At Protect Lab, our participation in prestigious conferences underscores our commitment to sharing groundbreaking research. Highlights include innovative contributions such as secure service composition through simulated annealing (Zhou et al., Layered Assurance Workshop, USA, 2012), dynamic monitoring of composed services (Asim et al., Cyberpatterns Workshop, UK, 2012), and advancements in wireless sensor network fault detection and recovery (Asim et al., SENSORCOMM, Greece, 2009). Through these efforts, we consistently push the boundaries of security, IoT, and service composition research on the global stage.
B. Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, M. Merabti, and D. Lamb. “Secure Service Composition Adaptation Based on Simulated Annealing”. Proceedings of the 6th Layered Assurance Workshop 2012, Orlando, Florida, USA, Dec. 2012
D. Llewellyn-Jones, M. Asim, Q. Shi, M. Merabti, “Requirements for Composite Security Pattern Specification,” Second International Workshop on Cyberpatterns 2013: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK., 2013
M.Asim, B. Zhou, D. Llewellyn-Jones, Q. Shi, M. Merabti, “Dynamic Monitoring of Composed Services,” First International Workshop on Cyberpatterns 2012: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK
M. Asim, Hala.Mokhtar, M. Z. Khan, and M. Merabti, “A Sensor Relocation Scheme for Wireless Sensor Networks,” IEEE Workshops of International Conference on Advanced Information Networking and Applications, Biopolis, Singapore, March 2011.
M. Asim, H. Mokhtar, and M. Merabti, “A cellular approach to fault detection and recovery in wireless sensor networks,” in The Third International Conference on Sensor Technologies and Applications, SENSORCOMM, Greece, 2009
N. Tariq, A. Qamar, M. Asim, and F. A. Khan. "Blockchain and smart healthcare security: a survey." Procedia Computer Science 175 (2020): 615-620.
N. Tariq, F.A. Khan, and M. Asim. "Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis" Procedia Computer Science 191 (2021): 425-430.
D. Llewellyn-Jones, M. Asim, Q. Shi, M. Merabti, “Requirements for Composite Security Pattern Specification,” Second International Workshop on Cyberpatterns 2013: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK., 2013
M. Asim, H. Mokhtar, and M. Merabti, “A Cellular Self-Organization Architecture for Wireless Sensor Networks,” in the 9th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 2008
D. Dhouha, M.Asim, D. Llewellyn-Jones, “An Event Processing Approach for Threats Monitoring of Service Compositions”, 8th International Conference on Risks and Security of Internet and Systems, France., Oct 2013
B. Zhou, D. Llewellyn-Jones, D. Lamb, M. Asim,Q. Shi, M. Merabti, “A Heuristic Approach for Secure Service Composition Adaptation,” First International Workshop on Cyberpatterns 2012: Unifying Design Patterns with Security, Attack and Forensic Patterns, Abingdon, UK
B. Zhou, D. Llewellyn-Jones, Q. Shi, M. Asim, and M. Merabti, “Prototype for Design-time Secure and Trustworthy Service Composition,” The 10th Annual IEEE Consumer Communications and Networking Conference – Demos, Las Vegas, USA, Jan. 2013.