default search action
Waqar Asif
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c21]Georgi Sharkov, Waqar Asif, Ikram U. Rehman:
Securing Smart Home Environment Using Edge Computing. ISC2 2022: 1-7 - 2021
- [j9]Ijaz Ul Haq, Aamir Anwar, Ikram Ur Rehman, Waqar Asif, Drishty Sobnath, Hafiz Husnain Raza Sherazi, Moustafa M. Nasralla:
Dynamic Group Formation With Intelligent Tutor Collaborative Learning: A Novel Approach for Next Generation Collaboration. IEEE Access 9: 143406-143422 (2021) - [c20]Aniket Anand, Waqar Asif, Marios Lestas:
Performance Evaluation of PoW Blockchain in Wireless Mobile IoT networks. DCOSS 2021: 396-403 - [c19]Mahima Khushal, Waqar Asif:
Necessity of Automated Vulnerability Assessment in Healthcare with the Emergence of 5G. ISC2 2021: 1-6 - [c18]Hafiz Husnain Raza Sherazi, Waqar Asif, Zuhaib Ashfaq Khan:
5G enabled Realtime Healthcare System for Heart Patients. ISC2 2021: 1-6 - 2020
- [j8]Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. Clust. Comput. 23(3): 2123-2138 (2020) - [c17]Faiez Altamimi, Waqar Asif, Muttukrishnan Rajarajan:
DADS: Decentralized (Mobile) Applications Deployment System Using Blockchain : Secured Decentralized Applications Store. CITS 2020: 1-8 - [c16]Akanksha Dixit, Waqar Asif, Muttukrishnan Rajarajan:
Smart-Contract Enabled Decentralized Identity Management Framework for Industry 4.0. IECON 2020: 2221-2227
2010 – 2019
- 2019
- [j7]K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan:
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access 7: 133274-133289 (2019) - [j6]Nouman Ashraf, Muhammad Faizan Ghuman, Waqar Asif, Hassaan Khaliq Qureshi, Adnan Iqbal, Marios Lestas:
Energy management in harvesting enabled sensing nodes: Prediction and control. J. Netw. Comput. Appl. 132: 104-117 (2019) - [c15]Syed Muhammad Danish, Marios Lestas, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure. ICC Workshops 2019: 1-6 - [c14]Iván García-Magariño, Geraldine Gray, Muttukrishnan Rajarajan, Waqar Asif:
Agent-based IoT Coordination for Smart Cities Considering Security and Privacy. IoTSMS 2019: 221-226 - [c13]Akash Aggarwal, Waqar Asif, Habibul Azam, Milan Markovic, Muttukrishnan Rajarajan, Peter Edwards:
User Privacy Risk Analysis For The Internet of Things. IoTSMS 2019: 259-264 - [c12]Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. NTMS 2019: 1-6 - [c11]Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, Marios Lestas, Muttukrishnan Rajarajan:
Node Criticality Assessment in a Blockchain Network. BlockSys@SenSys 2019: 22-27 - 2018
- [j5]Waqar Asif, Muttukrishnan Rajarajan, Marios Lestas:
Increasing user controllability on device specific privacy in the Internet of Things. Comput. Commun. 116: 200-211 (2018) - [c10]Muntaha Saleem, Stefan Poslad, Waqar Asif:
Internet of Things: Smart Ubiquitous Architecture of Intelligent Transport System. EECS 2018: 88-99 - [c9]Waqar Asif, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
An attack tree based risk evaluation approach for the internet of things. IOT 2018: 6:1-6:8 - [c8]Milan Markovic, David Corsar, Waqar Asif, Peter Edwards, Muttukrishnan Rajarajan:
Towards Transparency of IoT Message Brokers. IPAW 2018: 200-203 - [c7]Milan Markovic, Waqar Asif, David Corsar, Naomi Jacobs, Peter Edwards, Muttukrishnan Rajarajan, Caitlin Doyle Cottrill:
Towards automated privacy risk assessments in IoT systems. M4IoT@Middleware 2018: 15-18 - [c6]Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - 2017
- [c5]Nouman Ashraf, Waqar Asif, Hassaan Khaliq Qureshi, Marios Lestas:
Active energy management for harvesting enabled wireless sensor networks. WONS 2017: 57-60 - 2016
- [b1]Waqar Asif:
Critical node identifcation for accessing network vulnerability: a necessary consideration. City University London, UK, 2016 - [j4]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. J. Netw. Comput. Appl. 64: 76-88 (2016) - [j3]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. J. Netw. Comput. Appl. 75: 279-292 (2016) - 2015
- [j2]Hassaan Khaliq Qureshi, Adnan Iqbal, Waqar Asif:
Topology Control for Harvesting Enabled Wireless Sensor Networks: A Design Approach. Wirel. Pers. Commun. 82(1): 81-101 (2015) - [c4]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Spectral partitioning for node criticality. ISCC 2015: 877-882 - 2014
- [j1]Mahzeb Fiaz, Roomana Yousaf, Maryam Hanfi, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Wirel. Pers. Commun. 74(2): 989-1004 (2014) - [c3]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
CBDI: Combined Banzhaf & diversity index for finding critical nodes. GLOBECOM 2014: 758-763 - 2013
- [c2]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. CISS 2013: 1-6 - 2011
- [c1]Waqar Asif, Saad B. Qaisar:
Energy and Path Aware Clustering Algorithm (EPAC) for Mobile Ad Hoc Networks. ICCSA (4) 2011: 133-147
2000 – 2009
- 2009
- [i1]Waqar Asif, Muhammad Bilal Qasim, Syed Musa Raza Tirmzi, Usman Muhammad Khan:
Performance Evaluation of WiMAX (802.16) Using Different Encoding Schemes. CoRR abs/0912.1020 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint