Malik Najmus Saqib
Malik Najmus Saqib
Associate Professor, Department of Cybersecurity, College of Computer Science and Engineering
Verified email at
Cited by
Cited by
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ...
International Journal of Communication Systems 32 (16), e4139, 2019
Electricity theft detection using supervised learning techniques on smart meter data
ZA Khan, M Adil, N Javaid, MN Saqib, M Shafiq, JG Choi
Sustainability 12 (19), 8023, 2020
Energy Consumption Model for Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks
NA • Kamran Latif, Nadeem Javaid, Malik Najmus Saqib, Zahoor Ali Khan
International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 2016
AdDroid: rule-based machine learning framework for android malware analysis
A Mehtab, WB Shahid, T Yaqoob, MF Amjad, H Abbas, H Afzal, MN Saqib
Mobile Networks and Applications 25, 180-192, 2020
Anonymous and formally verified dual signature based online e-voting protocol
Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, et al.
Cluster Computing, 1-14, 2018
An approach to secure mobile agents in automatic meter reading
NS Malik, F Kupzog, M Sonntag
2010 International Conference on Cyberworlds, 187-193, 2010
Energy Hole Minimization with Field Division for Energy Efficient Routing in WSNs.
K Latif, N Javaid, MN Saqib, ZA Khan, U Qasim, B Mahmood, M Ilahi
Int. J. Distributed Sens. Networks 11, 953134:1-953134:13, 2015
Energy hole minimization technique for energy efficient routing in under water sensor networks
K Latif, MN Saqib, SH Bouk, N Javaid
Communication Technologies, Information Security and Sustainable Development …, 2014
Optimizing Security Computation Cost for Mobile Agent Platforms
NS Malik, A Treytl
2007 5th IEEE International Conference on Industrial Informatics 1, 143-148, 2007
A secure migration process for mobile agents
NS Malik, D Ko, HH Cheng
Software: Practice and Experience 41 (1), 87-101, 2011
Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
FZ Asad Ullah Khan, Maimoona Bint E. Sajid,1 Abdul Rauf, Malik Najmus Saqib
Wireless Communications and Mobile Computing 2022, 15, 2022
Reactive GTS allocation protocol for sporadic events using the IEEE 802.15. 4
M Azeem, MI Khan, Y Faheem, MI Tamimy, NS Malik, A Khan, M Ahmed
Mathematical Problems in Engineering 2014, 2014
Modeling enhancements in routing protocols under mobility and scalability constraints in VANETs
N Javaid, M Akbar, ZA Khan, TA Alghamdi, MN Saqib, MI Khan
International Journal of Distributed Sensor Networks 10 (7), 261823, 2014
Modeling Enhancements in Routing Protocols under Mobility and Scalability Constraints in VANETs
MIK N. Javaid, M. Akbar, Z. A. Khan, T. A. Alghamdi, M. N. Saqib
International Journal of Distributed Sensor Networks 10 (7), 2014
Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security
ZA Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, Abid Khan, Adeel Anjum ...
Journal of Medical Imaging and Health Informatics, 2017
Implementation and Comparative Analysis of the Fault Attacks on AES.
S Raza, NS Malik, A Shakeel, MI Khan
Int. Arab J. Inf. Technol. 10 (6), 625-634, 2013
Security Optimization for Agent platforms and reducing turnaround time for Mobile Agents
NS Malik, A Treytl
IFAC Proceedings Volumes 40 (22), 191-196, 2007
Friedrich Kupzog Institute of Computer Technology Vienna University of Technology Vienna
NS Malik
Austria malik, kupzog@ ict. tuwien. ac.” Domain based Security for Mobile Agents, 0
A Survey of Layered Approach to Threats and Countermeasures
DS Bujud, AS AlGhamdi, MN Saqib
Proceedings of the International Conference on Security and Management (SAM …, 2019
Dual Signature based Privacy and Binding of Medical Data on Cloud
AA Malik Najmus Saqib
International Journal of Computer Science and Network Security 22 (3), 2022
The system can't perform the operation now. Try again later.
Articles 1–20