|A taxonomy and survey on green data center networks|
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
|A survey on resource allocation in high performance distributed computing systems|
H Hussain, SUR Malik, A Hameed, SU Khan, G Bickler, N Min-Allah, ...
Parallel Computing 39 (11), 709-736, 2013
|Trends and challenges in cloud datacenters|
K Bilal, SUR Malik, SU Khan, AY Zomaya
IEEE cloud computing 1 (1), 10-20, 2014
|Modeling and analysis of state-of-the-art VM-based cloud management platforms|
SUR Malik, SU Khan, SK Srinivasan
IEEE Transactions on Cloud Computing 1 (1), 1-1, 2013
|A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends|
F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ...
Computers & Security 65, 29-49, 2017
|Performance analysis of data intensive cloud systems based on data management and replication: a survey|
SUR Malik, SU Khan, SJ Ewen, N Tziritas, J Kolodziej, AY Zomaya, ...
Distributed and Parallel Databases 34 (2), 179-215, 2016
|A methodology for OSPF routing protocol verification|
SUR Malik, SK Srinivasan, SU Khan, L Wang
|A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification|
Q Alam, SUR Malik, A Akhunzada, KKR Choo, S Tabbasum, M Alam
IEEE Transactions on Information Forensics and Security 12 (6), 1259-1268, 2016
|DaSCE: Data security for cloud environment with semi-trusted third party|
M Ali, SUR Malik, SU Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2015
|Dynamic task mapping for network-on-chip based systems|
T Maqsood, S Ali, SUR Malik, SA Madani
Journal of Systems Architecture 61 (7), 293-306, 2015
|An efficient privacy mechanism for electronic health records|
A Anjum, KKR Choo, A Khan, A Haroon, S Khan, SU Khan, N Ahmad, ...
computers & security 72, 196-211, 2018
|Rededge: A novel architecture for big data processing in mobile edge computing environments|
M Habib ur Rehman, PP Jayaraman, SUR Malik, AUR Khan, ...
Journal of Sensor and Actuator Networks 6 (3), 17, 2017
|Fog computing over IoT: A secure deployment and formal verification|
S Zahra, M Alam, Q Javaid, A Wahid, N Javaid, SUR Malik, MK Khan
IEEE Access 5, 27132-27144, 2017
|Fault tolerance in the cloud|
K Bilal, O Khalid, SUR Malik, MUS Khan, SU Khan, AY Zomaya
Encyclopedia of Cloud Computing, 291-300, 2016
|Modeling and analysis of the thermal properties exhibited by cyberphysical data centers|
SUR Malik, K Bilal, SU Khan, B Veeravalli, K Li, AY Zomaya
IEEE Systems Journal 11 (1), 163-172, 2015
|The impact of test case reduction and prioritization on software testing effectiveness|
I ur Rehman, SUR Malik
2009 International Conference on Emerging Technologies, 416-421, 2009
|CloudNetSim++: a GUI based framework for modeling and simulation of data centers in OMNeT++|
AW Malik, K Bilal, SU Malik, Z Anwar, K Aziz, D Kliazovich, N Ghani, ...
IEEE Transactions on Services Computing 10 (4), 506-519, 2015
|Convergence time analysis of open shortest path first routing protocol in internet scale networks|
SU Malik, SK Srinivasan, SU Khan
Electronics letters 48 (19), 1188-1190, 2012
|τ-safety: A privacy model for sequential publication with arbitrary updates|
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
|Improved generalization for secure data publishing|
S Yaseen, SMA Abbas, A Anjum, T Saba, A Khan, SUR Malik, N Ahmad, ...
IEEE Access 6, 27156-27165, 2018