Waqar Asif
Cited by
Cited by
A lightweight blockchain based two factor authentication mechanism for LoRaWAN join procedure
SM Danish, M Lestas, W Asif, HK Qureshi, M Rajarajan
2019 IEEE International Conference on Communications Workshops (ICC …, 2019
Features of mobile apps for people with autism in a post COVID-19 scenario: Current status and recommendations for apps using AI
IU Rehman, D Sobnath, MM Nasralla, M Winnett, A Anwar, W Asif, ...
Diagnostics 11 (10), 1923, 2021
Dynamic group formation with intelligent tutor collaborative learning: a novel approach for next generation collaboration
IU Haq, A Anwar, IU Rehman, W Asif, D Sobnath, HHR Sherazi, ...
IEEE Access 9, 143406-143422, 2021
Securing the LoRaWAN join procedure using blockchains
SM Danish, M Lestas, HK Qureshi, K Zhang, W Asif, M Rajarajan
Cluster Computing 23, 2123-2138, 2020
Energy management in harvesting enabled sensing nodes: Prediction and control
N Ashraf, M Faizan, W Asif, HK Qureshi, A Iqbal, M Lestas
Journal of Network and Computer Applications 132, 104-117, 2019
Increasing user controllability on device specific privacy in the Internet of Things
W Asif, M Rajarajan, M Lestas
Computer Communications 116, 200-211, 2018
R-PEKS: RBAC enabled PEKS for secure access of cloud data
KR Rao, IG Ray, W Asif, A Nayak, M Rajarajan
IEEE Access 7, 133274-133289, 2019
Variable rate adaptive modulation (vram) for introducing small-world model into wsns
W Asif, HK Qureshi, M Rajarajan
2013 47th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2013
An attack tree based risk evaluation approach for the internet of things
W Asif, IG Ray, M Rajarajan
Proceedings of the 8th International Conference on the Internet of Things, 1-8, 2018
A novel dynamic pricing model for a microgrid of prosumers with photovoltaic systems
V Boiarkin, M Rajarajan, J Al-Zaili, W Asif
Applied Energy 342, 121148, 2023
Active energy management for harvesting enabled wireless sensor networks
N Ashraf, W Asif, HK Qureshi, M Lestas
2017 13th Annual Conference on Wireless On-demand Network Systems and …, 2017
DADS: Decentralized (mobile) applications deployment system using blockchain: Secured decentralized applications store
F Altamimi, W Asif, M Rajarajan
2020 International Conference on Computer, Information and Telecommunication …, 2020
Combined Banzhaf & Diversity Index (CBDI) for critical node detection
W Asif, HK Qureshi, M Rajarajan, M Lestas
Journal of Network and Computer Applications 64, 76-88, 2016
Authentication and capability-based access control: An integrated approach for IoT environment
N Sivaselvan, W Asif, BK Vivekananda, M Rajarajan
2020 12th International Conference on Communication Software and Networks …, 2020
Towards automated privacy risk assessments in IoT systems
M Markovic, W Asif, D Corsar, N Jacobs, P Edwards, M Rajarajan, ...
Proceedings of the 5th Workshop on Middleware and Applications for the …, 2018
Complex project to develop real tools for identifying and countering terrorism: real-time early detection and alert system for online terrorist content based on natural …
M Florea, C Potlog, P Pollner, D Abel, O Garcia, S Bar, S Naqvi, W Asif
Challenges in cybersecurity and privacy-the European research landscape, 181-206, 2022
Agent-based IoT coordination for smart cities considering security and privacy
I García-Magariño, G Gray, R Muttukrishnan, W Asif
2019 Sixth International Conference on Internet of Things: Systems …, 2019
User privacy risk analysis for the internet of things
A Aggarwal, W Asif, H Azam, M Markovic, M Rajarajan, P Edwards
2019 Sixth International Conference on Internet of Things: Systems …, 2019
Optimization based spectral partitioning for node criticality assessment
W Asif, M Lestas, HK Qureshi, M Rajarajan
Journal of Network and Computer Applications 75, 279-292, 2016
Topology control for harvesting enabled wireless sensor networks: A design approach
HK Qureshi, A Iqbal, W Asif
Wireless Personal Communications 82, 81-101, 2015
The system can't perform the operation now. Try again later.
Articles 1–20