Publications

Disclaimer: These papers are made available as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.

Cumulative Impact Factor: 50.63, CiteScore: 104.7

Book Chapters

  1. Raspberry Pi Based Lightweight and Energy-Efficient Private Email Infrastructure for SMEs, Sufian Hameed, Muhammad Arsal Asif. In Information Innovation Technology in Smart Cities, Springer, November 2017 [Online ISBN: 978-981-10-1741-4, Print ISBN: 978-981-10-1740-7, DOI: https://doi.org/10.1007/978-981-10-1741-4_22]

Peered Review International Journal

  1. Harnessing Big Data Analytics for Healthcare: A Comprehensive Review of Frameworks, Implications, Applications, and Impacts, Awais Ahmed, Rui Xi, Mengshu Hou, Syed Attique Shah, Sufian Hameed in IEEE Access (IF: 3.9 CiteScore: 9 ), Volume, 10 October 2023, https://doi.org/10.1109/ACCESS.2023.3323574
  2. Enhancing Cryptocurrency Price Forecasting Accuracy: A Feature Selection and Weighting Approach with Bi-Directional LSTM and Trend-Preserving Model Bias Correction, Muhammed Rafi, Sufian Hameed, Izaan Sohail, Maria Ali Asghar, Arisha Aziz, Qublai Ali Khan Mirza in IEEE Access (IF: 3.9 , CiteScore: 9), Volume 11, 20 June 2023, https://doi.org/10.1109/ACCESS.2023.3287888
  3. Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks, Jalal Bhayo, Syed Attique Shah, Sufian Hameed, Awais Ahmed, Jamal Nasir, Dirk Draheim in Engineering Applications of Artificial Intelligence (IF: 7.8, CiteScore: 11), Volume 123, Part C, August 2023, 106432, https://doi.org/10.1016/j.engappai.2023.106432
  4. Smart Contract-based Security Architecture for Collaborative Services in Municipal Smart Cities, Shahbaz Siddiqui, Sufian Hameed, Syed Attique Shah, Abdul Kareem Khan and Adel Aneiba in Journal of Systems Architecture (IF: 5.836, CiteScore: 7.2), Volume 135, February 2023, 102802 https://doi.org/10.1016/j.sysarc.2022.102802
  5. Towards SDN-based smart contract solution for IoT access control, Mizna Khalid, Sufian Hameed, Abdul Qadir, Syed Attique Shah, Dirk Draheim in Computer Communications (IF: 5.05, CiteScore: 7.8) Volume 198, 15 January 2023, Pages 1-31, https://doi.org/10.1016/j.comcom.2022.11.007
  6. Towards Software-Defined Networking-based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects, S Siddiqui, S Hameed, SA Shah, I Ahmad, A Aneiba… – in IEEE Access (IF: 3.476, CiteScore: 6.7), vol. 10, pp. 70850 – 70901, 2022, doi: 10.1109/ACCESS.2022.3188311
  7. Jalal Bhayo, Riaz Jafaq, Awais Ahmed, Sufian Hameed, Syed Attique Shah – IEEE Internet of Things Journal (IF: 10.238, CiteScore: 17.1), Volume: 9, Issue: 5, 01 March 2022, pages: 3612 – 3630, DOI: 10.1109/JIOT.2021.3098029
  8. A Scalable Key and Trust Management Solution for IoT Sensors Using SDN and Blockchain Technology, Sufian Hameed, Syed Attique Shah, Qazi Sarmad Saeed, Shahbaaz, Siddiqui, Ihsan Ali, Anton Vedeshin, Dirk Draheim, in IEEE Sensors Journal, Vol. 21, Issue: 6, pp. 8716 – 8733 March 15,  2021 doi: 10.1109/JSEN.2021.3052009. (IF: 4.325, CiteScore: 6.1) pdf
  9. An Efficient Counter-Based DDoS Attack Detection Framework Leveraging Software Defined IoT (SD-IoT), Jalal Bhayo, Sufian Hameed and Syed Attique Shah, in IEEE Access, vol. 8, pp. 221612-221631, 2020, doi: 10.1109/ACCESS.2020.3043082. (IF: 3.476, CiteScore: 6.7)
  10. An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks: SAD-F: Spark Based Anomaly Detection Framework, Awais Ahmed, Sufian Hameed, Muhammad Rafi and Qublai Khan Ali Mirza, in IEEE Access, vol. 8, pp. 219483-219502, 2020, doi: 10.1109/ACCESS.2020.3042905. (IF: 3.476, CiteScore: 6.7)
  11. Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics be the Game Changers?, Syed Attique Shah, Dursun Zafer Seker, M. Mazhar Rathore, Sufian Hameed, Sadok Ben Yahia and Dirk Draheim, IEEE Access, Vol. 7, 2019, Vol. 7(1), 2019, Electronic ISSN: 2169-3536, DOI: 10.1109/ACCESS.2019.2928233 (IF: 3.476, CiteScore: 6.7)
  12. The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects, Syed Attique Shah, Dursun Zafer Seker,  Sufian Hameed, Dirk Draheim, IEEE Access, Vol. 7(1), 2019, Electronic ISSN: 2169-3536, DOI: 10.1109/ACCESS.2019.2913340 (IF: 3.476, CiteScore: 6.7)
  13. Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review, Sufian Hameed, Faraz Idris Khan, Bilal Hameed, Hindawi Journal of Computer Networks and Communications (JCNC) [ISI and Scopus Indexed], ISSN: 2090-7141, Vol. 2019, 10 January 2019. DOI: 10.1155/2019/9629381(CiteScore: 6.4)
  14. HADEC: Hadoop based Live DDoS Detection Framework, Sufian Hameed, Usman Ali, EURASIP Journal on Information Security, ISSN: 2510-523X, doi:10.1186/s13635-018-0081-z (CiteScore: 4.8) pdf
  15. Isolating Malicious Controller(s) In Distributed Software-Defined Networks With Centralized Reputation Management, Bilal Karim Mughal, Sufian Hameed, Bilal Hameed, International Journal of Future Generation Communication and Networking (SERSC – IJFGCN), Volume 11, No. 5, September 2018, DOI: 10.14257/ijfgcn.2018.11.5.02 ISSN: 2233-7857 (ISI Indexed).pdf
  16. SDN Based Collaborative Scheme for Mitigation of DDoS Attacks, Sufian Hameed, Hassan Ahmed Khan, MDPI Future Internet 2018, 10(3), 23; (Indexed in Ei Compendex, Scopus and the Emerging Sources Citation Index) doi:10.3390/fi10030023. (IF: 3.4 CiteScore: 6.7)pdf
  17. Efficacy of Object-Based Passwords for User Authentication, Sufian Hameed, Lamak Qaizar, Shankar Khatri, International Journal of Computer Science and Network Security (IJCSNS), Vol. 17 No. 12, December 2017, ISSN: 1738-7906 (ISI Indexed) pdf
  18. The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies, Sufian Hameed, Sameet Farooq, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7 Issue 12 December 2016, ISSN: 2158-107X (ISI Indexed). (CiteScore: 1.8)pdf
  19. A Centralized Reputation Management Scheme for Isolating Malicious Controllers in Distributed Software-Defined Networks, Bilal Karim Mughal, Sufian Hameed, Ghulam Muhammad Shaikh, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7 Issue 12 December 2016, ISSN: 2158-107X (ISI Indexed). (CiteScore: 1.8)pdf
  20. Software Defined Security Service Provisioning Framework for Internet of Things, Faraz Idris Khan, Sufian Hameed, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7 Issue 12 December 2016, ISSN: 2158-107X (ISI Indexed). (CiteScore: 1.8) pdf
  21. Fighting Spam Using Social GateKeepers, Sufian Hameed, Xiaoming Fu, Pan Hui and Nishanth Satry, Networking Science, Springer Verlag, Tsinghua Press, 2013, 2, 28-41. pdf bibtexicon

Peered Review International Conferences/Workshops

  1. Leveraging SDN for Collaborative DDoS Mitigation, Sufian Hameed, Hassan Ahmed Khan, In SDNFlex in conjunction with the International Conference on Networked Systems Goettingen, Germany, 13-17 March 2017. pdf ppt
  2. Securing Software Defined Networks Against Rogue Controllers, Faraz Idris Khan, Ahmed Sohail, Muhammad Saad Saleem, Humza Bin Javed, Moiz Farhat Tainuri and Sufian Hameed, In International Conference on Cyber Security and Digital Forensics (CSDiFO), Islamabad, Pakistan, 7-8 December 2016.
  3. Protecting NFC Data Exchange against Eavesdropping with Encryption Record Type Definition, Sufian Hameed, Usman Murad Jamali, Adnan Samad, In 15th IEEE/IFIP Network Operations and Management Symposium (NOMS) Istanbul, Turkey, 25-29 APRIL 2016 .  pdf ppt bibtexicon
  4. Efficacy of Live DDoS Detection with Hadoop, Sufian Hameed, Usman Ali, In 15th IEEE/IFIP Network Operations and Management Symposium (NOMS) Istanbul, Turkey, 25-29 APRIL 2016.  pdf ppt bibtexicon
  5. PiMail: Affordable, Lightweight and Energy-Efficient Private Email Infrastructure, Sufian Hameed, Muhammad Arsal Asif, Farhan Kamal Khan, In 11th International Conference on Innovations in Information Technology (IIT’15) Dubai, UAE, 1-3 November 2015.  pdf ppt bibtexicon
  6. Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature Records, Sufian Hameed,  Usman Murad Jamali, Adnan Samad, In 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015) Helsinki, Finland, 20-22 August 2015. pdf ppt bibtexicon  video_icon
  7. Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters, Sufian Hameed,  Bilal Hameed,  Syed Atyab Hussain,  Waqas Khalid, In 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014) Beijing,China, September 2014. pdfppt bibtexicon
  8. ClickSafe: Providing Security against Clickjacking Attacks, Jawwad Shamsi, Sufian Hameed, Waleed Rehman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad, 15th IEEE International Symposium on High Assurance Systems Engineering (HASE), Miami, Florida, USA, January 2014. pdf bibtexicon
  9. SafePass: Authentication under Duress for ATM Transactions, Sufian Hameed, Syed Atyab Hussain, Sohail Hussain Ali, 2nd National Conference on Information Assurance, Rawalpindi, Pakistan, December 2013. pdfppt bibtexicon
  10. Identity Based Email Sender Authentication for Spam Mitigation, Sufian Hameed, Tobias Kloht, Xiaoming Fu, 8th IEEE International Conference on Digital Information Management (ICDIM), Islamabad, Pakistan September 2013. pdfppt bibtexicon
  11. Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application, Sufian Hameed, AlexanderWolf, Konglin Zhu, Xiaoming Fu, 5th workshop on Digital Social Networks (DSN 2012) in conjunction with Gesellschaft für Informatik (GI 2012), Braunschweig, Germany, September 2012. pdf bibtexicon
  12. iSATS: Leveraging Identity Based Sender Authentication for Spam Mitigation, Sufian Hameed, Tobias Kloht, Xiaoming Fu, 7th International Conference on Security and Cryptography (Secrypt), Rome, Italy, July 2012. pdfppt bibtexicon
  13. LENS: Leveraging Social Networking and Trust to Prevent Spam Transmission, Sufian Hameed, Xiaoming Fu, Pan Hui and Nishanth Sastry, in 19th IEEE International Conference on Network Protocols (ICNP), Vancouver, BC Canada, October 2011. pdf bibtexicon
  14. Leveraging Social Networking and trust to prevent Spam transmission, Sufian Hameed, Pan Hui, Xiaoming Fu, Nishanth Sastry, 5th ACM EuroSys Doctoral Workshop (EuroDW 2011), Salzburg, Austria, April 2011. pdfppt

Technical Reports

  1. Efficacy of Object-Based Passwords for User Authentication, Sufian Hameed, Lamak Qaizar, Shankar Khatri, Technical Report No.  arXiv:1711.11303v1, 30th November 2017.
  2. On the Efficacy of Live DDoS Detection with Hadoop, Sufian Hameed, Usman Ali, Technical Report No. arXiv:1506.08953v1, arXiv.org, 30th June 2015.
  3. LENS : LEveraging social Networking and trust to prevent Spam transmission, Sufian Hameed, Pan Hui, Xiaoming Fu and Nishanth Sastry, Technical Report No. IFI-TB-2011-02, Institute of Computer Science, University of Göttingen, Germany, ISSN 1611-1044, February 2011. pdf

Theses

  1. Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation, Sufian Hameed, PhD Dissertation, Georg-August-Universität Göttingen, Mathematisch-naturwissenschaftliche Fakultäten, 2012-09-06.
  2. Evaluation and Improvement of Security in ZigBee Networks, Sufian Hameed, Master Thesis, Philips Research Labs Aachen, DS group Aachen, June 2008.