default search action
Saif Ur Rehman Malik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Amber Murtaza, Abdul Rehman, Saif Ur Rehman Malik, Gouher Ahmed, Assad Abbas, Muhammad Adnan Khan:
A Model-Based Approach to Enhance the Communication Between the Participants of Collaborative Business Processes. IEEE Access 12: 121780-121791 (2024) - [j65]Sabah Suhail, Mubashar Iqbal, Rasheed Hussain, Saif Ur Rehman Malik, Raja Jurdak:
TRIPLE: A blockchain-based digital twin framework for cyber-physical systems security. J. Ind. Inf. Integr. 42: 100706 (2024) - [j64]Kainat Ansar, Mansoor Ahmed, Saif Ur Rehman Malik, Markus Helfert, Jungsuk Kim:
Blockchain based general data protection regulation compliant data breach detection system. PeerJ Comput. Sci. 10: e1882 (2024) - 2023
- [j63]Kahkishan Sanam, Saif Ur Rehman Malik, Tehsin Kanwal, Zain Ul Islam Adil:
SecurePrivChain: A decentralized framework for securing the global model using cryptography. Future Gener. Comput. Syst. 142: 364-375 (2023) - [j62]Hira S. Sikandar, Saif Ur Rehman Malik, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Gener. Comput. Syst. 149: 518-530 (2023) - [j61]Najam U. Saqib, Saif Ur Rehman Malik, Adeel Anjum, Madiha Haider Syed, Syed Atif Moqurrab, Gautam Srivastava, Jerry Chun-Wei Lin:
Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain. IEEE Internet Things J. 10(24): 21421-21430 (2023) - 2022
- [j60]Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins. Comput. Ind. 141: 103699 (2022) - [j59]Saif Ur Rehman Malik, Adeel Anjum, Syed Atif Moqurrab, Gautam Srivastava:
Towards enhanced threat modelling and analysis using a Markov Decision Process. Comput. Commun. 194: 282-291 (2022) - [j58]Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch:
Probabilistic modelling of deception-based security framework using markov decision process. Comput. Secur. 115: 102599 (2022) - [j57]Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch:
Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599]. Comput. Secur. 117: 102689 (2022) - [j56]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j55]Mazzamal Aslam, Saira Beg, Adeel Anjum, Zakria Qadir, Shawal Khan, Saif Ur Rehman Malik, M. A. Parvez Mahmud:
A strong construction of S-box using Mandelbrot set an image encryption scheme. PeerJ Comput. Sci. 8: e892 (2022) - [j54]Ayesha Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Munam Ali Shah, Carsten Maple:
A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors 22(7): 2811 (2022) - [j53]Syed Atif Moqurrab, Noshina Tariq, Adeel Anjum, Alia Asheralieva, Saif Ur Rehman Malik, Hassan Malik, Haris Pervaiz, Sukhpal Singh Gill:
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126(3): 2379-2401 (2022) - [i2]Sabah Suhail, Saif Ur Rehman Malik, Raja Jurdak, Raimundas Matulevicius:
Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins. CoRR abs/2201.07765 (2022) - 2021
- [j52]Saif Ur Rehman Malik, Tehsin Kanwal, Samee U. Khan, Hassan Malik, Haris Pervaiz:
A User-Centric QoS-Aware Multi-Path Service Provisioning in Mobile Edge Computing. IEEE Access 9: 56020-56030 (2021) - [j51]Saira Beg, Adeel Anjum, Mansoor Ahmed, Saif Ur Rehman Malik, Hassan Malik, Navuday Sharma, Omer Waqar:
Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System. IEEE Access 9: 110011-110025 (2021) - [j50]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Sajjad Haider, Abid Khan, Umar Manzoor, Alia Asheralieva:
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021) - [j49]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Muazzam Ali Khan Khattak:
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021) - [j48]Hasina Attaullah, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, Muhammad Ali Imran:
F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 21(14): 4933 (2021) - [j47]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors 21(15): 5096 (2021) - [j46]Saif Ur Rehman Malik, Hina Akram, Sukhpal Singh Gill, Haris Pervaiz, Hassan Malik:
EFFORT: Energy efficient framework for offload communication in mobile cloud computing. Softw. Pract. Exp. 51(9): 1896-1909 (2021) - [j45]Osama Amir Khan, Saif Ur Rehman Malik, Faizan M. Baig, Saif ul Islam, Haris Pervaiz, Hassan Malik, Syed Hassan Ahmed:
A cache-based approach toward improved scheduling in fog computing. Softw. Pract. Exp. 51(12): 2360-2372 (2021) - [j44]Saeed Akbar, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Samee U. Khan, Naveed Ahmad, Adeel Anjum:
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers. IEEE Trans. Cloud Comput. 9(3): 845-853 (2021) - 2020
- [j43]Junaid Haseeb, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum:
Application of formal methods to modelling and analysis aspects of business process reengineering. Bus. Process. Manag. J. 26(2): 548-569 (2020) - [j42]Saif Ur Rehman Malik:
Moving Toward 5G: Significance, Differences, and Impact on Quality of Experience. IEEE Consumer Electron. Mag. 9(6): 9-14 (2020) - [j41]Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, Anish Jindal:
FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet Things J. 7(7): 6132-6142 (2020) - [j40]Furqan Shahid, Abid Khan, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo:
WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger. Inf. Sci. 539: 229-249 (2020) - [j39]Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad:
Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. IT Prof. 22(3): 46-54 (2020) - [j38]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Sajjad Haider, Saif Ur Rehman Malik, Abid Khan, Fatemeh Amiri:
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wirel. Commun. Mob. Comput. 2020: 8416823:1-8416823:18 (2020) - [i1]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. CoRR abs/2011.08538 (2020)
2010 – 2019
- 2019
- [j37]Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad, Atta ur Rehman Khan:
Anonymous and formally verified dual signature based online e-voting protocol. Clust. Comput. 22(Suppl 1): 1703-1716 (2019) - [j36]Idrees Ahmed, Abid Khan, Mansoor Ahmed, Saif Ur Rehman Malik:
Order preserving secure provenance scheme for distributed networks. Comput. Secur. 82: 99-117 (2019) - [j35]Sajjad Haider, Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Ahmed Khan, Abid Khan, Umar Manzoor:
An efficient privacy preserving protocol for dynamic continuous data collection. Comput. Secur. 86: 358-371 (2019) - [j34]Ankan Ghosh, Osman Khalid, Rao Naveed Bin Rais, Amjad Rehman, Saif Ur Rehman Malik, Imran Ali Khan:
Data offloading in IoT environments: modeling, analysis, and verification. EURASIP J. Wirel. Commun. Netw. 2019: 53 (2019) - [j33]Muhammad Waqas, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum, Naveed Ahmad:
Convergence time analysis of OSPF routing protocol using social network metrics. Future Gener. Comput. Syst. 94: 62-71 (2019) - [j32]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Naveed Ahmad, Umar Manzoor, Muhammad Naeem Shehzad, Muhammad A. Balubaid:
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud. Int. J. Distributed Sens. Networks 15(6) (2019) - [j31]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan:
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019) - 2018
- [j30]Sunnia Amjad, Naveed Ahmad, Tanzila Saba, Adeel Anjum, Umar Manzoor, Muhammad A. Balubaid, Saif Ur Rehman Malik:
Calculating Completeness of Agile Scope in Scaled Agile Development. IEEE Access 6: 5822-5847 (2018) - [j29]Saad Mustafa, Kashif Bilal, Saif Ur Rehman Malik, Sajjad Ahmad Madani:
SLA-Aware Energy Efficient Resource Management for Cloud Environments. IEEE Access 6: 15004-15020 (2018) - [j28]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir:
Improved Generalization for Secure Data Publishing. IEEE Access 6: 27156-27165 (2018) - [j27]Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018) - [j26]Basharat Mahmood, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum, Saif ul Islam:
Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors. Sustain. Comput. Informatics Syst. 17: 81-95 (2018) - [j25]Rahmat Ullah, Naveed Ahmad, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum:
Simulator for modeling, analysis, and visualizations of thermal status in data centers. Sustain. Comput. Informatics Syst. 19: 324-340 (2018) - [j24]Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik, Samiya Zubair, Basit Shahzad:
An efficient approach for publishing microdata for multiple sensitive attributes. J. Supercomput. 74(10): 5127-5155 (2018) - 2017
- [j23]Farhana Jabeen, Zara Hamid, Wadood Abdul, Sanaa Ghouzali, Saif Ur Rehman Malik, Abid Khan, Sarfraz Nawaz, Hina Ghafoor:
Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment. IEEE Access 5: 13308-13326 (2017) - [j22]Behjat Zuhaira, Naveed Ahmad, Tanzila Saba, Junaid Haseeb, Saif Ur Rehman Malik, Umar Manzoor, Muhammad A. Balubaid, Adeel Anjum:
Identifying Deviations in Software Processes. IEEE Access 5: 20319-20332 (2017) - [j21]Samman Zahra, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik, Muhammad Khurram Khan:
Fog Computing Over IoT: A Secure Deployment and Formal Verification. IEEE Access 5: 27132-27144 (2017) - [j20]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - [j19]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017) - [j18]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j17]Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif Ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood, Sajjad Ahmad Madani:
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems. Comput. Syst. Sci. Eng. 32(3) (2017) - [j16]Muhammad Habib Ur Rehman, Prem Prakash Jayaraman, Saif Ur Rehman Malik, Atta ur Rehman Khan, Mohamed Medhat Gaber:
RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments. J. Sens. Actuator Networks 6(3): 17 (2017) - [j15]Muhammad Saleem Khan, Daniele Midi, Saif Ur Rehman Malik, Majid I. Khan, Nadeem Javaid, Elisa Bertino:
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy. Mob. Networks Appl. 22(3): 493-509 (2017) - [j14]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - [j13]Saif Ur Rehman Malik, Kashif Bilal, Samee U. Khan, Bharadwaj Veeravalli, Keqin Li, Albert Y. Zomaya:
Modeling and Analysis of the Thermal Properties Exhibited by Cyberphysical Data Centers. IEEE Syst. J. 11(1): 163-172 (2017) - [j12]Mazhar Ali, Saif Ur Rehman Malik, Samee U. Khan:
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party. IEEE Trans. Cloud Comput. 5(4): 642-655 (2017) - [j11]Quratulain Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Kim-Kwang Raymond Choo, Saher Tabbasum, Masoom Alam:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. IEEE Trans. Inf. Forensics Secur. 12(6): 1259-1268 (2017) - [j10]Asad Waqar Malik, Kashif Bilal, Saif Ur Rehman Malik, Zahid Anwar, Khurram Aziz, Dzmitry Kliazovich, Nasir Ghani, Samee U. Khan, Rajkumar Buyya:
CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++. IEEE Trans. Serv. Comput. 10(4): 506-519 (2017) - 2016
- [j9]Saif Ur Rehman Malik, Samee U. Khan, Sam J. Ewen, Nikos Tziritas, Joanna Kolodziej, Albert Y. Zomaya, Sajjad Ahmad Madani, Nasro Min-Allah, Lizhe Wang, Cheng-Zhong Xu, Qutaibah M. Malluhi, Johnatan E. Pecero, Pavan Balaji, Abhinav Vishnu, Rajiv Ranjan, Sherali Zeadally, Hongxiang Li:
Performance analysis of data intensive cloud systems based on data management and replication: a survey. Distributed Parallel Databases 34(2): 179-215 (2016) - [j8]Muhammad Saleem Khan, Majid Iqbal Khan, Saif Ur Rehman Malik, Osman Khalid, Mukhtar Azim, Nadeem Javaid:
MATF: a multi-attribute trust framework for MANETs. EURASIP J. Wirel. Commun. Netw. 2016: 197 (2016) - [j7]Yuqi Lin, Saif Ur Rehman Malik, Kashif Bilal, Qiusong Yang, Yongji Wang, Samee U. Khan:
Designing and Modeling of Covert Channels in Operating Systems. IEEE Trans. Computers 65(6): 1706-1719 (2016) - [j6]Quratulain Alam, Saher Tabbasum, Saif Ur Rehman Malik, Masoom Alam, Tamleek Ali, Adnan Akhunzada, Samee Ullah Khan, Athanasios V. Vasilakos, Rajkumar Buyya:
Formal Verification of the xDAuth Protocol. IEEE Trans. Inf. Forensics Secur. 11(9): 1956-1969 (2016) - 2015
- [j5]Tahir Maqsood, Sabeen Ali, Saif Ur Rehman Malik, Sajjad Ahmad Madani:
Dynamic task mapping for Network-on-Chip based systems. J. Syst. Archit. 61(7): 293-306 (2015) - 2014
- [j4]Kashif Bilal, Saif Ur Rehman Malik, Samee U. Khan, Albert Y. Zomaya:
Trends and Challenges in Cloud Datacenters. IEEE Cloud Comput. 1(1): 10-20 (2014) - [j3]Kashif Bilal, Saif Ur Rehman Malik, Osman Khalid, Abdul Hameed, Enrique Alvarez, Vidura Wijaysekara, Rizwana Irfan, Sarjan Shrestha, Debjyoti Dwivedy, Mazhar Ali, Usman Shahid Khan, Assad Abbas, Nauman Jalil, Samee Ullah Khan:
A taxonomy and survey on Green Data Center Networks. Future Gener. Comput. Syst. 36: 189-208 (2014) - 2013
- [j2]Hameed Hussain, Saif Ur Rehman Malik, Abdul Hameed, Samee Ullah Khan, Gage Bickler, Nasro Min-Allah, Muhammad Bilal Qureshi, Limin Zhang, Yongji Wang, Nasir Ghani, Joanna Kolodziej, Albert Y. Zomaya, Cheng-Zhong Xu, Pavan Balaji, Abhinav Vishnu, Frédéric Pinel, Johnatan E. Pecero, Dzmitry Kliazovich, Pascal Bouvry, Hongxiang Li, Lizhe Wang, Dan Chen, Ammar Rayes:
A survey on resource allocation in high performance distributed computing systems. Parallel Comput. 39(11): 709-736 (2013) - [j1]Saif Ur Rehman Malik, Samee U. Khan, Sudarshan K. Srinivasan:
Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms. IEEE Trans. Cloud Comput. 1(1) (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint