This is the list of all my peer-reviewed publications ordered by year. You can also visit my Google Scholar or my DBLP page.
Muhammad Ajmal Azad, Sidra Abdullah, Junaid Arshad, Harjinder Lallie, Yussuf Hassan Ahmed Verify and Trust: A Multidimensional Survey of Zero-trust Security in the Age of IoT Accepted in Elsevier Internet of Things (2024) PDF
Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems ACM Transactions on Privacy and Security (2023) PDF
Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph IEEE Big Data Mining and Analytics (2023) PDF
Haitham Mahmoud, Muhammad Ajmal Azad, Junaid Arshad , Adel Aneiba A Framework for Decentralised, Real-time Reputation Aggregation in IoV IEEE Internet of Things Magazine (2023) PDF
SM Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed, Tahir Sharif A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT Information (2023) PDF
NS Safa, F Mitchell, C Maple, MA Azad, M Dabbagh Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities Transactions on Emerging Telecommunications Technologies (2022) PDF
HF Atlam, MA Azad, M Altamimi, N Fadhel Role of Blockchain and AI in Security and Privacy of 6G AI and Blockchain Technology in 6G Wireless Network (2022) PDF
J Arshad, MA Azad, A Prince, J Ali, TG Papaioannou REPUTABLE–A Decentralized Reputation System for Blockchain-Based Ecosystems IEEE Access (2022) PDF
HF Atlam, MA Azad, NF Fadhel Efficient NFS model for risk estimation in a risk-based access control model Sensors (2022) PDF
N Deguara, J Arshad, A Paracha, MA Azad Threat Miner-A Text Analysis Engine for Threat Identification Using Dark Web Data 2022 IEEE International Conference on Big Data (Big Data) (2022) PDF
Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Rizvi, Junaid Arshad, Hany Atlam DEEPSEL: A Novel Feature Selection for Early Identification of Malware in Mobile Applications Elsevier Future Generation Computer Systems (2021) PDF
Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, Tahir Sharif A Comprehensive Survey on Secure Software defined Network for the Internet of Things IET Transactions on Emerging Telecommunications Technologies (2021) PDF
Syed Khurram Rizvi, Muhammad Ajmal Azad , Moazam Faraz Spectrum of Advancements and Developments in Multidisciplinary Domains for Generative Adversarial Networks (GANs) Springer Archives of Computational Methods in Engineering (2021) PDF
Samiran Bag, Muhammad Ajmal Azad , Feng Hao DRE based cumulative e-voting scheme without tallying authorities International Journal of Applied Cryptography (2020) PDF
Muhammad Ajmal Azad, Juanid Arshad, Akmal Ali, Farhan Riaz, Sidra Abdullah, Muhammad Imran, Farhan Ahmad First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications IEEE The Internet of Things Journal (2020) PDF
Muhammad Ajmal Azad, Samiran Bag, Feng Hao , Farhan Ahmad Sharing is Caring: A Collaborative Framework for Sharing Security Alerts Elsevier Computer Communications (2020) PDF
Shazia Tabassum, Muhammad Ajmal Azad, João Gama Profiling High Leverage Points for Detecting Anomalous Users in Telecom Data Networks Springer Annals of Telecommunications (2020) PDF
Muhammad Sadiq Hassan Zada, Bo Yuan, Ashiq Anjum, Muhammad Ajmal Azad, Wajahat Ali Khan, Stephan Reiff-Marganiec Large-scale Graph Integration Using Graph Probabilistic Dependencies (GPDs) IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (2020) PDF
Geetanjali Rathee, Farhan Ahmad, Fatih Kurugollu, Muhammad Ajmal Azad, Razi Iqbal, Muhammad Imran RT-BIoV: A Cognitive Radio Technique for Blockchain-enabled Internet of Vehicles IEEE Transactions on Intelligent Transportation Systems (2020) PDF
Charith Perera, Mahmoud Barhamgi, Arosha Bandara, Muhammad Ajmal Azad, Blaine Price, Bashar Nuseibeh Designing Privacy-aware Internet of Things Applications Elsevier Information Science (2019) PDF
Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao Authentic-Caller: Self-enforcing Authentication in a Next Generation Network IEEE Transactions on Industrial Informatics (2019) PDF
Samiran Bag, Muhammad Ajmal Azad,Feng Hao E2E Verifiable Borda Count Voting System without Tallying Authorities 14th International Conference on Availability, Reliability, and Security (ARES) (2019) PDF
Mohammad Aamir Ali, Muhammad Ajmal Azad, Mario Parreno Centeno, Feng Hao, Aad Van Moorsel Consumer-Facing Technology Fraud: Economics, Attack Methods, and Potential Solutions Elsevier Future Generation Computer Systems (2019) PDF
Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao TrustVote: Privacy-preserving Node Ranking in Vehicular Networks IEEE The Internet of Things Journal (2019) PDF
Samiran Bag, Muhammad Ajmal Azad, Feng Hao PriVeto: A Fully Private Two Round Veto Protocol IET Information Security (2019) PDF
Muhammad Ajmal Azad, Junaid Arshad, Shazia Mahmoud, Khaled Salah, Muhammad Imran A Privacy-preserving Framework for Smart Context-aware Healthcare Applications Transactions on Emerging Telecommunications Technologies (2019) PDF
N.Nizamuddin, Khaled Salah, Muhammad Ajmal Azad, Junaid Arshad, Habib Ur Rehman Decentralized Document Version Control using Ethereum Blockchain and IPFS Elsevier Computer and Electrical Engineering (2019) PDF
Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mehdi Sookhak, Mohammad Dabbagh Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations Elsevier Future Generation Computer Systems (2019) PDF
Farhan Riaz, Muhammad Ajmal Azad, Junaid Arshad, Muhammad Imran Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor Elsevier Future Generation Computer Systems (2019) PDF
Junaid Arshad, Moh. Abdellatif, Muhammad Mubashir Khan, and Muhammad Ajmal Azad A Novel Framework for Collaborative Intrusion Detection for M2M Networks 9th International Conference on Information and Communication Systems (2018) PDF
Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Razi Iqbal, Muhammad Imran Tariq, Tariq Umer Performance Analysis of Content Discovery for Ad-hoc Tactile Network Elsevier Future Generation Computer Systems (2018) PDF
Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah M2M-REP: Reputation System for Machines in the Internet of Things Elsevier Computers & Security (2018). PDF
Junaid Arshad, Muhammad Ajmal Azad, Moh. Abdellatif, Habib Ur Rehman, Khaled Saleh COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things IET Networks (2018) PDF
Muhammad Ajmal Azad, Samiran Bag, Feng Hao PrivBox: Verifiable Decentralized Reputation System for online Marketplaces In Elsevier Future Generation Computer Systems (2018) PDF
Samiran Bag, Muhammad Ajmal Azad, Feng Hao A Privacy-aware Decentralized and Personalized Reputation System Elsevier Computers & Security (2018). PDF
Muhammad Ajmal Azad, Ricardo Morla, Khaled Saleh Systems and Methods for SPIT Detection in VoIP: Survey and Future Directions Elsevier Computers & Security (2018). PDF
Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz [Book Chapter] SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis Springer Guide to Vulnerability Analysis for Computer Networks and Systems (2018) PDF
Muhammad Ajmal Azad, Ricardo Morla Rapid Detection of Spammers through Collaborative Information Sharing across Multiple Service Providers Elsevier Future Generation Computer Systems (2018) PDF
Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao privy: Privacy-Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams IEEE Transaction on Emerging Topic Computing (2017) PDF
Muhammad Ajmal Azad, Ricardo Morla Early Identification of Spammers Through Identity Linking, Social Network, and Call Features Elsevier Journal of Computational Sciences (2016). PDF
Muhammad Ajmal Azad, Samiran Bag, and Feng Hao M2M-REP: Reputation of Machines in the Internet of Things 12th International Conference on Availability, Reliability, and Security (ARES) (2017). PDF
Muhammad Ajmal Azad, Samiran Bag Decentralized Privacy-Aware Collaborative Filtering of Smart Spammers in a Telecommunication Network 32nd ACM Symposium on Applied Computing, Computer Security Track (SAC-SEC) (2017). PDF
Muhammad Ajmal Azad, Syed Khurram Rizvi Caller Centrality: Identifying Telemarketers in VoIP Network 11th International Conference on Availability, Reliability, and Security (ARES) (2016) PDF
Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah Clustering VoIP Caller for SPIT Identification John Wiley and Sons Journal of Communication and Security Networks (2016) PDF
Muhammad Ajmal Azad , Ricardo Morla Caller-REP: Detecting unwanted Calls with Caller Social Strength Elsevier Computers & Security (2013) PDF
Muhammad Ajmal Azad, Ricardo Morla ID-CONNECT: Combining Network and Call Features to Link Different Identities 18th IEEE Conference on Computational Science and Engineering (18th IEEE CSE, Privacy, Trust and Security Track) (2015). PDF
Muhammad Ajmal Azad ,Ricardo Morla Caller Centrality: Identifying SPIT caller in VoIP 1st Ph.D. Students Conference in Electrical and Computer Engineering (2012) PDF
Muhammad Ajmal Azad ,Ricardo Morla Mitigating SPIT with Social Strength 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) (2012) PDF
Muhammad Ajmal Azad, Muhammad Imran Tariq, Syed Khurram Rizvi IMS fault localization issues and challenges 15th International Multi-topic Conference (2012) PDF
Muhammad Ajmal Azad , Ricardo Morla Multistage SPIT detection in Transit VoIP 19th International Conference on Software, Telecommunications, and Computer Networks (SoftCOM) (2011) PDF
Muhammad Imran Tariq, Muhammad Ajmal Azad, Razvan Beuran, ,Yoichi Shinoda Performance Analysis of VoIP Codecs over BE WiMAX Network 3rd International Conference on Computer and Electrical Engineering (ICCEE) (2010) PDF
Muhammad Ajmal Azad, Muhammad Imran Tariq, Tauseef Jamal SBC for Resource Allocation In IMS Network International Conference on Intelligence and Information Technology (ICIIT), 2010. PDF
Rashid Mahmood, Muhammad Ajmal Azad SIP Messages Delay Analysis in Heterogeneous Network International Conference on Wireless Communication and Sensor Computing (2010) PDF
Muhammad Naeem, Zahir Ahmed, Rashid Mahmood, Muhammad Ajmal Azad QOS Based Performance Measurement of Secure on Demand Routing Protocols for MANET’s International Conference on Wireless Communication and Sensor Computing (2010) PDF
Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood A Comparative Analysis of DCCP Variants (CCID2, CCID3), TCP and UDP for MPEG4 Video Applications 3rd International Conference on Information and Communication Technologies (2009) PDF
Junaid Arshad, Muhammad Ajmal Azad Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks International Workshop on Wireless Ad Hoc and Sensor Networks (2006) PDF