-
Atta ur Rehman Khan
-
Professor
-
Ext:
5184
-
Prof. Atta ur Rehman Khan is currently affiliated with the College of Engineering and Information Technology at Ajman University, UAE. With a Ph.D. in Mobile Cloud Computing and Security from the University of Malaya (ranked 60th globally by QS), Prof. Khan has a prolific academic and research portfolio spanning nearly two decades. He has held pivotal roles, including as Postgraduate Program Coordinator at Sohar University in Oman, Founding Director of Pakistan’s National Cybercrime Forensics Lab, Head of the Air University Cybersecurity Center in Pakistan, Research Committee Chair at King Saud University in Saudi Arabia, and IEEE Conferences Chair of Islamabad Section, Pakistan. His career reflects a commitment to advancing the fields of cybersecurity, mobile cloud computing, IoT, blockchain, and ad hoc networks.
Prof. Khan has developed multiple degree programs, published research articles in reputed journals and conferences, and edited/co-authored multiple books. Some of his publications have appeared among the most popular articles of the IEEE ComSoc Society, and are among the top 1% highly cited papers in the academic field of computer science (citations received with respect to publication year) as per Web of Science. According to a Stanford University report, Dr. Khan is among the World's Top 2% Scientists.
Currently, he is serving on the editorial boards of Springer Journal of Cluster Computing, IEEE Communications Magazine, Elsevier Journal of Network and Computer Applications, Oxford Computer Journal, IEEE SDN Newsletter, IEEE Access, KSII Transactions on Internet and Information Systems, and Ad hoc & Sensor Wireless Networks. Moreover, he is a Program Evaluator at Pakistan’s National Computing Education Accreditation Council (NCEAC), Steering Committee Member/PC Chair/Track Chair/Technical Program Committee (TPC) member of over 85 international conferences, and a Higher Education Commission Pakistan approved PhD supervisor.
He is a Senior Member of ACM and IEEE. He has been invited as a field expert to multiple forums to discuss the latest technological developments. He has also delivered keynote talks at international conferences and universities. Moreover, he has headed research groups at multiple universities, chaired national-level academic events, and served as a domain expert for international funding bodies.
Dr. Khan has been honored with multiple awards for his achievements. He has received the Ajman University Long-term Research Award, VisionICT Best Project Award, IEEE International Conference on Frontiers of Information Technology Best Project Award, SPECTS Best Paper Award, Technomoot Best Research Poster Award, University of Malaya GoT Award, and multiple COMSATS University Research Productivity Awards.
His areas of research interest include cybersecurity, mobile cloud computing, ad hoc networks, and IoT. For research collaboration, keynote invitations, and thesis/project evaluation, please feel free to reach out at (a.khan at ajman@ac.ae) or (prof at attaurrehman.com). For more details, visit his website at www.attaurrehman.com.
Education
-
PhD in Computer Science, University of Malaya, Malaysia, 2014 (59th in QS Global World Rankings)
PhD in Computer Science, University of Malaya, Malaysia, 2014 (59th in QS Global World Rankings)
-
Master of Science in Computer Science, COMSATS University, Pakistan, 2010 (17th in QS Asian Rankings)
Master of Science in Computer Science, COMSATS University, Pakistan, 2010 (17th in QS Asian Rankings)
-
Bachelor of Science in Computer Science, COMSATS University, Pakistan, 2007 (17th in QS Asian Rankings)
Bachelor of Science in Computer Science, COMSATS University, Pakistan, 2007 (17th in QS Asian Rankings)
Experience
-
Professor, College of Engineering and Information Technology, Ajman University, UAE, 2024 - Present
Professor, College of Engineering and Information Technology, Ajman University, UAE, 2024 - Present
-
Associate Professor, College of Engineering and Information Technology, Ajman University, UAE, 2020 - 2024
Associate Professor, College of Engineering and Information Technology, Ajman University, UAE, 2020 - 2024
-
Associate Professor/ Postgraduate Program Coordinator, Faculty of Computing and Information Tecnology, Sohar University, Oman, 2018 - 2020
Associate Professor/ Postgraduate Program Coordinator, Faculty of Computing and Information Tecnology, Sohar University, Oman, 2018 - 2020
-
Director, National Cybercrime Forensics Lab/ Head, Air University Cybersecurity Center/ Associate Professor, Department of Computer Science Air University, Pakistan, 2017-2018
Director, National Cybercrime Forensics Lab/ Head, Air University Cybersecurity Center/ Associate Professor, Department of Computer Science Air University, Pakistan, 2017-2018
-
Assistant Professor/ Research Committee Chair, College of Computer and Information Sciences, King Saud University, Saudi Arabia, 2015-2017
Assistant Professor/ Research Committee Chair, College of Computer and Information Sciences, King Saud University, Saudi Arabia, 2015-2017
-
Assistant Professor, Department of Computer Sciences, COMSATS University, Pakistan, 2014-2015
Assistant Professor, Department of Computer Sciences, COMSATS University, Pakistan, 2014-2015
-
Research Associate, Faculty of Computer Science & Information Technology, University of Malaya, Malaysia, 2011-2014
Research Associate, Faculty of Computer Science & Information Technology, University of Malaya, Malaysia, 2011-2014
-
Lecturer, Department of Computer Sciences, COMSATS University, Pakistan, 2010-2011
Lecturer, Department of Computer Sciences, COMSATS University, Pakistan, 2010-2011
-
Research Assistant, Department of Computer Sciences, COMSATS University, Pakistan, 2008-2010
Research Assistant, Department of Computer Sciences, COMSATS University, Pakistan, 2008-2010
-
Lecturer, Department of Computer Sciences, Qurtuba University, Pakistan, 2007-2008
Lecturer, Department of Computer Sciences, Qurtuba University, Pakistan, 2007-2008
Teaching Area
-
Security
-
Networks
-
Cloud Computing
-
Programming
Research
-
Security
-
Cloud Computing
-
Mobile Computing
-
Ad hoc Networks
-
Blockchain
Publications
-
Journal
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment, Wireless Personal Communications, Feb 2024
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment, Wireless Personal Communications, Feb 2024
About the journal
Journal Name
Wireless Personal Communications
-
Journal
MalRed: An Innovative Approach for Detecting Malware Using the Red Channel Analysis of Color Images, Egyptian Informatics Journal, May 2024
MalRed: An Innovative Approach for Detecting Malware Using the Red Channel Analysis of Color Images, Egyptian Informatics Journal, May 2024
About the journal
Journal Name
Egyptian Informatics Journal
-
Journal
Sustainable computing across datacenters: A review of enabling models and techniques, Computer Science Review, Feb 2024
Sustainable computing across datacenters: A review of enabling models and techniques, Computer Science Review, Feb 2024
About the journal
Journal Name
Computer Science Review
-
Journal
An efficient and compromise-resilient image encryption scheme for resource-constrained environments, PLoS one, Feb 2024
An efficient and compromise-resilient image encryption scheme for resource-constrained environments, PLoS one, Feb 2024
-
Journal
Hybrid Bat and Salp Swarm Algorithm for Feature Selection and Classification of Crisis-Related Tweets in Social Networks, IEEE Access, Jan 2024
Hybrid Bat and Salp Swarm Algorithm for Feature Selection and Classification of Crisis-Related Tweets in Social Networks, IEEE Access, Jan 2024
-
Journal
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things, IEEE Access, Jan 2024
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things, IEEE Access, Jan 2024
-
Conference
Blockchain-based Transparent and Secure System for Construction Equipment and Machinery Rental, International Arab Conference on Information Technology, Ajman
Blockchain-based Transparent and Secure System for Construction Equipment and Machinery Rental, International Arab Conference on Information Technology, Ajman
-
Conference
Blockchain-based System for End-to-End Donations Monitoring, International Arab Conference on Information Technology, Ajman
Blockchain-based System for End-to-End Donations Monitoring, International Arab Conference on Information Technology, Ajman
-
Journal
A survey of Kubernetes scheduling algorithms, Journal of Cloud Computing, Jun 2023
A survey of Kubernetes scheduling algorithms, Journal of Cloud Computing, Jun 2023
About the journal
Journal Name
Journal of Cloud Computing
-
Journal
Blockchain-based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System, IEEE Access, Aug 2022
Blockchain-based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System, IEEE Access, Aug 2022
-
Conference
Blockchain-based Academic Degrees Issuance and Attestation, International Conference on IT and Industrial Technologies (ICIT), Faisalabad, Pakistan.
Blockchain-based Academic Degrees Issuance and Attestation, International Conference on IT and Industrial Technologies (ICIT), Faisalabad, Pakistan.
-
Conference
Performance comparison of visualization-based malware detection and classification techniques, International Conference on Emerging Technologies, Swabi, Pakistan.
Performance comparison of visualization-based malware detection and classification techniques, International Conference on Emerging Technologies, Swabi, Pakistan.
-
Journal
HeuCrip: A Malware Detection Approach for Internet of Battlefield Things, Cluster Computing, Apr 2022
HeuCrip: A Malware Detection Approach for Internet of Battlefield Things, Cluster Computing, Apr 2022
About the journal
Journal Name
Cluster Computing
-
Conference
Blockchain-based System for End-to-End Donations Monitoring, 24th International Arab Conference on Information Technology, Ajman
Blockchain-based System for End-to-End Donations Monitoring, 24th International Arab Conference on Information Technology, Ajman
-
Journal
An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things, IEEE Access, Oct 2023
An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things, IEEE Access, Oct 2023
-
Journal
Impact of COVID-19 lockdown on air quality analyzed through machine learning techniques, PeerJ Computer Science, Mar 2023
Impact of COVID-19 lockdown on air quality analyzed through machine learning techniques, PeerJ Computer Science, Mar 2023
About the journal
Journal Name
PeerJ Computer Science
-
Journal
A Blockchain-based IoT-enabled E-Waste Tracking and Tracing System for Smart Cities, IEEE Access, Aug 2022
A Blockchain-based IoT-enabled E-Waste Tracking and Tracing System for Smart Cities, IEEE Access, Aug 2022
-
Journal
Memory Visualization-Based Malware Detection Technique, Sensors, Oct 2022
Memory Visualization-Based Malware Detection Technique, Sensors, Oct 2022
-
Journal
Reinforcement Learning for Intelligent Online Computation Offloading in Wireless Powered Edge Networks, Cluster Computing, Aug 2022
Reinforcement Learning for Intelligent Online Computation Offloading in Wireless Powered Edge Networks, Cluster Computing, Aug 2022
About the journal
Journal Name
Cluster Computing
-
Journal
Memory Forensics-Based Malware Detection Using Computer Vision and Machine Learning, Electronics, Aug 2022
Memory Forensics-Based Malware Detection Using Computer Vision and Machine Learning, Electronics, Aug 2022
-
Journal
A visual approach of malware detection and classification using transfer learning, Sensors, Dec 2022
A visual approach of malware detection and classification using transfer learning, Sensors, Dec 2022
-
Journal
A Novel Machine Learning Technique for Selecting Suitable Image Encryption Algorithms for IoT Applications, Wireless Communications and Mobile Computing, Jun 2022
A Novel Machine Learning Technique for Selecting Suitable Image Encryption Algorithms for IoT Applications, Wireless Communications and Mobile Computing, Jun 2022
About the journal
Journal Name
Wireless Communications and Mobile Computing
-
Journal
Atta ur Rehman khan, Zone of Trust: Blockchain Assisted IoT Authentication to support Cross-Communication between Bubbles of Trusted IoTs, Cluster Computing, Mar 2022
Atta ur Rehman khan, Zone of Trust: Blockchain Assisted IoT Authentication to support Cross-Communication between Bubbles of Trusted IoTs, Cluster Computing, Mar 2022
.
About the journal
Journal Name
Cluster Computing
-
Journal
Optimized D‑RAN Aware Data Retrieval for 5G Information Centric Networks, Wireless Personal Communications, 2021., Wireless Personal Communications, Nov 2021
Optimized D‑RAN Aware Data Retrieval for 5G Information Centric Networks, Wireless Personal Communications, 2021., Wireless Personal Communications, Nov 2021
About the journal
Journal Name
Wireless Personal Communications
-
Journal
null, RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations, Cluster Computing, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations, Cluster Computing, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Improving Security of the Internet of Things via RF Fingerprinting based Device Identification System, Neural Computing and Applications, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Improving Security of the Internet of Things via RF Fingerprinting based Device Identification System, Neural Computing and Applications, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, DGRU based human activity recognition using channel state information, Measurement, Vol. 167, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, DGRU based human activity recognition using channel state information, Measurement, Vol. 167, 2021., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters, Journal of Network and Computer Applications, DOI: doi.org/10.1016/j.jnca.2019.102497, 2020., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters, Journal of Network and Computer Applications, DOI: doi.org/10.1016/j.jnca.2019.102497, 2020., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Vehicular Ad Hoc Network (VANET) Localization Techniques: A Survey, Archives of Computational Methods in Engineering, DOI: doi.org/10.1007/s11831-020-09487-1.
Vehicular Ad Hoc Network (VANET) Localization Techniques: A Survey, Archives of Computational Methods in Engineering, DOI: doi.org/10.1007/s11831-020-09487-1.
-
Journal
null, Real-Time Fuel Truck Detection Algorithm Based on Deep Convolutional Neural Network, IEEE Access, vol. 8, pp. 118808-118817, 2020., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Real-Time Fuel Truck Detection Algorithm Based on Deep Convolutional Neural Network, IEEE Access, vol. 8, pp. 118808-118817, 2020., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, DOI: doi.org/10.1002/ett.3813., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, DOI: doi.org/10.1002/ett.3813., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Optimal Content Caching in Content-Centric Networks, Wireless Communications and Mobile Computing, DOI: https://doi.org/10.1155/2019/6373960., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Optimal Content Caching in Content-Centric Networks, Wireless Communications and Mobile Computing, DOI: https://doi.org/10.1155/2019/6373960., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis, International Journal of Information Technology and Web Engineering, vol. 14, no. 1, pp. 41-65, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis, International Journal of Information Technology and Web Engineering, vol. 14, no. 1, pp. 41-65, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, CPU–RAM-based energy-efficient resource allocation in clouds, The Journal of Superomputing, vol. 75, no. 11, pp. 7606–7624, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, CPU–RAM-based energy-efficient resource allocation in clouds, The Journal of Superomputing, vol. 75, no. 11, pp. 7606–7624, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, vol. 78, no. 17, pp. 24595–24615, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, vol. 78, no. 17, pp. 24595–24615, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Anonymous and formally verified dual signature based online e-voting protocol, Cluster Computing, vol. 22, no. 1, pp. 1703–1716, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Anonymous and formally verified dual signature based online e-voting protocol, Cluster Computing, vol. 22, no. 1, pp. 1703–1716, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Identification of Yeast's Interactome using Neural Networks, IEEE Access, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Identification of Yeast's Interactome using Neural Networks, IEEE Access, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Secure-CamFlow: A Device Oriented Security Model to Assist Information Flow Control Systems in Cloud Environments for IoTs, Concurrency and Computation: Practice and Experience, vol. 31, no. 8, pp. 1-22, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Secure-CamFlow: A Device Oriented Security Model to Assist Information Flow Control Systems in Cloud Environments for IoTs, Concurrency and Computation: Practice and Experience, vol. 31, no. 8, pp. 1-22, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, SocialRec: A Context-aware Recommendation Framework with Explicit Sentiment Analysis, IEEE Access, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, SocialRec: A Context-aware Recommendation Framework with Explicit Sentiment Analysis, IEEE Access, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A load balanced task scheduling heuristic for Large-scale Computing Systems, International Journal of Computer Systems Science and Engineering, vol. 34, no. 2, pp. 1-12, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A load balanced task scheduling heuristic for Large-scale Computing Systems, International Journal of Computer Systems Science and Engineering, vol. 34, no. 2, pp. 1-12, 2019., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Conference
Performance assessment of dynamic analysis based energy estimation tools, International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), .
Performance assessment of dynamic analysis based energy estimation tools, International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), .
-
Internet of Things: Challenges, Advances, and Applications, Chapman and Hall/CRC, ISBN:9781498778510, 2018.
Internet of Things: Challenges, Advances, and Applications, Chapman and Hall/CRC, ISBN:9781498778510, 2018.
-
Journal
null, Masquerading Attacks Detection in Mobile Ad Hoc Networks, IEEE Access, vol. 6, no. 1, pp. 55013-55025, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Masquerading Attacks Detection in Mobile Ad Hoc Networks, IEEE Access, vol. 6, no. 1, pp. 55013-55025, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, An Optimal Ride Sharing Recommendation Framework for Carpooling Services, IEEE Access, vol 6, no. 1, pp. 62296-62313, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, An Optimal Ride Sharing Recommendation Framework for Carpooling Services, IEEE Access, vol 6, no. 1, pp. 62296-62313, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Computation Offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communications, Springer, vol. 97, no. 3, pp. 4897–4920, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Computation Offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communications, Springer, vol. 97, no. 3, pp. 4897–4920, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, There's No Such Thing as Free Lunch but Envy among Young Facebookers, KSII Transactions on Internet and Information Systems, vol. 12, no. 10, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, There's No Such Thing as Free Lunch but Envy among Young Facebookers, KSII Transactions on Internet and Information Systems, vol. 12, no. 10, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, An Investigation of Video Communication over Bandwidth Limited Public Safety Network, Malaysian Journal of Computer Science, vol. 31, no. 2, pp. 85-107, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, An Investigation of Video Communication over Bandwidth Limited Public Safety Network, Malaysian Journal of Computer Science, vol. 31, no. 2, pp. 85-107, 2018., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Review and Performance Analysis of Position Based Routing in VANET, Wireless Personal Communications, vol. 94, no. 3, pp. 559-578, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Review and Performance Analysis of Position Based Routing in VANET, Wireless Personal Communications, vol. 94, no. 3, pp. 559-578, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Execution Models for Mobile Data Analytics, IEEE IT Professional, vol. 19, no. 3, pp. 24-30, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Execution Models for Mobile Data Analytics, IEEE IT Professional, vol. 19, no. 3, pp. 24-30, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Formal Verification and Performance Evaluation of Task Scheduling Heuristics for Makespan Optimization and Workflow Distribution in Large-scale Computing Systems, International Journal of Computer Systems Science and Engineering, vol. 32, no. 3, pp. 227-241, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Formal Verification and Performance Evaluation of Task Scheduling Heuristics for Makespan Optimization and Workflow Distribution in Large-scale Computing Systems, International Journal of Computer Systems Science and Engineering, vol. 32, no. 3, pp. 227-241, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments, Journal of Sensor and Actuator Networks, vol. 6, no. 3, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments, Journal of Sensor and Actuator Networks, vol. 6, no. 3, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A Comparative Study and Workload Distribution Model for Re-encryption Schemes in a Mobile Cloud Computing Environment, International Journal of Communication Systems, vol. 30, no. 16, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A Comparative Study and Workload Distribution Model for Re-encryption Schemes in a Mobile Cloud Computing Environment, International Journal of Communication Systems, vol. 30, no. 16, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Diet-Right: A Smart Food Recommendation System, KSII Transactions on Internet and Information Systems, vol. 11, no. 6, pp. 2910-2925, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Diet-Right: A Smart Food Recommendation System, KSII Transactions on Internet and Information Systems, vol. 11, no. 6, pp. 2910-2925, 2017., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Big Data Analytics in Mobile and Cloud Computing Environments, Decision Management: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017.
Big Data Analytics in Mobile and Cloud Computing Environments, Decision Management: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017.
-
Book Chapter
null, High Performance Computing on Mobile Devices, Innovative Research and Applications in Next-Generation High Performance Computing, IGI Global, 2016., null, null, ISBN: null
null, High Performance Computing on Mobile Devices, Innovative Research and Applications in Next-Generation High Performance Computing, IGI Global, 2016., null, null, ISBN: null
null
-
Journal
null, A Survey of Mobile Virtualization: Taxonomy and State of the Art, ACM Computing Surveys, vol. 49, no. 1, 2016. (Top 10 most popular articles of the journal - 2016), null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A Survey of Mobile Virtualization: Taxonomy and State of the Art, ACM Computing Surveys, vol. 49, no. 1, 2016. (Top 10 most popular articles of the journal - 2016), null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Book Chapter
null, Big Data Analytics in Mobile and Cloud Computing Environments, Innovative Research and Applications in Next-Generation High Performance Computing, IGI Global, pp. 349-367, 2016., null, null, ISBN: null
null, Big Data Analytics in Mobile and Cloud Computing Environments, Innovative Research and Applications in Next-Generation High Performance Computing, IGI Global, pp. 349-367, 2016., null, null, ISBN: null
null
-
Journal
null, Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, vol. 2, no 3, pp. 42-49, may/june 2015. (IEEE Cloud Computing most popular article - August 2015, IEEE top 100 articles - August, 2015), null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, vol. 2, no 3, pp. 42-49, may/june 2015. (IEEE Cloud Computing most popular article - August 2015, IEEE top 100 articles - August, 2015), null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing, vol. 13, no. 4, pp. 605-628, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing, vol. 13, no. 4, pp. 605-628, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Merging of DHT-based Logical Networks in MANETs, Transactions on Emerging Telecommunications Technologies, vol. 26, no. 12, pp. 1347-1367, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Merging of DHT-based Logical Networks in MANETs, Transactions on Emerging Telecommunications Technologies, vol. 26, no. 12, pp. 1347-1367, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Resource Management in Cloud Computing: Taxonomy, Prospects and Challenges, Computers & Electrical Engineering, vol. 47, pp. 186-203, 2015. (Most popular article of the journal – 2015/2016), null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Resource Management in Cloud Computing: Taxonomy, Prospects and Challenges, Computers & Electrical Engineering, vol. 47, pp. 186-203, 2015. (Most popular article of the journal – 2015/2016), null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A Cloud-Manager-based Re-encryption Scheme for Mobile Users in Cloud Environment: A Hybrid Approach, Journal of Grid Computing, vol. 13, no. 4, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A Cloud-Manager-based Re-encryption Scheme for Mobile Users in Cloud Environment: A Hybrid Approach, Journal of Grid Computing, vol. 13, no. 4, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, 3D-RP: A DHT-based Routing Protocol for MANETs, The Computer Journal, vol. 58, no. 2, 258-279, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, 3D-RP: A DHT-based Routing Protocol for MANETs, The Computer Journal, vol. 58, no. 2, 258-279, 2015., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, A Survey of Mobile Cloud Computing Application Models, IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 393-413, 2014. (IEEE ComSoc Top 10 most popular articles - February, 2014) (Top 1% highly cited papers of the academic field of computer science as per Web of Science), null, Vol: null, pp.null - null, Nov -0001, doi: null
null, A Survey of Mobile Cloud Computing Application Models, IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 393-413, 2014. (IEEE ComSoc Top 10 most popular articles - February, 2014) (Top 1% highly cited papers of the academic field of computer science as per Web of Science), null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Pirax: Framework for Application Piracy Control in Mobile Cloud Environment, Journal of Super Computing, vol. 68, no. 2, pp. 753-776, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Pirax: Framework for Application Piracy Control in Mobile Cloud Environment, Journal of Super Computing, vol. 68, no. 2, pp. 753-776, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Road Oriented Traffic Information System for Vehicular Ad hoc Networks, Wireless Personal Communications, vol. 77, no. 4, pp. 2497-2515 , 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Road Oriented Traffic Information System for Vehicular Ad hoc Networks, Wireless Personal Communications, vol. 77, no. 4, pp. 2497-2515 , 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment, Journal of Super Computing, vol. 70, no. 2, pp. 946-976, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, BSS: Block Based Sharing Scheme for Secure Data Storage Services in Mobile-Cloud Environment, Journal of Super Computing, vol. 70, no. 2, pp. 946-976, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Routing Protocols for Mobile Sensor Networks: A Comparative Study, International Journal of Computer Systems Science and Engineering, vol. 29, no. 1, pp. 91-100, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Routing Protocols for Mobile Sensor Networks: A Comparative Study, International Journal of Computer Systems Science and Engineering, vol. 29, no. 1, pp. 91-100, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Super Computing, vol. 68, no. 2, pp. 624-651, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Super Computing, vol. 68, no. 2, pp. 624-651, 2014., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Clustering-based Power-Controlled Routing for Mobile Wireless Sensor Networks, International Journal of Communication Systems, vol. 25, no. 4, pp. 529-542, 2012., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Clustering-based Power-Controlled Routing for Mobile Wireless Sensor Networks, International Journal of Communication Systems, vol. 25, no. 4, pp. 529-542, 2012., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
-
Journal
null, Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing, Journal of Super Computing, vol. 66, no. 3, pp. 1687-1706, 2013., null, Vol: null, pp.null - null, Nov -0001, doi: null
null, Enhanced Dynamic Credential Generation Scheme for Protection of User Identity in Mobile Cloud Computing, Journal of Super Computing, vol. 66, no. 3, pp. 1687-1706, 2013., null, Vol: null, pp.null - null, Nov -0001, doi: null
null
Conference Presentation
-
Panelist, Innovation Technology Transfer Forum, Sharjah, UAE, 2023.
Panelist, Innovation Technology Transfer Forum, Sharjah, UAE, 2023.
-
Session Chair, International Arab Conference on Information Technology, 2023.
Session Chair, International Arab Conference on Information Technology, 2023.
-
Panel moderator/Speaker, Future Datacentres and Cloud Infrastructure Summit, 2022
Panel moderator/Speaker, Future Datacentres and Cloud Infrastructure Summit, 2022
-
Keynote Speaker, SPINN Lab, Pakistan, September 30, 2021.
Keynote Speaker, SPINN Lab, Pakistan, September 30, 2021.
-
Invited Speaker, Cybersecurity Day, Abu Dhabi University, UAE, May 27, 2021.
Invited Speaker, Cybersecurity Day, Abu Dhabi University, UAE, May 27, 2021.
-
Keynote Speaker, Ghazi University, Pakistan, September 29, 2021.
Keynote Speaker, Ghazi University, Pakistan, September 29, 2021.
-
Invited Speaker, IEEE Seminar on Hot Trends of 2018, Islamabad, Pakistan, March 2018.
Invited Speaker, IEEE Seminar on Hot Trends of 2018, Islamabad, Pakistan, March 2018.
-
Keynote Speaker, Institute of Southern Punjab, Multan, Pakistan, Jan 2018.
Keynote Speaker, Institute of Southern Punjab, Multan, Pakistan, Jan 2018.
-
Invited Speaker/Panelist, Cyber Secure Pakistan Conference, Islamabad, Pakistan, March 2018.
Invited Speaker/Panelist, Cyber Secure Pakistan Conference, Islamabad, Pakistan, March 2018.
-
Speaker, Mobile Cloud Computing: Challenges, State-of-the-art, and Future Research Directions, Sohar University, Oman, November 2018.
Speaker, Mobile Cloud Computing: Challenges, State-of-the-art, and Future Research Directions, Sohar University, Oman, November 2018.
-
Speaker, How to Kickstart Research, King Saud University, Saudi Arabia, April 2017.
Speaker, How to Kickstart Research, King Saud University, Saudi Arabia, April 2017.
-
Guest speaker, How to Earn Online?, Radio Pakistan, Abbottabad, Pakistan, March, 2009.
Guest speaker, How to Earn Online?, Radio Pakistan, Abbottabad, Pakistan, March, 2009.
-
Performance Assessment of Dynamic Analysis Based Energy Estimation Tools, International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 1-12, July 2018, France. (Best Paper Award)
Performance Assessment of Dynamic Analysis Based Energy Estimation Tools, International Symposium on Performance Evaluation of Computer and Telecommunication Systems, pp. 1-12, July 2018, France. (Best Paper Award)
-
Salat Activity Recognition using Smartphone Triaxial Accelerometer, 5th International Multi-Topic ICT Conference (IMTIC), April 2018.
Salat Activity Recognition using Smartphone Triaxial Accelerometer, 5th International Multi-Topic ICT Conference (IMTIC), April 2018.
-
Code Offloading Using Support Vector Machine, Proceedings of the Sixth IEEE International Conference on Innovative Computing Technology (INTECH), August 2016, pp. 98-103.
Code Offloading Using Support Vector Machine, Proceedings of the Sixth IEEE International Conference on Innovative Computing Technology (INTECH), August 2016, pp. 98-103.
-
Impact of Mobility on Energy and Performance of Clustering-Based Power-Controlled Routing Protocols, Proceedings of the IEEE Frontiers of Information Technology, Islamabad, Pakistan, December 2015.
Impact of Mobility on Energy and Performance of Clustering-Based Power-Controlled Routing Protocols, Proceedings of the IEEE Frontiers of Information Technology, Islamabad, Pakistan, December 2015.
-
A Novel Application Licensing Framework for Mobile Cloud Environment, Proceedings of the International Conference on Future Trends in Computing and Communication Technologies, Beijing, China, December 2013, pp. 127-131.
A Novel Application Licensing Framework for Mobile Cloud Environment, Proceedings of the International Conference on Future Trends in Computing and Communication Technologies, Beijing, China, December 2013, pp. 127-131.
-
A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments, Proceedings of the IEEE Symposium on Wireless Technology and Applications, Kuching, Malaysia, September 2013, pp.62-67.
A Study of Incremental Cryptography for Security Schemes in Mobile Cloud Computing Environments, Proceedings of the IEEE Symposium on Wireless Technology and Applications, Kuching, Malaysia, September 2013, pp.62-67.
-
Impact of Mobility Models on Clustering based Routing Protocols in Mobile WSNs, Proceedings of the IEEE Frontiers of Information Technology, Islamabad, Pakistan, December 2012, pp. 366-370.
Impact of Mobility Models on Clustering based Routing Protocols in Mobile WSNs, Proceedings of the IEEE Frontiers of Information Technology, Islamabad, Pakistan, December 2012, pp. 366-370.
-
A Performance Comparison of Open Source Network Simulators for Wireless Networks, Proceedings of the IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, November 2012, pp. 34-38.
A Performance Comparison of Open Source Network Simulators for Wireless Networks, Proceedings of the IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, November 2012, pp. 34-38.
-
Routing Proposals for Multipath Interdomain Routing, Proceedings of the IEEE International Multi Topic Conference, Lahore, Pakistan, December 2012, pp. 331-337.
Routing Proposals for Multipath Interdomain Routing, Proceedings of the IEEE International Multi Topic Conference, Lahore, Pakistan, December 2012, pp. 331-337.
-
Source Routing Proposals for Multipath Inter-domain Routing, Proceedings of the International Conference on Future Trends in Computing and Communication Technologies, Malacca, Malaysia, December 2012, pp.124-132.
Source Routing Proposals for Multipath Inter-domain Routing, Proceedings of the International Conference on Future Trends in Computing and Communication Technologies, Malacca, Malaysia, December 2012, pp.124-132.
-
Clustering-based Power-Controlled Routing Protocol, Vision ICT, Abbottabad, Pakistan, May, 2010.
Clustering-based Power-Controlled Routing Protocol, Vision ICT, Abbottabad, Pakistan, May, 2010.
Memberships, Awards and Honors
-
Research Award, Ajman University, 2024.
Research Award, Ajman University, 2024.
-
Listed in World's Top 2% Scientists, Stanford University, USA, 2023
Listed in World's Top 2% Scientists, Stanford University, USA, 2023
-
Long-Term Research Achievement Award, Ajman University, 2023
Long-Term Research Achievement Award, Ajman University, 2023
-
Senior Member, IEEE
-
Senior Member, ACM
-
Program Evaluator, ABET
-
Cumulative Impact Factor Score of the published journal articles: 200+
Cumulative Impact Factor Score of the published journal articles: 200+
-
Highest Achiever of Continuing Professional Development (Teaching and Learning), Ajman University, 2022
Highest Achiever of Continuing Professional Development (Teaching and Learning), Ajman University, 2022
-
Listed in World's Top 2% Scientists, Stanford University, USA, 2022
Listed in World's Top 2% Scientists, Stanford University, USA, 2022
-
Shield and Certificate for Supervising Best Scientific Research Project, Ajman University, UAE, 2021
Shield and Certificate for Supervising Best Scientific Research Project, Ajman University, UAE, 2021
-
Listed in World's Top 2% Scientists, Stanford University, USA, 2020
Listed in World's Top 2% Scientists, Stanford University, USA, 2020
-
Program Evaluator, National Computing Education Accreditation Council (NCEAC), Pakistan
Program Evaluator, National Computing Education Accreditation Council (NCEAC), Pakistan
-
Domain Expert, CONICYT National Commission for Scientific and Technological Research, Santiago, Chile
Domain Expert, CONICYT National Commission for Scientific and Technological Research, Santiago, Chile
-
Featured on PrideofPakistan.com
Featured on PrideofPakistan.com
-
Research Incentive Award, Sohar University, Oman, 2020
Research Incentive Award, Sohar University, Oman, 2020
-
Research Incentive Award, Sohar University, Oman, 2019
Research Incentive Award, Sohar University, Oman, 2019
-
Best Paper Award, SPECTS, 2018
Best Paper Award, SPECTS, 2018
-
Global Goodwill Ambassador, 2018
Global Goodwill Ambassador, 2018
-
Research Incentive Award, Air University, Pakistan, 2018
Research Incentive Award, Air University, Pakistan, 2018
-
Judge, Project Competition, Frontiers of Information Technology, Pakistan, Dec 2017
Judge, Project Competition, Frontiers of Information Technology, Pakistan, Dec 2017
-
Chair, AirTech Hackathon Pakistan, 2017
Chair, AirTech Hackathon Pakistan, 2017
-
Listed in Who’s Who in the World 2017
Listed in Who’s Who in the World 2017
-
Certificate of Outstanding Contribution in Reviewing, Elsevier, 2016
Certificate of Outstanding Contribution in Reviewing, Elsevier, 2016
-
Research Productivity Award, COMSATS University, Pakistan, 2016.
Research Productivity Award, COMSATS University, Pakistan, 2016.
-
Judge, Graduate Research Poster Evaluation, Technomoot, Abbottabad, Pakistan, 2015
Judge, Graduate Research Poster Evaluation, Technomoot, Abbottabad, Pakistan, 2015
-
Research Productivity Award, COMSATS University, Pakistan, 2015
Research Productivity Award, COMSATS University, Pakistan, 2015
-
GoT Award, University of Malaya, 2014
GoT Award, University of Malaya, 2014
-
PhD Research Paper amoung top 1% highly cited papers of the academic field of computer science (Clarivate - Web of Science)
PhD Research Paper amoung top 1% highly cited papers of the academic field of computer science (Clarivate - Web of Science)
-
Research Productivity Award, COMSATS University, Pakistan, 2012
Research Productivity Award, COMSATS University, Pakistan, 2012
-
BrightSparks Fellowship, 2011
BrightSparks Fellowship, 2011
-
DAAD Fellowship, 2011
-
Best Research Poster Award, Vision ICT, Pakistan, 2010
Best Research Poster Award, Vision ICT, Pakistan, 2010
-
Best Project Award, Vision ICT, Pakistan, 2009
Best Project Award, Vision ICT, Pakistan, 2009
-
Best Project Award, Frontiers of Information Technology, Pakistan, 2008.
Best Project Award, Frontiers of Information Technology, Pakistan, 2008.