Muhammad Asim

ORCID: 0000-0002-2894-7891
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Service-Oriented Architecture and Web Services
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Context-Aware Activity Recognition Systems
  • Security in Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Advanced Software Engineering Methodologies
  • Energy Harvesting in Wireless Networks
  • Distributed systems and fault tolerance
  • User Authentication and Security Systems
  • Business Process Modeling and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Smart Cities and Technologies
  • Cloud Computing and Resource Management
  • Mobile Crowdsensing and Crowdsourcing
  • Anomaly Detection Techniques and Applications
  • Modular Robots and Swarm Intelligence
  • Vehicular Ad Hoc Networks (VANETs)
  • Information and Cyber Security
  • Advanced Power Amplifier Design

Karachi School for Business and Leadership
2025

University of Agriculture Faisalabad
2025

National University of Computer and Emerging Sciences
2017-2024

University of the Punjab
2023

University of Peshawar
2018-2023

Mehran University of Engineering and Technology
2023

Philips (Netherlands)
2020

NXP (Netherlands)
2020

Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
2019

University of Bolton
2015

Due to a rapidly increasing aging population and its associated challenges in health social care, Ambient Assistive Living has become the focal point for both researchers industry alike. The need manage or even reduce healthcare costs while improving quality of service is high government agendas. Although, technology major role play achieving these aspirations, any solution must be designed, implemented validated using appropriate domain knowledge. In order overcome challenges, remote...

10.1007/s11042-018-7134-7 article EN cc-by Multimedia Tools and Applications 2019-01-24

The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception what constitutes infrastructure. rising interconnectedness new industries driven by growing demand for seamless access to information world becomes more mobile connected Internet Things (IoT) grows. Critical are essential foundation today's society, interruption service any these sectors can reverberate through other even around globe. In hyper-connected world,...

10.3390/s19081788 article EN cc-by Sensors 2019-04-14

Abstract The fast propagation of the Internet Things (IoT) devices has driven to development collaborative healthcare frameworks support next generation industry for quality medical healthcare. This paper presents a generalized framework named shared plan (CSHCP) cognitive health and fitness assessment people using ambient intelligent application machine learning techniques. CSHCP provides daily physical activity recognition, monitoring, generate based on collaboration among different...

10.1186/s13673-020-00245-7 article EN cc-by Human-centric Computing and Information Sciences 2020-09-11

The Internet of Things (IoT) has penetrated its roots in almost every domain life. Smart healthcare is one the major domains that extensively uses IoT infrastructures and solutions. IoT-based smart systems have immensely added value to with use wearable mobile devices. This leads a substantial health data sharing for improved, accurate, timely diagnosis. However, are highly vulnerable several security breaches various malignant attacks, such as privacy leakage, tempering, forgery, etc....

10.1016/j.procs.2020.07.089 article EN Procedia Computer Science 2020-01-01

The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed smart ubiquitous objects that are seamlessly connected to the Internet. These deployed as Low power and Lossy Networks (LLN) provide innovative services in various application domains such cities, health, communities. LLN a form network where interconnected devices highly resource-constrained (i.e., power, memory, processing) characterized high loss rates, low data instability communication...

10.3390/jsan8010016 article EN cc-by Journal of Sensor and Actuator Networks 2019-02-18

Abstract At the advent of advanced wireless technology and contemporary computing paradigms, Distributed Denial Service (DDoS) attacks on Web-based services have not only increased exponentially in number, but also degree sophistication; hence need for detecting these within ocean communication packets is extremely important. DDoS were initially projected toward network transport layers. Over years, attackers shifted their offensive strategies application layer. The layer are potentially...

10.1093/comjnl/bxz064 article EN The Computer Journal 2019-06-04

Summary The rapid proliferation of Internet things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures control systems has put stringent performance scalability requirements on modern Supervisory Control Data Acquisition (SCADA) systems. While cloud computing enabled SCADA to cope with the increasing amount data generated by sensors, actuators, there been a growing interest recently deploy edge centers in fog architectures secure low‐latency...

10.1002/spe.2688 article EN Software Practice and Experience 2019-02-26

The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governmental, industrial attention in recent years. Since the IoT specifications are quite different from what can deliver today, many groundbreaking techniques, such as Mobile Ad hoc Networks (MANETs) Wireless Sensor (WSN), gradually been integrated into IoT. Routing Protocol for Low power Lossy network (RPL) is de-facto routing protocol networks. Unfortunately, it susceptible to numerous internal...

10.1371/journal.pone.0271277 article EN cc-by PLoS ONE 2022-07-28

Explainable artificial intelligence (XAI) is of paramount importance to various domains, including healthcare, fitness, skill assessment, and personal assistants, understand explain the decision-making process (AI) model. Smart homes embedded with smart devices sensors enabled many context-aware applications recognize physical activities. This study presents XAI-HAR , a novel XAI-empowered human activity recognition (HAR) approach based on key features identified from data collected located...

10.3389/fpubh.2023.1024195 article EN cc-by Frontiers in Public Health 2023-03-09

A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use applications in every domain life. Along with bounties applications, there are hazards external internal attacks. Unfortunately, mitigating attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, scalability three main factors that influence efficacy security measures. Furthermore, most measures provide centralized solutions, ignoring...

10.3390/s21010023 article EN cc-by Sensors 2020-12-22

Conventionally, the security of critical infrastructures was mainly focused on environmental threats. Cyber attacks, nevertheless, have shifted attention to various other threats and damages. The attackers try exploit vulnerabilities in networks Internet Things (IoT) technologies, since these technologies are integral part systems. Therefore, vulnerability Critical Infrastructure (CI) against cyber has led need devise modern measures. Unavailability or failure one CI can cause enormous...

10.1016/j.procs.2019.08.086 article EN Procedia Computer Science 2019-01-01

Abstract Internet of Things (IoT) fostered a new epoch innovation by interconnecting digital devices to make human life more convenient and attractive. These smart objects are largely deployed as low power lossy networks (LLNs) use routing protocol for LLNs (RPL) routing. Unfortunately, it is extremely vulnerable large variety external internal attacks cause devastating calamitous effects. However, this article's scope revolves around only, where nodes already part legitimate network....

10.1002/ett.4224 article EN Transactions on Emerging Telecommunications Technologies 2021-01-26
Coming Soon ...