Wireless and Mobile Security
Information Systems Security
Applied Data Science
Enterprise ARCHITECTURE
Thesis
IS Project Management
COOP Education
Co-Op Education
Privacy in a Digital Networked World
Fundamentals of CYBERSECURITY
Enterprise Security Architecture
DATABASE Management and Applications
COMSATS Institute of Information Technology
Islamabad , Pakistan
National University of Sciences and Technology, NUST
9/1/2009 - 8/30/2010
Pakistan Telecommunications Company Limited, PTCL
Islamabad,Pakistan
8/1/2010 - 8/31/2011
Army Public College of Management Sciences, APCOMS
9/1/2010 - 1/31/2014
National University of Modern Languages, NUML
9/1/2015 - 4/20/2016
National University of Science and Technology, NUST
4/21/2016 - 8/26/2019
9/1/2019 - 6/1/2024
Prince Sultan University
Riyadh,Saudi Arabia
Technical Chair of ComTech 2019
Quality Committee- IS Department
Senior Member of AIDA Lab
ABET Committee for Information System Department
Organizing Committee Member Woman in Data Science 2020
Publication Chair
Coordinator for Information System Showcase 2019
Strategic Planning Committee, Member
Strategic Planning Committee (Member)
EC Council - Trainer
Technical Chair of ComTech 2017
Scientific Committee Member Woman in Data Science 2020
Technical Committee 2nd National Conference on Information Assurance NCIA 2013
Technical Program Committee
PeerJ Computer Science 2024-01-01
LSTMDD: an optimized LSTM-based drift detector for concept drift in dynamic cloud computing
Scientific Reports 2023-12-01
MarketTrust: blockchain-based trust evaluation model for SIoT-based smart marketplaces
ACM Transactions on Asian and Low-Resource Language Information Processing 2023-10-14
Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets
Social Science Computer Review 2023-10-01
A Survey of Blockchain Technology: Architecture, Applied Domains, Platforms, and Security Threats
Applied Sciences (Switzerland) 2023-06-01
ADAL-NN: Anomaly Detection and Localization Using Deep Relational Learning in Distributed Systems
Electronics (Switzerland) 2023-06-01
Policy-Based Spam Detection of Tweets Dataset
Entropy 2023-05-01
Image Encryption Scheme Based on Orbital Shift Pixels Shuffling with ILM Chaotic System
IEEE Access 2023-01-01
CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks
Lecture Notes in Networks and Systems 2023-01-01
Multi Factor Authentication as a Service (MFAaaS) for Federated Cloud Environments
Proceedings - 2023 6th International Conference of Women in Data Science at Prince Sultan University, WiDS-PSU 2023 2023-01-01
Web Scraping for Data Analytics: A BeautifulSoup Implementation
Trust Management Frameworks in Multi-Cloud Environment: A Review
2023,-01-01
Complex and Intelligent Systems 2022-10-01
A novel trust management model for edge computing
Future Generation Computer Systems 2022-08-01
A novel searchable encryption scheme to reduce the access pattern leakage
Microscopy Research and Technique 2022-06-01
Machine learning for post-traumatic stress disorder identification utilizing resting-state functional magnetic resonance imaging
Proceedings - 2022 5th International Conference of Women in Data Science at Prince Sultan University, WiDS-PSU 2022 2022-01-01
Privacy Concerned on Contact-Tracing Application during COVID-19
Social Media Privacy Issues, Threats, and Risks
Location Privacy Issues in Location-Based Services
IEEE Access 2022-01-01
ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things
Proceedings - 2022 7th International Conference on Data Science and Machine Learning Applications, CDMA 2022 2022-01-01
Students Personality Assessment using Deep Learning from University Admission Statement of Purpose
PeerJ Computer Science 2022-01-01
RiceChain: secure and traceable rice supply chain framework using blockchain technology
Journal of Supercomputing 2021-11-01
A novel cloud management framework for trust establishment and evaluation in a federated cloud environment
Journal of Theoretical and Applied Electronic Commerce Research 2021-09-01
T-smart: Trust model for blockchain based smart marketplace
2021 International Conference on Digital Futures and Transformative Technologies, ICoDT2 2021 2021-05-20
Fine Tuning BERT for Unethical Behavior Classification
From Transformers to Reformers
Transfer Learning Grammar for Multilingual Surface Realisation
2021 1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021 2021-04-06
Enterprise Architecture Frameworks Assessment: Capabilities, Cyber Security and Resiliency Review
Wheat Plant Counting Using UAV Images Based on Semi-supervised Semantic Segmentation
Proceedings - International Conference on Developments in eSystems Engineering, DeSE 2021-01-01
Question Classification Using Universal Sentence Encoder and Deep Contextualized Transformer
IEEE Access 2021-01-01
Behavioral Based Insider Threat Detection Using Deep Learning
Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet with Entropy Coded Ant Colony System Optimization
Analyzing LDA and NMF Topic Models for Urdu Tweets via Automatic Labeling
Advances in Intelligent Systems and Computing 2021-01-01
Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
2021-01-01
exGDD: Extended Game Design Document template for Mobile Game Design and Development
Proceedings - International Conference on Developments in eSystems Engineering, DeSE 2020-12-14
MAD-Malicious Activity Detection Framework in Federated Cloud Computing
Crowdsourcing Cybercrimes through Online Resources
Indonesian Journal of Electrical Engineering and Computer Science 2020-10-01
A computational forensic framework for detection of hidden applications on android
Telecommunication Systems 2020-07-01
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
IEEE Access 2020-01-01
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
IFIP Advances in Information and Communication Technology 2020-01-01
Backward-Forward Sequence Generative Network for Multiple Lexical Constraints
Malicious Insider Attack Detection in IoTs Using Data Analytics
Multimedia Tools and Applications 2018-09-01
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018 2018-08-28
Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity
2018-01-01
Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review
Journal of Information Science and Engineering 2017-11-01
An adaptive rule-based approach to resolving real-time VoIP wholesale billing disputes
2017-01-01
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes
Annales des Telecommunications/Annals of Telecommunications 2016-10-01
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
Journal of Medical Systems 2016-07-01
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment
International Journal of Ad Hoc and Ubiquitous Computing 2016-01-01
Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
Mobile Information Systems 2015-01-22
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network
Studies in Health Technology and Informatics 2015-01-01
Designing an assistive learning aid for writing acquisition: A challenge for children with dyslexia
Journal of Medical Systems 2014-11-01
Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014-01-01
Analyzing feasibility for deploying very fast decision tree for DDoS attack detection in cloud-assisted WBAN
Lecture Notes in Electrical Engineering 2014-01-01
Cloud computing risk assessment: A systematic literature review
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012 2012-12-14
A boundary node detection based solution for minimizing the effects of nodes distribution over key exchange in group based WSN
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2009-11-09
Hardware-based random number generation in wireless sensor networks(WSNs)
Cybersecurity, Artificial Intelligence application in security, Cloud Computing Security, Network Security, Wireless Security, Mobile Security, Trust in SMart IoTs, Blockchain