Our curated selection of journals highlights key advancements in IoT, machine learning, and cybersecurity. Notable contributions include innovative models for securing fog resources in healthcare (Al-Khafajiy et al., ACM Transactions on Internet Technology, 2020), machine learningdriven IoT security solutions (Farooq et al., Journal of Parallel and Distributed Computing, 2022), and blockchain-based mechanisms for detecting internal attacks in IoT (Tariq et al., Sensors, 2021). These works reflect our commitment at Protect Lab to addressing critical challenges in distributed systems, enhancing security, and pushing the boundaries of knowledge in intelligent technologies.
U. Khalid, M. Asim, T. Baker, et. al, "A decentralized lightweight blockchain-based authentication mechanism for IoT systems", Cluster Computing,23, 2067–2087, 2020. (IF=3.4)
A. Rehman, O.beg, M. Asim, et.al, "AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes", Journal of Ambient Intelligence and Humanized Computing (2020) (IF=4.5)
T. Rose, K. Kifayat, S. Abbas, M. Asim, "A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment", Journal of Parallel and Distributed Computing (2020), 145, 124-139, 2020. (IF=2.29 )
M. Asad, M. Asim, T. Javed, M. Beg, et al. "DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning", The Computer Journal, 63(7), 983–994 ,2019. (IF=1.07)
N. Tariq, M. Asim, Z. Maamar, Z. Farooqi, N. Faci, T. Baker. "A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT", Journal of Parallel and Distributed Computing, 134, 198-206, 2019. (IF=2.29)
N. Tariq, M. Asim, F. Al-Obeidat, F. Zubair, T. Baker, et al. "The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey". Sensors, 19(8), p.1788, 2019. (IF=3.27)
T. Baker, M. Asim, A. MacDermott, et al. "A secure fog‐based platform for SCADA‐based IoT critical infrastructure". Software: Practice and Experience, 50 (5), 503-518, 2019. (IF=1.78)
N. Abbas, M. Asim, N. Tariq, T. Baker, S. Abbas. "A Mechanism for Securing IoT-enabled Applications at the Fog Layer", Journal of Sensor and Actuator Networks, 8 (1), 16, 2019. (ISI indexed) link
M. Asim, A. Yautsiukhin, A. D. Brucker, T. Baker, Q. Shi, B. Lempereur, "Security Policy Monitoring of BPMN-based Service Compositions", Journal of Software: Evolution and Process, 30(9), e1944, 2018 Wiley, (IF=1.17).