Remote health monitoring of elderly through wearable sensors M Al-Khafajiy, T Baker, C Chalmers, M Asim, H Kolivand, M Fahim, ... Multimedia Tools and Applications 78 (17), 24681-24706, 2019 | 329 | 2019 |
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey N Tariq, M Asim, F Al-Obeidat, Z Farooqi, T Baker, M Hammoudeh, I Ghafi sensors 19 (8), 1788, 2019 | 266 | 2019 |
A decentralized lightweight blockchain-based authentication mechanism for IoT systems U Khalid, M Asim, T Baker, PCK Hung, MA Tariq, L Rafferty Cluster Computing, 1-21, 2020 | 246 | 2020 |
An energy-aware service composition algorithm for multiple cloud-based IoT applications T Baker, M Asim, H Tawfik, B Aldawsari, R Buyya Journal of Network and Computer Applications 89, 96-108, 2017 | 218 | 2017 |
A collaborative healthcare framework for shared healthcare plan with ambient intelligence AR Javed, MU Sarwar, MO Beg, M Asim, T Baker, H Tawfik Human-centric Computing and Information Sciences 10 (1), 1-21, 2020 | 150 | 2020 |
Blockchain and Smart Healthcare Security: A Survey N Tariq, A Qamar, M Asim, FA Khan Procedia Computer Science 175, 615-620, 2020 | 148 | 2020 |
A Mechanism for Securing IoT-enabled Applications at the Fog Layer N Abbas, M Asim, N Tariq, T Baker, S Abbas Journal of Sensor and Actuator Networks 8 (1), 16, 2019 | 129 | 2019 |
AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes AR Javed, MO Beg, M Asim, T Baker, AH Al-Bayatti Journal of Ambient Intelligence and Humanized Computing, 1-14, 2020 | 117 | 2020 |
DeepDetect: Detection of distributed denial of service attacks using deep learning M Asad, M Asim, T Javed, MO Beg, H Mujtaba, S Abbas The Computer Journal, 2019 | 101 | 2019 |
COMITMENT: A Fog Computing Trust Management Approach M Al-khafajiy, T Baker, M Asim, Z Guo, R Ranjan, A Longo, D Puthal, ... Journal of Parallel and Distributed Computing, 2019 | 100 | 2019 |
A fault management architecture for wireless sensor network M Asim, H Mokhtar, M Merabti Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08 …, 2008 | 87 | 2008 |
A smartphone sensors-based personalized human activity recognition system for sustainable smart cities AR Javed, R Faheem, M Asim, T Baker, MO Beg Sustainable Cities and Society 71, 102970, 2021 | 81 | 2021 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience, 2019 | 81 | 2019 |
A self-managing fault management mechanism for wireless sensor networks M Asim, H Mokhtar, M Merabti arXiv preprint arXiv:1011.5072, 2010 | 68 | 2010 |
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT N Tariq, M Asim, Z Maamar, MZ Farooqi, N Faci, T Baker Journal of Parallel and Distributed Computing 134, 198-206, 2019 | 65 | 2019 |
A cellular approach to fault detection and recovery in wireless sensor networks M Asim, H Mokhtar, M Merabti Sensor Technologies and Applications, 2009. SENSORCOMM'09. Third …, 2009 | 63 | 2009 |
Limitations of simulation tools for large-scale wireless sensor networks MZ Khan, B Askwith, F Bouhafs, M Asim Advanced Information Networking and Applications (WAINA), 2011 IEEE …, 2011 | 62 | 2011 |
Securing SCADA-based critical infrastructures: Challenges and open issues N Tariq, M Asim, FA Khan Procedia Computer Science 155, 612-617, 2019 | 55 | 2019 |
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models S Afzal, M Asim, AR Javed, MO Beg, T Baker Journal of Network and Systems Management 29 (3), 1-27, 2021 | 51 | 2021 |
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things N Tariq, M Asim, FA Khan, T Baker, U Khalid, A Derhab Sensors 21 (1), 23, 2021 | 51 | 2021 |