Quaid-i-Azam University, Islamabad
Department of Computer Science

QAU

CS

Academics

Research

Faculty

Admission

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

 

Muhammad Usman

Assistant Professor – HEC Approved PhD Supervisor

Ph.D. (Griffith University, Australia)
MS (CS) (PMAS Arid Agriculture University, Pakistan)

Phone: +92-51-9064-2161

Email: musman at qau dot edu dot pk

 





 


Research Interests

  • Computer Networks – Distributed Systems, Grid Computing, Mobile Agent-based distributed systems, routing protocols, peer-to-peer computing
  • Security and Privacy – Intrusion and Anomaly Detection Systems, Data Leakage Prevention, Key Management Schemes, Trust Management 
  • Internet of Things - Smart Homes and Smart Cities, pervasive computing, wireless sensor networks
  • Cloud Computing -  Architectural, efficiency, security and privacy issues
  • Distributed Web Services –Security & privacy issues in web 2.0, Performance Issues in Web Services, Trust in Learning Management Systems
  • Formal Modeling and Analysis – statistical modeling, structural and behavior modeling and analysis of distributed protocols and systems

Teaching

  • MPhil (CS)
    • CS-751: Distributed Systems
    • CS-824: Peer-to-Peer Systems
    • CS-834: Multimedia Communications
    • CS-761: Grid Computing

 

  • MS (IST)
    • IST-832: Information Security  
    • IST-833: Information Privacy and Access Control
    • IST-672: Web Services
    • IST-780: Project/Thesis

 

  • M.Sc. (CS)
    •  CS-499: Project    

 

  • BS (CS)
    • CS-462: Introduction To Cyber Security
    • CS-454: Introduction To Web Services
    • CS-223: Operating System
    • CS-489:Project-I

Research Students

    • Mutual Authentication in Cloud Systems – Maryam Mehmood (2017 - 2018)
    • Learning Object Selection Model Using Game Theory – Asad Zia (2017 - 2018)
    • Trust framework for web services in cloud-based e-learning environment – Kanwal Mahmud (2016 - 2017)
    • Design and analysis of trustworthy web service selection algorithm – Noor Alam (2016 - 2017)
    • Analysis of disease-disease association using network modeling – Zahra Batool (2016 - 2017)

 

Project Students

  • MSc
    • Employee Tracker (S2017) – Waheed Ahmed
    • Taste Skewer (S2017) – Nadia Liaqat
    • Friends Band (S2017) - Mahvish Ghazi
    • Calendar Analyzer (S2017) – Bisma Tariq
    • Student Learning Experience (S2017) - Iqra Shabeer
    • Visualization of Real World Applications using Distributed Synchronization and Scheduling Algorithms (F2016) - Saba Bashir
    • Family Tree (F2016) - Zeeshan Shaid
    • Transport Management System: Quaid-I-Azam University (S2016) - Muhammad Umar

 

  • BS (CS)
    • Cricket Club Hub (F2016, S2017) - Abdul Rahman
    • Academic Staff Association Hub (F2016, S2017) - Hassan Farooqi & Azmatullah
    • Quaid-I-Azam University Community Guild (F2016, S2017) - Luqman Anjum & Shahroz Jamil

 


Memberships

  • Computer Science Teacher Association (CSTA) endorsed by ACM Publishers, USA
  • Juniper Networks, USA
    • Internetworking Specialist (Enterprise Routing Track)
    • Internetworking Specialist (JUNOS Security Track)
    • Internetworking Associate (Enterprise Switching Track)
    • Internetworking Associate (Enterprise Routing Track)
  • Institute for Integrated and Intelligent Systems (IIIS), Griffith University, Australia

 


Publications

  • Journal
    • An improved lightweight multi-server authentication scheme", Azeem Irshad, Shehzad Ashraf Chaudhary, Saru Kumari, Muhammad Usman, Khalid Mahmood, Muhammad Shahzad Faisal, International Journal of Communication Systems, May 2017. (accepted)
    • Mobile Agent-based Cross Layer Anomaly Detection in Smart Home Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, IEEE Transactions on Consumer Electronics, May 2015.
    • Specifications and Validation of Agent-based Anomaly Detection and Verification System for Resource Constrained Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, July 2015.
    • A Resource-Efficient System for Mobile Agent-based Anomaly Detection and Verification in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, Vol. 9, No. 12, pp. 3427-3444, Dec. 2014.
    • Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks S. Khanum, M. Usman, and A. Alwabel, International Journal of Computer Science Issues (IJCSI), vol. 9, iss. 1, January 2012.
    • Performance Evaluation of Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, A. Irshad, and M. Usman, International Journal of Future Generation Communication and Networking, pp. 13-22, vol. 4, iss. 1, 2011.
    • Security Enhancement in MANET Authentication by checking the CRL Status of Servers, A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, International Journal of Advanced Science & Technology (IJAST), Korea, 2008.

 

  • Conference/ Book Chapter
    • Dynamic Trust Evaluation of Learning Objects. Kanwal Mehmood and M. Usman, International Conference on Communications Technologies (ComTech - 2017), Rawalpindi, Pakistan, April 2017. (Best Paper Award)
    • Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends, M. Usman, V. Muthukkumarasamy, X-W. Wu, S. Khanum, Book chapter, Security for Multihop Wireless Networks, Auerbach publications, Taylor & Francis Group, pp. 273-304, USA, 2014.
    • Agent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks, M. Usman, in proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1-2, Sydney, Australia, June 2014.
    • Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, X-W. Wu, in proceedings of the IEEE 38th conference on Local Computer Networks (LCN Workshops), pp. 1001-1009, Sydney, Australia, October, 2013.
    • Efficient Clique Based Clustering and Routing Mechanism in Wireless Sensor Networks, K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and M. Usman, in proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference, (IWCMC), pp. 171-176, Sardinia, Italy, July, 2013.
    • Securing Mobile Agent Based Wireless Sensor Network Applications on Middleware, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, IEEE 12th International Symposium on Communication and Information Technology (ISCIT), Gold Coast, Australia, October 2012.
    • Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, in proceedings of the IEEE 9th conference on Ubiquitous intelligence and Computing (UIC), pp. 322-329, Japan, September 2012.
    • An Optimal Mutual Authentication Scheme in GSM Networks, A. Haleem and M. Usman, in proceedings of the IEEE International Conference on Information and Communication Technologies (ICICT), pp. 1-5, Karachi, Pakistan, July, 2011.
    • Hash-chain based peer-peer key management and establishment of Security Associations in MANETS, A. Irshad, S. M. Gilani, S. Khurram, M. Shafiq, A. W. Khan, M. Usman, in proceedings of the IEEE International Conference on Information and Emerging Technologies (ICIET), pp. 1-6, Karachi, Pakistan, 2010. 
    • Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN, M. Usman, S. Khanum, W. Noshairwan, E. Irshad, and A. Irshad High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 384-389, 2010.
    • Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture, S. Khanum, M. Usman, K Hussain, R Zafar, and M Sher, High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 212–217, 2010.
    • Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers, A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, in proceedings of the first international conference Security-Enriched Urban Computing and Smart Grid, LNCS, Springer-Verlag, pp. 86-95, Daejeon, Korea, 2010.
    • Certificate Chain based Authentication in MANETS using 4th generation Technologies, A. Irshad, W. Noshairwan, M. Shafiq, A. W. Khan, M. Usman, and E. Irshad, in proceedings of the IEEE 2nd International Conference on Computer Science and Information Technology (ICCSIT), pp. 518-523, Beijing, China, August 2009.
    • Authentication of Nodes among Different Symmetric Key Groups in MANETs using 4G Technologies, A. Irshad, W. Noshairwan, M. Rashid, S. M. Gilani, E. Irshad, and M. Usman, in proceedings of the IEEE International Conference on Computer Engineering and Technology (ICCET), pp. 261-265, Singapore, Jan 2009.
    • A Secure interaction among nodes from different MANET Groups using 4G technologies, A. Irshad, M. Shafiq, A. Rahman, S. Khurram, M. Usman, and E. Irshad, Oct 2009, In proceedings of the IEEE International Conference on Emerging Technologies (ICET), pp. 476-481, Rawalpindi, Pakistan, 2009.
    • Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks, M. Usman, W. Noshairwan, M. Gilani, A. Irshad, and E. Irshad, in proceedings of the 4th IEEE International Conference on Emerging Technologies, pp. 199-204, Pakistan, 2008.
    • Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Usman, A. Irshad, M. Gilani WWW/Internet, IADIS, pp. 1-5, Germany, 13-15 Oct, 2008.

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

[QAU] [CS] [Academics] [Research] [Faculty] [Admission]

Copyright© cs.qau.edu.pk 2017