Malik Najmus Saqib
Malik Najmus Saqib
Assistant Professor, Department of Cybersecurity, College of Computer Science and Engineering
Verified email at
Cited by
Cited by
Energy Consumption Model for Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks
NA • Kamran Latif, Nadeem Javaid, Malik Najmus Saqib, Zahoor Ali Khan
International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 2016
Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key
A Ghani, K Mansoor, S Mehmood, SA Chaudhry, AU Rahman, ...
International Journal of Communication Systems 32 (16), e4139, 2019
Energy hole minimization with field division for energy efficient routing in WSNs
K Latif, N Javaid, MN Saqib, ZA Khan, U Qasim, B Mahmood, M Ilahi
International Journal of Distributed Sensor Networks 11 (10), 953134, 2015
Energy hole minimization technique for energy efficient routing in under water sensor networks
K Latif, MN Saqib, SH Bouk, N Javaid
International Multi Topic Conference, 134-148, 2013
An approach to secure mobile agents in automatic meter reading
NS Malik, F Kupzog, M Sonntag
2010 International Conference on Cyberworlds, 187-193, 2010
A secure migration process for mobile agents
NS Malik, D Ko, HH Cheng
Software: Practice and Experience 41 (1), 87-101, 2011
Optimizing Security Computation Cost for Mobile Agent Platforms
NS Malik, A Treytl
2007 5th IEEE International Conference on Industrial Informatics 1, 143-148, 2007
AdDroid: rule-based machine learning framework for android malware analysis
A Mehtab, WB Shahid, T Yaqoob, MF Amjad, H Abbas, H Afzal, MN Saqib
Mobile Networks and Applications 25 (1), 180-192, 2020
Reactive GTS allocation protocol for sporadic events using the IEEE 802.15. 4
M Azeem, MI Khan, Y Faheem, MI Tamimy, NS Malik, A Khan, M Ahmed
Mathematical Problems in Engineering 2014, 2014
Anonymous and formally verified dual signature based online e-voting protocol
Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, et al.
Cluster Computing, 1-14, 2018
Modeling enhancements in routing protocols under mobility and scalability constraints in VANETs
N Javaid, M Akbar, ZA Khan, TA Alghamdi, MN Saqib, MI Khan
International Journal of Distributed Sensor Networks 10 (7), 261823, 2014
Modeling Enhancements in Routing Protocols under Mobility and Scalability Constraints in VANETs
MIK N. Javaid, M. Akbar, Z. A. Khan, T. A. Alghamdi, M. N. Saqib
International Journal of Distributed Sensor Networks 10 (7), 2014
Implementation and Comparative Analysis of the Fault Attacks on AES.
S Raza, NS Malik, A Shakeel, MI Khan
Int. Arab J. Inf. Technol. 10 (6), 625-634, 2013
Friedrich Kupzog Institute of Computer Technology Vienna University of Technology Vienna
NS Malik
Austria malik, kupzog@ ict. tuwien. ac.” Domain based Security for Mobile Agents, 0
Security Optimization for Agent platforms and reducing turnaround time for Mobile Agents
NS Malik, A Treytl
IFAC Proceedings Volumes 40 (22), 191-196, 2007
A Survey of Layered Approach to Threats and Countermeasures
DS Bujud, AS AlGhamdi, MN Saqib
Proceedings of the International Conference on Security and Management (SAM …, 2019
Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security
ZA Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, Abid Khan, Adeel Anjum ...
Journal of Medical Imaging and Health Informatics, 2017
Optimizing Turnaround Time for Mobile Agents in Centralized Key Server Scheme
NS Malik, S Ziauddin
International Conference on Future Computer and Communication, 3rd (ICFCC 2011), 2011
A Secure Migration Protocol for Mobile Agent Systems
NS Malik, D Ko, HH Cheng
ASME 2009 International Design Engineering Technical Conferences and …, 2009
Domain based security for mobile agents
NS Malik, F Kupzog, M Sonntag
2008 6th IEEE International Conference on Industrial Informatics, 575-580, 2008
The system can't perform the operation now. Try again later.
Articles 1–20