![]() | Up a level |
Rao, K. R., Ray, I. G., Asif, W., Nayak, A. and Rajarajan, M. (2019). R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE ACCESS, 7, pp. 133274-133289. doi: 10.1109/ACCESS.2019.2941560
Markovic, M., Corsar, D., Asif, W., Edwards, P. and Rajarajan, M. (2018). Towards Transparency of IoT Message Brokers. Lecture Notes in Computer Science, 11017, pp. 200-203. doi: 10.1007/978-3-319-98379-0_19
Asif, W., Rajarajan, M. and Lestas, M. (2018). Increasing user controllability on device specific privacy in the Internet of Things. Computer Communications, 116, pp. 200-211. doi: 10.1016/j.comcom.2017.11.009
Asif, W., Lestas, M., Khaliq Qureshi, H. and Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003
Asif, W., Qureshi, H. K., Rajarajan, M. and Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025
Asif, W., Lestas, M., Qureshi, H. K. and Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624
Asif, W., Qureshi, A., Iqbal, M. and Rajarajan, M. (2014). On the Complexity of Average Path length for Biological Networks and Patterns. International Journal of Biomathematics, 7(4), doi: 10.1142/S1793524514500387
Fiaz, M., Yousaf, R., Hanfi, M., Asif, W., Qureshi, H. K. and Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2
Asif, W., Qureshi, M., Lestas, M. and Rajarajan, M. (2014). CBDI: Combined Banzhaf & Diversity Index for Finding Critical Nodes. Paper presented at the IEEE Globecom, 08-12-2014 - 12-12-2014, Texas, USA.
Asif, W. (2016). Critical Node Identifcation for accessing network vulnerability, a necessary consideration. (Unpublished Doctoral thesis, City, University of London)