEE Access 10: 79948-79961 (2022) - [j40]Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, Tahir Sharif:
A comprehensive survey on secure software-defined network for the Internet of Things. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j39]Muhammad Ajmal Azad, Junaid Arshad, Shazia Mahmoud, Khaled Salah, Muhammad Imran:
A privacy-preserving framework for smart context-aware healthcare applications. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j38]Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali, Nader Sohrabi Safa:
A multivariant secure framework for smart mobile health application. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j37]Nader Sohrabi Safa, Faye Rona Mitchell, Carsten Maple, Muhammad Ajmal Azad, Mohammad Dabbagh:
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [j36]Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Jah Rizvi, Junaid Arshad, Hany F. Atlam:
DEEPSEL: A novel feature selection for early identification of malware in mobile applications. Future Gener. Comput. Syst. 129: 54-63 (2022) - [j35]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. Int. J. Appl. Cryptogr. 4(2): 85-103 (2022) - [j34]Hany F. Atlam, Muhammad Ajmal Azad, Nawfal F. Fadhel:
Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model. Sensors 22(5): 2005 (2022) - [c12]Nathan Deguara, Junaid Arshad, Anum Paracha, Muhammad Ajmal Azad:
Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data. IEEE Big Data 2022: 3043-3052 - 2021
- [j33]Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao:
Sharing is Caring: A collaborative framework for sharing security alerts. Comput. Commun. 165: 75-84 (2021) - [j32]Muddasir Rahim, Shaukat Ali, Ahmad Naseem Alvi, Muhammad Awais Javed, Muhammad Imran, Muhammad Ajmal Azad, Dong Chen:
An intelligent content caching protocol for connected vehicles. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j31]Andrii Shalaginov, Muhammad Ajmal Azad:
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications. Future Internet 13(11): 272 (2021) - [j30]Muhammad Ajmal Azad, Junaid Arshad, Syed Muhammad Ali Akmal, Farhan Riaz, Sidrah Abdullah, Muhammad Imran, Farhan Ahmad:
A First Look at Privacy Analysis of COVID-19 Contact-Tracing Mobile Applications. IEEE Internet Things J. 8(21): 15796-15806 (2021) - [j29]Geetanjali Rathee, Farhan Ahmad, Rajinder Sandhu, Chaker Abdelaziz Kerrache, Muhammad Ajmal Azad:
On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things. Inf. Process. Manag. 58(3): 102526 (2021) - [j28]Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. ACM Trans. Cyber Phys. Syst. 5(1): 4:1-4:24 (2021) - [j27]Geetanjali Rathee, Farhan Ahmad, Fatih Kurugollu, Muhammad Ajmal Azad, Razi Iqbal, Muhammad Imran:
CRT-BIoV: A Cognitive Radio Technique for Blockchain-Enabled Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4005-4015 (2021) - 2020
- [j26]Farhan Riaz, Saad Rehman, Muhammad Ajmal Azad, Rehan Hafiz, Ali Hassan, Naif Radi Aljohani, Raheel Nawaz, Rupert C. D. Young, Miguel Tavares Coimbra:
Gaussian Mixture Model Based Probabilistic Modeling of Images for Medical Image Segmentation. IEEE Access 8: 16846-16856 (2020) - [j25]Shazia Tabassum, Muhammad Ajmal Azad, João Gama:
Profiling high leverage points for detecting anomalous users in telecom data networks. Ann. des Télécommunications 75(9-10): 573-581 (2020) - [j24]Hany F. Atlam, Muhammad Ajmal Azad, Ahmed G. Alzahrani, Gary B. Wills:
A Review of Blockchain in Internet of Things and AI. Big Data Cogn. Comput. 4(4): 28 (2020) - [j23]Muhammad Ajmal Azad, Mamoun Alazab, Farhan Riaz, Junaid Arshad, Tariq Abullah:
Socioscope: I know who you are, a robo, human caller or service number. Future Gener. Comput. Syst. 105: 297-307 (2020) - [j22]Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi, Ahmed Alenezi:
Risk-Based Access Control Model: A Systematic Literature Review. Future Internet 12(6): 103 (2020) - [j21]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Andrii Shalaginov:
Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 7(4): 2690-2703 (2020) - [j20]Charith Perera, Mahmoud Barhamgi, Arosha K. Bandara, Muhammad Ajmal Azad, Blaine A. Price, Bashar Nuseibeh:
Designing privacy-aware internet of things applications. Inf. Sci. 512: 238-257 (2020) - [j19]Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. IEEE Trans. Emerg. Top. Comput. 8(2): 313-327 (2020) - [j18]Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao:
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network. IEEE Trans. Ind. Informatics 16(5): 3606-3615 (2020) - [c11]Muhammad Sadiq Hassan Zada, Bo Yuan, Ashiq Anjum, Muhammad Ajmal Azad, Wajahat Ali Khan, Stephan Reiff-Marganiec:
Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). BDCAT 2020: 27-36 - [i3]Muhammad Ajmal Azad, Junaid Arshad, Ali Akmal, Sidrah Abdullah, Farhan Ahmad, Muhammad Ali Imran, Farhan Riaz:
A First Look at Contact Tracing Apps. CoRR abs/2006.13354 (2020)
2010 – 2019
- 2019
- [j17]Nishara Nizamuddin, Khaled Salah, M. Ajmal Azad, Junaid Arshad, Muhammad Habib Ur Rehman:
Decentralized document version control using ethereum blockchain and IPFS. Comput. Electr. Eng. 76: 183-197 (2019) - [j16]Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Razi Iqbal, Muhammad Imran Tariq, Tariq Umer:
Performance analysis of content discovery for ad-hoc tactile networks. Future Gener. Comput. Syst. 94: 726-739 (2019) - [j15]Muhammad Ajmal Azad, Ricardo Morla:
Rapid detection of spammers through collaborative information sharing across multiple service providers. Future Gener. Comput. Syst. 95: 841-854 (2019) - [j14]Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Gener. Comput. Syst. 97: 587-597 (2019) - [j13]Farhan Riaz, Muhammad Ajmal Azad, Junaid Arshad, Muhammad Imran, Ali Hassan, Saad Rehman:
Pervasive blood pressure monitoring using Photoplethysmogram (PPG) sensor. Future Gener. Comput. Syst. 98: 120-130 (2019) - [j12]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [j11]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
PriVeto: a fully private two-round veto protocol. IET Inf. Secur. 13(4): 311-320 (2019) - [j10]Junaid Arshad, Muhammad Ajmal Azad, Mohammad Mahmoud Abdellatif, Muhammad Habib Ur Rehman, Khaled Salah:
COLIDE: a collaborative intrusion detection framework for Internet of Things. IET Networks 8(1): 3-14 (2019) - [j9]Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [c10]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
E2E Verifiable Borda Count Voting System without Tallying Authorities. ARES 2019: 11:1-11:9 - [i2]Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. CoRR abs/1903.12079 (2019) - 2018
- [j8]Muhammad Ajmal Azad, Ricardo Morla, Khaled Salah:
Systems and methods for SPIT detection in VoIP: Survey and future directions. Comput. Secur. 77: 1-20 (2018) - [j7]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
A privacy-aware decentralized and personalized reputation system. Comput. Secur. 77: 514-530 (2018) - [j6]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah:
M2M-REP: Reputation system for machines in the internet of things. Comput. Secur. 79: 1-16 (2018) - [j5]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Gener. Comput. Syst. 89: 44-57 (2018) - [c9]N. AlRayhi, Khaled Salah, N. Al-Kork, Ahmed Bentiba, Zouheir Trabelsi, M. Ajmal Azad:
Cloud Automation to Run Large-Scale Quantum Chemical Simulations. IIT 2018: 75-80 - [p1]Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz:
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 235-258 - [i1]Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie, Razi Iqbal, Mamoun Alazab:
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT. CoRR abs/1812.09160 (2018) - 2017
- [j4]Muhammad Ajmal Azad, Ricardo Morla:
Early identification of spammers through identity linking, social network and call features. J. Comput. Sci. 23: 157-172 (2017) - [c8]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
M2M-REP: Reputation of Machines in the Internet of Things. ARES 2017: 28:1-28:7 - [c7]Muhammad Ajmal Azad, Samiran Bag:
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. SAC 2017: 1711-1717 - 2016
- [b1]Muhammad Ajmal Azad:
Towards mitigating unwanted calls in voice over IP. University of Porto, Portugal, 2016 - [j3]Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah:
Clustering VoIP caller for SPIT identification. Secur. Commun. Networks 9(18): 4827-4838 (2016) - [c6]Muhammad Ajmal Azad, Syed Khurram Rizvi:
Caller-Centrality: Identifying Telemarketers in a VoIP Network. ARES 2016: 290-295 - 2015
- [c5]Muhammad Ajmal Azad, Ricardo Morla:
ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User. CSE 2015: 160-167 - 2013
- [j2]M. Ajmal Azad, Ricardo Morla:
Caller-REP: Detecting unwanted calls with caller social strength. Comput. Secur. 39: 219-236 (2013) - [j1]Junaid Arshad, Muhammad Ajmal Azad, Imran Ali Jokhio, Paul Townend:
Intrusion damage assessment for multi-stage attacks for clouds. IET Commun. 7(12): 1304-1315 (2013) - 2012
- [c4]M. Ajmal Azad, Ricardo Morla:
Mitigating SPIT with Social Strength. TrustCom 2012: 1393-1398 - 2011
- [c3]Muhammad Umer Khan, Ibrar ullah Jan, Abrar Ahmed, M. Ajmal Azad, Naeem Iqbal:
Uncalibrated Visual Servo control with multi-constraint satisfaction. ICRA 2011: 6318-6323 - [c2]Muhammad Ajmal Azad, Ricardo Morla:
Multistage SPIT detection in transit VoIP. SoftCOM 2011: 1-9
2000 – 2009
- 2006
- [c1]Junaid Arshad, Muhammad Ajmal Azad:
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks. SECON 2006: 971-975
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint