Journals

Our curated selection of journals highlights key advancements in IoT, machine learning, and cybersecurity. Notable contributions include innovative models for securing fog resources in healthcare (Al-Khafajiy et al., ACM Transactions on Internet Technology, 2020), machine learningdriven IoT security solutions (Farooq et al., Journal of Parallel and Distributed Computing, 2022), and blockchain-based mechanisms for detecting internal attacks in IoT (Tariq et al., Sensors, 2021). These works reflect our commitment at Protect Lab to addressing critical challenges in distributed systems, enhancing security, and pushing the boundaries of knowledge in intelligent technologies.

  1. U. Farooq, M. Asim, N. Tariq, T. Baker, and A. Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security" Sensors. 2022; 22(12):4539.

  2. D. Arshad, M. Asim ,N. Tariq ,T. Baker ,H. Tawfik ,D. Al-Jumeily. "THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack" PLoS ONE 17(7), 2022.

  3. T. Baker, M. Asim, H. Samwini, N. Shamim, "A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems" Computer Networks, 203, 2022 (IF=4.47) .

  4. U. Farooq, N. Tariq, M. Asim, T. Baker, and A. Al-Shamma'a. "Machine Learning and the Internet of Things Security: Solutions and Open Challenges." Journal of Parallel and Distributed Computing, 162, 89-104,2022 (IF=3.7).

  5. U. Farooq, M. Asim, N. Tariq, T. Baker, and A. Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security" Sensors. 2022; 22(12):4539.

  6. D. Arshad, M. Asim ,N. Tariq ,T. Baker ,H. Tawfik ,D. Al-Jumeily. "THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack" PLoS ONE 17(7), 2022.

  7. Z. Maamar, M. Sellami, F. Masmoudi, M. Asim et. al, A Plug&Play approach for modeling and simulating applications in the era of internet of social things, IET Smart Cities, 3(1) (2021)

  8. A. Nawaz, M.A. Tariq, M. Asim, Z. Maamar, and T. Baker. "Congestion avoidance in wireless sensor network using software defined network." Computing 103, no. 11, 2573-2596, 2021 (IF=2.2).

  9. S. Afzal, M. Asim, A. R. Javed, M. O. Beg and T. Baker, URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models, Journal of Network and Systems Management 29, 21 (2021) (IF=2.25).

  10. S. Afzal, M. Asim, A. R. Javed, M. O. Beg and T. Baker, URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models, Journal of Network and Systems Management 29, 21 (2021) (IF=2.25).

  11. T.ul.Hassan, M. Asim, T. Baker, J. Hassan, N. Tariq, CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications, Transactions on Emerging Telecommunications Technologies, 2021 (IF=1.59).

  12. M. Al-Khafajiy, S. Otoum, T. Baker, M. Asim, Z. Maamar et al., Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model, ACM Transactions on Internet Technology (2020) (IF=1.59)