Publications

This is the list of all my peer-reviewed publications ordered by year. You can also visit my Google Scholar or my DBLP page.

Muhammad Ajmal Azad, Sidra Abdullah, Junaid Arshad, Harjinder Lallie, Yussuf Hassan Ahmed
Verify and Trust: A Multidimensional Survey of Zero-trust Security in the Age of IoT
Accepted in Elsevier Internet of Things (2024)
PDF

Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems
ACM Transactions on Privacy and Security (2023)
PDF

Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz
ROBO-SPOT: Detecting Robocalls by Understanding User Engagement and Connectivity Graph
IEEE Big Data Mining and Analytics (2023)
PDF

Haitham Mahmoud, Muhammad Ajmal Azad, Junaid Arshad , Adel Aneiba
A Framework for Decentralised, Real-time Reputation Aggregation in IoV
IEEE Internet of Things Magazine (2023)
PDF

SM Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed, Tahir Sharif
A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
Information (2023)
PDF

NS Safa, F Mitchell, C Maple, MA Azad, M Dabbagh
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities
Transactions on Emerging Telecommunications Technologies (2022)
PDF

HF Atlam, MA Azad, M Altamimi, N Fadhel
Role of Blockchain and AI in Security and Privacy of 6G
AI and Blockchain Technology in 6G Wireless Network (2022)
PDF

J Arshad, MA Azad, A Prince, J Ali, TG Papaioannou
REPUTABLE–A Decentralized Reputation System for Blockchain-Based Ecosystems
IEEE Access (2022)
PDF

HF Atlam, MA Azad, NF Fadhel
Efficient NFS model for risk estimation in a risk-based access control model
Sensors (2022)
PDF

N Deguara, J Arshad, A Paracha, MA Azad
Threat Miner-A Text Analysis Engine for Threat Identification Using Dark Web Data
2022 IEEE International Conference on Big Data (Big Data) (2022)
PDF

Muhammad Ajmal Azad, Farhan Riaz, Anum Aftab, Syed Khurram Rizvi, Junaid Arshad, Hany Atlam
DEEPSEL: A Novel Feature Selection for Early Identification of Malware in Mobile Applications
Elsevier Future Generation Computer Systems (2021)
PDF

Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, Tahir Sharif
A Comprehensive Survey on Secure Software defined Network for the Internet of Things
IET Transactions on Emerging Telecommunications Technologies (2021)
PDF

Syed Khurram Rizvi, Muhammad Ajmal Azad , Moazam Faraz
Spectrum of Advancements and Developments in Multidisciplinary Domains for Generative Adversarial Networks (GANs)
Springer Archives of Computational Methods in Engineering (2021)
PDF

Samiran Bag, Muhammad Ajmal Azad , Feng Hao
DRE based cumulative e-voting scheme without tallying authorities

International Journal of Applied Cryptography (2020)
PDF

Muhammad Ajmal Azad, Juanid Arshad, Akmal Ali, Farhan Riaz, Sidra Abdullah, Muhammad Imran, Farhan Ahmad
First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications
IEEE The Internet of Things Journal (2020)
PDF

Muhammad Ajmal Azad, Samiran Bag, Feng Hao , Farhan Ahmad
Sharing is Caring: A Collaborative Framework for Sharing Security Alerts
Elsevier Computer Communications (2020)
PDF

Shazia Tabassum, Muhammad Ajmal Azad, João Gama
Profiling High Leverage Points for Detecting Anomalous Users in Telecom Data Networks
Springer Annals of Telecommunications (2020)
PDF

Muhammad Sadiq Hassan Zada, Bo Yuan, Ashiq Anjum, Muhammad Ajmal Azad, Wajahat Ali Khan, Stephan Reiff-Marganiec
Large-scale Graph Integration Using Graph Probabilistic Dependencies (GPDs)
IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (2020)
PDF

Geetanjali Rathee, Farhan Ahmad, Fatih Kurugollu, Muhammad Ajmal Azad, Razi Iqbal, Muhammad Imran
RT-BIoV: A Cognitive Radio Technique for Blockchain-enabled Internet of Vehicles
IEEE Transactions on Intelligent Transportation Systems (2020)
PDF

Charith Perera, Mahmoud Barhamgi, Arosha Bandara, Muhammad Ajmal Azad, Blaine Price, Bashar Nuseibeh
Designing Privacy-aware Internet of Things Applications
Elsevier Information Science (2019)
PDF

Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao
Authentic-Caller: Self-enforcing Authentication in a Next Generation Network
IEEE Transactions on Industrial Informatics (2019)
PDF

Samiran Bag, Muhammad Ajmal Azad,Feng Hao
E2E Verifiable Borda Count Voting System without Tallying Authorities
14th International Conference on Availability, Reliability, and Security (ARES) (2019)
PDF

Mohammad Aamir Ali, Muhammad Ajmal Azad, Mario Parreno Centeno, Feng Hao, Aad Van Moorsel
Consumer-Facing Technology Fraud: Economics, Attack Methods, and Potential Solutions
Elsevier Future Generation Computer Systems (2019)
PDF

Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao
TrustVote: Privacy-preserving Node Ranking in Vehicular Networks
IEEE The Internet of Things Journal (2019)
PDF

Samiran Bag, Muhammad Ajmal Azad, Feng Hao
PriVeto: A Fully Private Two Round Veto Protocol
IET Information Security (2019)
PDF

Muhammad Ajmal Azad, Junaid Arshad, Shazia Mahmoud, Khaled Salah, Muhammad Imran
A Privacy-preserving Framework for Smart Context-aware Healthcare Applications
Transactions on Emerging Telecommunications Technologies (2019)
PDF

N.Nizamuddin, Khaled Salah, Muhammad Ajmal Azad, Junaid Arshad, Habib Ur Rehman
Decentralized Document Version Control using Ethereum Blockchain and IPFS
Elsevier Computer and Electrical Engineering (2019)
PDF

Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mehdi Sookhak, Mohammad Dabbagh
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
Elsevier Future Generation Computer Systems (2019)
PDF

Farhan Riaz, Muhammad Ajmal Azad, Junaid Arshad, Muhammad Imran
Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor
Elsevier Future Generation Computer Systems (2019)
PDF

Junaid Arshad, Moh. Abdellatif, Muhammad Mubashir Khan, and Muhammad Ajmal Azad
A Novel Framework for Collaborative Intrusion Detection for M2M Networks
9th International Conference on Information and Communication Systems (2018)
PDF

Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Razi Iqbal, Muhammad Imran Tariq, Tariq Umer
Performance Analysis of Content Discovery for Ad-hoc Tactile Network
Elsevier Future Generation Computer Systems (2018)
PDF

Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah
M2M-REP: Reputation System for Machines in the Internet of Things
Elsevier Computers & Security (2018).
PDF

Junaid Arshad, Muhammad Ajmal Azad, Moh. Abdellatif, Habib Ur Rehman, Khaled Saleh
COLIDE: A Collaborative Intrusion Detection Framework for Internet of Things
IET Networks (2018)
PDF

Muhammad Ajmal Azad, Samiran Bag, Feng Hao
PrivBox: Verifiable Decentralized Reputation System for online Marketplaces
In Elsevier Future Generation Computer Systems (2018)
PDF

Samiran Bag, Muhammad Ajmal Azad, Feng Hao
A Privacy-aware Decentralized and Personalized Reputation System
Elsevier Computers & Security (2018).
PDF

Muhammad Ajmal Azad, Ricardo Morla, Khaled Saleh
Systems and Methods for SPIT Detection in VoIP: Survey and Future Directions
Elsevier Computers & Security (2018).
PDF

Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz
[Book Chapter] SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis
Springer Guide to Vulnerability Analysis for Computer Networks and Systems (2018)
PDF

Muhammad Ajmal Azad, Ricardo Morla
Rapid Detection of Spammers through Collaborative Information Sharing across Multiple Service Providers
Elsevier Future Generation Computer Systems (2018)
PDF

Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao
privy: Privacy-Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams
IEEE Transaction on Emerging Topic Computing (2017)
PDF

Muhammad Ajmal Azad, Ricardo Morla
Early Identification of Spammers Through Identity Linking, Social Network, and Call Features
Elsevier Journal of Computational Sciences (2016).
PDF

Muhammad Ajmal Azad, Samiran Bag, and Feng Hao
M2M-REP: Reputation of Machines in the Internet of Things
12th International Conference on Availability, Reliability, and Security (ARES) (2017).
PDF

Muhammad Ajmal Azad, Samiran Bag
Decentralized Privacy-Aware Collaborative Filtering of Smart Spammers in a Telecommunication Network
32nd ACM Symposium on Applied Computing, Computer Security Track (SAC-SEC) (2017).
PDF

Muhammad Ajmal Azad, Syed Khurram Rizvi
Caller Centrality: Identifying Telemarketers in VoIP Network
11th International Conference on Availability, Reliability, and Security (ARES) (2016)
PDF

Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah
Clustering VoIP Caller for SPIT Identification
John Wiley and Sons Journal of Communication and Security Networks (2016)
PDF

Muhammad Ajmal Azad , Ricardo Morla
Caller-REP: Detecting unwanted Calls with Caller Social Strength
Elsevier Computers & Security (2013)
PDF

Muhammad Ajmal Azad, Ricardo Morla
ID-CONNECT: Combining Network and Call Features to Link Different Identities
18th IEEE Conference on Computational Science and Engineering (18th IEEE CSE, Privacy, Trust and Security Track) (2015).
PDF

Muhammad Ajmal Azad ,Ricardo Morla
Caller Centrality: Identifying SPIT caller in VoIP
1st Ph.D. Students Conference in Electrical and Computer Engineering (2012)
PDF

Muhammad Ajmal Azad ,Ricardo Morla
Mitigating SPIT with Social Strength
11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) (2012)
PDF

Muhammad Ajmal Azad, Muhammad Imran Tariq, Syed Khurram Rizvi
IMS fault localization issues and challenges
15th International Multi-topic Conference (2012)
PDF

Muhammad Ajmal Azad , Ricardo Morla
Multistage SPIT detection in Transit VoIP
19th International Conference on Software, Telecommunications, and Computer Networks (SoftCOM) (2011)
PDF

Muhammad Imran Tariq, Muhammad Ajmal Azad, Razvan Beuran, ,Yoichi Shinoda
Performance Analysis of VoIP Codecs over BE WiMAX Network
3rd International Conference on Computer and Electrical Engineering (ICCEE) (2010)
PDF

Muhammad Ajmal Azad, Muhammad Imran Tariq, Tauseef Jamal
SBC for Resource Allocation In IMS Network
International Conference on Intelligence and Information Technology (ICIIT), 2010.
PDF

Rashid Mahmood, Muhammad Ajmal Azad
SIP Messages Delay Analysis in Heterogeneous Network
International Conference on Wireless Communication and Sensor Computing (2010)
PDF

Muhammad Naeem, Zahir Ahmed, Rashid Mahmood, Muhammad Ajmal Azad
QOS Based Performance Measurement of Secure on Demand Routing Protocols for MANET’s
International Conference on Wireless Communication and Sensor Computing (2010)
PDF

Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
A Comparative Analysis of DCCP Variants (CCID2, CCID3), TCP and UDP for MPEG4 Video Applications
3rd International Conference on Information and Communication Technologies (2009)
PDF

Junaid Arshad, Muhammad Ajmal Azad
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks
International Workshop on Wireless Ad Hoc and Sensor Networks (2006)
PDF