Quaid-i-Azam University, Islamabad
Department of Computer Sciences

QAU

CS

Academics

Research

Faculty

Admission

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

 

Muhammad Usman

Assistant Professor – HEC Approved PhD Supervisor

Ph.D., Griffith University, Australia
MS (CS), PMAS Arid Agriculture University, Pakistan

Phone: +92-51-9064-2161

Email: musman at qau dot edu dot pk

 





 


Research Interests

  • Security and Privacy – Intrusion and Anomaly Detection Systems, Data Leakage Prevention, Key Management Schemes, Trust Management 
  • Data Analytics – Healthcare and Social Data Analytics Using Statistical and Social Network Analytical Techniques
  • Internet of Things - Smart Homes and Smart Cities, pervasive computing, wireless sensor networks
  • Computer Networks – Distributed Systems, Grid Computing, Mobile Agent-based distributed systems, routing protocols, peer-to-peer computing
  • Cloud Computing -  Architectural, efficiency, security and privacy issues
  • Distributed Web Services –Security & privacy issues in web 2.0, Performance Issues in Web Services, Trust in Learning Management Systems
  • Formal Modeling and Analysis – statistical modeling, structural and behavior modeling and analysis of distributed protocols and systems

Research & Development Grants

  • Principal Investigator with Dr. Onaiza Maqbool (Co-PI): Design and Analysis of Web Services Ranking Methods for Internet of
    Things (PKR 0.477 million) - funded by Higher Education Commission of Pakistan
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Data Leak Prevention (PKR 0.15 million), funded by an industry partner
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Code Vulnerability Scanner for Java
    Language (PKR 0.15 million), funded by an industry partner
  • Co-Principal Investigator with Dr. Muddassar Azam Sindhu (PI) and Dr. Onaiza Maqbool (Co-PI): Code Vulnerability Scanner for C
    Language (PKR 0.15 million), funded by an industry partner

Honors and Awards

  • Research paper titled as "Dynamic Trust Evaluation of Learning objects" won the best paper award in the IEEE ComTech 2017 conference
  • Griffith University International Postgraduate Research Scholarship (GUIPRS) for PhD - 2012-2015 - received highly competitive GUIPRS (tuition fee) scholarship
  • Griffith University Postgraduate Research Scholarship (GUPRS) for PhD - 2012-2015 – received highly competitive GUPRS (living stipend) scholarship
  • Conference Travel Grant – WoWMoM 2014 - awarded with a conference travel grant amounting to 906AUD by School of ICT, Griffith University, Australia
  • Conference Travel Grant – 38th LCN - awarded with a conference travel grant amounting to 450AUD by School of ICT, Griffith University, Australia
  • 1st Position in Computer Networks Group of MS (CS) - 2006-2009
  • Vice Chancellor Merit Scholarship in 2nd Semester of MS (CS)
  • Academic Standing - scored three consecutive 4/4 GPAs in last three semesters of MS (CS)

Memberships

  • Member Network Security Research Group, Griffith University, Australia
  • Computer Science Teacher Association (CSTA) endorsed by ACM Publishers, USA
  • Juniper Networks, USA

o    Internetworking Specialist (Enterprise Routing Track)

o    Internetworking Specialist (JUNOS Security Track)

o    Internetworking Associate (Enterprise Switching Track)

o    Internetworking Associate (Enterprise Routing Track)


Experience (last five positions)

  • Assistant Professor – Quaid-I-Azam University, Pakistan – February 2016 to date
  • Lecturer (Level A) – Griffith University, Australia – August 2015 – January 2016
  • PhD Scholar & Instructor – Griffith University, Australia – February 2012 – July 2015
  • Lecturer – King Khalid University, Saudi Arabia - March 2011- To - January 2012
  • Lecturer and Project Manager (Research Centre) – University of Central Punjab, Pakistan - Oct 2010 - To - Feb 2011  

Teaching

  • MPhil (CS)
    • CS-751: Distributed Systems
    • CS-824: Peer-to-Peer Systems
    • CS-833: Information Privacy and Access Control
    • CS-834: Multimedia Communications

  • MS (IST)
    • IST-672: Web Services
    • IST-780: Project/Thesis
    • IST-832: Information Security  
    • IST-833: Information Privacy and Access Control

 

  • M.Sc. (CS)
    •  CS-499: Project

 

  • BS (CS)
    • CS-223: Operating System
    • CS-454: Introduction To Web Services
    • CS-462: Introduction To Cyber Security
    • CS-489:Project

Research Students

    1. Ranking of Sensing-as-a-Service in Internet of Things - Aroosa Hameed (F2017 - S2018)
    2. Design and Analysis of Optical Interconnection System for Cloud Computing Data Centers - Samina Lone (F2017 - S2018)
    3. Design and Analysis of a Data Leakage System – Seema Raishad (F2017 - S2018)
    4. Health Data Analysis Using Social and Network Analysis Techniques - Wajeeha Naz (F2017 - S2018)
    5. Mutual Authentication in Cloud Systems – Maryam Mehmood (F2017 - S2018)
    6. Probabilistic Judgments in Analytic Hierarchy Process for Web Services Ranking – Noor Alam (F2016 - F2017)
    7. Risk Factors-based Network Analysis of Non-Communicable Diseases – Zahra Batool (F2016 - S2017)
    8. Utility Theory-based Trust Evaluation of Learning Objects – Kanwal Mahmud (F2016 - S2017)

 

Project Students

  • MSc
    1. Telehealth - Mubeen Sarwar (F2017)
    2. Taste Skewer – Nadia Liaqat (F2017)
    3. Employee Tracker – Waheed Ahmed (S2017)
    4. Friends Band - Mahvish Ghazi (S2017)
    5. Calendar Analyzer– Bisma Tariq (S2017)
    6. Student Learning Experience - Iqra Shabeer (S2017)
    7. Visualization of Real World Applications using Distributed Synchronization and Scheduling Algorithms - Saba Bashir (F2016)
    8. Family Tree - Zeeshan Shahid (F2016)
    9. Transport Management System: Quaid-I-Azam University - Muhammad Umar (S2016)

 

  • BS (CS)
    1. Smart Contracts - (F2017, S2018)
    2. Development of Intra-Lab Data Leakage Prevention System - (F2017, S2018)
    3. Cricket Club Hub - Abdul Rahman (F2016, S2017)
    4. Academic Staff Association Hub - Hassan Farooqi and Azmatullah (F2016, S2017)
    5. Quaid-I-Azam University Community Guild - Luqman Anjum and Shahroz Jamil (F2016, S2017)

Publications

  • Book
    1. Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks, M. Usman, V. Muthukkumarasamy, X.-W. Wu, and Surraya Khanum, Springer, expected to appear in March 2018.
  • Journal
    1. Disease-Disease Association Using Network Modeling: Challenges and Opportunities, Zahra Batool, Muhammad Usman, Khalid Saleem, M. Abdullah-Al-Wadud, Fazal-e-Amin, Abdulhameed Al-Eliwi, Journal of Medical Imaging and Health Informatics, Vol. 8, pp. 1-10, 2018.
    2. An improved lightweight multi-server authentication scheme, Azeem Irshad, Shehzad Ashraf Chaudhary, Saru Kumari, Muhammad Usman, Khalid Mahmood, and Muhammad Shahzad Faisal, International Journal of Communication Systems, 4 July, 2017.
    3. Mobile Agent-based Cross Layer Anomaly Detection in Smart Home Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, IEEE Transactions on Consumer Electronics, May 2015.
    4. Specifications and Validation of Agent-based Anomaly Detection and Verification System for Resource Constrained Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, July 2015.
    5. A Resource-Efficient System for Mobile Agent-based Anomaly Detection and Verification in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, Vol. 9, No. 12, pp. 3427-3444, Dec. 2014.
    6. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks S. Khanum, M. Usman, and A. Alwabel, International Journal of Computer Science Issues (IJCSI), vol. 9, iss. 1, January 2012.
    7. Performance Evaluation of Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, A. Irshad, and M. Usman, International Journal of Future Generation Communication and Networking, pp. 13-22, vol. 4, iss. 1, 2011.
    8. Security Enhancement in MANET Authentication by checking the CRL Status of Servers, A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, International Journal of Advanced Science & Technology (IJAST), Korea, 2008.
  • Conference/ Book Chapter
    1. Sum-of-the-Parts Valuation-based Scheduling of Parallel Applications over Global Grid, Aroosa Hameed and Muhammad Usman, Frontiers of Information Technology (FIT), Islamabad, Pakistan, 18-20 December, 2017. (accepted)
    2. Dynamic Trust Evaluation of Learning Objects, Kanwal Mehmood and M. Usman, International Conference on Communications Technologies (ComTech - 2017), pp. 195-200, Rawalpindi, Pakistan, April 2017. (Best Paper Award)
    3. Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends, M. Usman, V. Muthukkumarasamy, X-W. Wu, S. Khanum, Book chapter, Security for Multihop Wireless Networks, Auerbach publications, Taylor & Francis Group, pp. 273-304, USA, 2014.
    4. Agent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks, M. Usman, in proceedings of the IEEE International Symposium on a World of Wireless, Mob­­ile and Multimedia Networks (WoWMoM), pp. 1-2, Sydney, Australia, June 2014.
    5. Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, X-W. Wu, in proceedings of the IEEE 38th conference on Local Computer Networks (LCN Workshops), pp. 1001-1009, Sydney, Australia, October, 2013.
    6. Efficient Clique Based Clustering and Routing Mechanism in Wireless Sensor Networks, K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and M. Usman, in proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference, (IWCMC), pp. 171-176, Sardinia, Italy, July, 2013.
    7. Securing Mobile Agent Based Wireless Sensor Network Applications on Middleware, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, IEEE 12th International Symposium on Communication and Information Technology (ISCIT), Gold Coast, Australia, October 2012.
    8. Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection, M Usman, V Muthukkumarasamy, X.-W. Wu, and S. Khanum, in proceedings of the IEEE 9th conference on Ubiquitous intelligence and Computing (UIC), pp. 322-329, Japan, September 2012.
    9. An Optimal Mutual Authentication Scheme in GSM Networks, A. Haleem and M. Usman, in proceedings of the IEEE International Conference on Information and Communication Technologies (ICICT), pp. 1-5, Karachi, Pakistan, July, 2011.
    10. Hash-chain based peer-peer key management and establishment of Security Associations in MANETS, A. Irshad, S. M. Gilani, S. Khurram, M. Shafiq, A. W. Khan, M. Usman, in proceedings of the IEEE International Conference on Information and Emerging Technologies (ICIET), pp. 1-6, Karachi, Pakistan, 2010. 
    11. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN, M. Usman, S. Khanum, W. Noshairwan, E. Irshad, and A. Irshad High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 384-389, 2010.
    12. Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture, S. Khanum, M. Usman, K Hussain, R Zafar, and M Sher, High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 212–217, 2010.
    13. Certificate Chain based Authentication in MANETS using 4th generation Technologies, A. Irshad, W. Noshairwan, M. Shafiq, A. W. Khan, M. Usman, and E. Irshad, in proceedings of the IEEE 2nd International Conference on Computer Science and Information Technology (ICCSIT), pp. 518-523, Beijing, China, August 2009.
    14. Authentication of Nodes among Different Symmetric Key Groups in MANETs using 4G Technologies, A. Irshad, W. Noshairwan, M. Rashid, S. M. Gilani, E. Irshad, and M. Usman, in proceedings of the IEEE International Conference on Computer Engineering and Technology (ICCET), pp. 261-265, Singapore, Jan 2009.
    15. A Secure interaction among nodes from different MANET Groups using 4G technologies, A. Irshad, M. Shafiq, A. Rahman, S. Khurram, M. Usman, and E. Irshad, Oct 2009, In proceedings of the IEEE International Conference on Emerging Technologies (ICET), pp. 476-481, Rawalpindi, Pakistan, 2009.
    16. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks, M. Usman, W. Noshairwan, M. Gilani, A. Irshad, and E. Irshad, in proceedings of the 4th IEEE International Conference on Emerging Technologies, pp. 199-204, Pakistan, 2008.
    17. Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Usman, A. Irshad, M. Gilani WWW/Internet, IADIS, pp. 1-5, Germany, 13-15 Oct, 2008.

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: G:\Official\Personal Web Page\Dr_Usman_Web_Page_files\line.gif

[QAU] [CS] [Academics] [Research] [Faculty] [Admission]

Copyright© cs.qau.edu.pk 2017