Our curated selection of journals highlights key advancements in IoT, machine learning, and cybersecurity. Notable contributions include innovative models for securing fog resources in healthcare (Al-Khafajiy et al., ACM Transactions on Internet Technology, 2020), machine learningdriven IoT security solutions (Farooq et al., Journal of Parallel and Distributed Computing, 2022), and blockchain-based mechanisms for detecting internal attacks in IoT (Tariq et al., Sensors, 2021). These works reflect our commitment at Protect Lab to addressing critical challenges in distributed systems, enhancing security, and pushing the boundaries of knowledge in intelligent technologies.
A. Noor, N. Tariq, M. Asim,. et al. A fuzzy logic-based trust framework against sybil and rank attacks in cyber-physical systems. International Journal of Information Security. Vol 24 (196), 2025.
N. Shamim, M. Asim, T. Baker, Z. Pervez, A.I. Awad, and A.Y. Zomaya. Integrating system calls and position-specific scoring for enhanced anomaly detection in Internet of Things environments. Computers & Security, p.104613.
N. Shamim, M. Asim, A. Awad AI, M.K. Khan. Anomaly Detection in Internet of Things System Calls Using a Centroid-Based Vector-Space Model. IEEE Internet of Things Journal. Vol 12 (14) , 2025.
M. Asim, N. Tariq, A. Awad, F. Waheed, U. Ullah, G. Murtaza . SecT: A Zero-Trust Framework for Secure Remote Access in Next-Generation Industrial Networks. IEEE Journal on Selected Areas in Communications. 2025 Apr 11.
S. Iram, T. Fernando, M. Asim, M. and H.M. Shakeel, H.M., Intelligent framework of sustainable cyber-physical services for autonomous manufacturing industries. Service Oriented Computing and Applications, pp.1-21, 2024.
M. Hassan, A.R. Javed, Z. Iqbal, M. Asim, A.I. Awad., DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning. Computer & Security, Vol 139, 2024. DOI (IF: 5.6)
S. Afzal, M. Asim, M. O. Beg, T. Baker, A. Ismail Awad, N. Shamim, Context-aware embeddings for robust multiclass fraudulent URL detection in online social platforms, Computers and Electrical Engineering, Vol 119, 2024.
N. Tariq, M. Asim, F.A. Khan, T. Baker, U. Khalid, A. Derhab, A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors 2021, 21, 23 (IF=3.2).
Javed, M.; Tariq, N.; Ashraf, M.; Khan, F.A.; Asim, M.; Imran, M. Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework. Sensors 2023, 23, 9372.
Shamim, N., Asim, M., Baker, T. and Awad, A.I., 2023. "Efficient Approach for Anomaly Detection in IoT Using System Calls", Sensors, 23(2), p.652.
Shamim, N., Asim, M., Baker, T. and Awad, A.I., 2023. "Efficient Approach for Anomaly Detection in IoT Using System Calls", Sensors, 23(2), p.652.
U. Farooq, N. Tariq, M. Asim, T. Baker, and A. Al-Shamma'a. "Machine Learning and the Internet of Things Security: Solutions and Open Challenges." Journal of Parallel and Distributed Computing, 162, 89-104,2022 (IF=3.7).