Muhammad Asim

3.4k total citations · 1 hit paper
75 papers, 2.3k citations indexed

About

Muhammad Asim is a scholar working on Computer Networks and Communications, Information Systems and Electrical and Electronic Engineering. According to data from OpenAlex, Muhammad Asim has authored 75 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 54 papers in Computer Networks and Communications, 26 papers in Information Systems and 14 papers in Electrical and Electronic Engineering. Recurrent topics in Muhammad Asim's work include IoT and Edge/Fog Computing (26 papers), Network Security and Intrusion Detection (18 papers) and Advanced Malware Detection Techniques (12 papers). Muhammad Asim is often cited by papers focused on IoT and Edge/Fog Computing (26 papers), Network Security and Intrusion Detection (18 papers) and Advanced Malware Detection Techniques (12 papers). Muhammad Asim collaborates with scholars based in Pakistan, United Kingdom and United Arab Emirates. Muhammad Asim's co-authors include Thar Baker, Noshina Tariq, Abdul Rehman Javed, Mirza Omer Beg, Hissam Tawfik, Farrukh Aslam Khan, Mohammed Al-Khafajiy, Rajkumar Buyya, Muhammad Adnan Tariq and Hala Mokhtar and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Journal on Selected Areas in Communications.

In The Last Decade

Muhammad Asim

72 papers receiving 2.2k citations

Hit Papers

A decentralized lightweight blockchain-based authenticati... 2020 2026 2022 2024 2020 50 100 150

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Muhammad Asim Pakistan 27 1.5k 940 588 344 322 75 2.3k
Mian Ahmad Jan Pakistan 31 1.6k 1.1× 713 0.8× 650 1.1× 306 0.9× 685 2.1× 108 2.6k
Chan Yeob Yeun United Arab Emirates 29 953 0.6× 836 0.9× 778 1.3× 255 0.7× 312 1.0× 168 2.3k
Fazlullah Khan Pakistan 27 1.0k 0.7× 611 0.7× 480 0.8× 218 0.6× 467 1.5× 92 2.0k
Al‐Sakib Khan Pathan Bangladesh 23 1.3k 0.8× 546 0.6× 491 0.8× 268 0.8× 538 1.7× 186 2.1k
Ola Salman Lebanon 21 1.3k 0.8× 607 0.6× 660 1.1× 381 1.1× 512 1.6× 62 2.3k
S. Smys India 26 936 0.6× 471 0.5× 554 0.9× 234 0.7× 476 1.5× 97 2.0k
Abdulhameed Alelaiwi Saudi Arabia 29 1.6k 1.0× 972 1.0× 889 1.5× 202 0.6× 677 2.1× 84 3.0k
Md. Arafatur Rahman Malaysia 23 918 0.6× 462 0.5× 440 0.7× 220 0.6× 454 1.4× 127 1.9k
Muhammad Bilal South Korea 33 1.7k 1.1× 866 0.9× 714 1.2× 161 0.5× 840 2.6× 197 3.3k
Roobaea Alroobaea Saudi Arabia 27 666 0.4× 508 0.5× 661 1.1× 232 0.7× 304 0.9× 194 2.3k

Countries citing papers authored by Muhammad Asim

Since Specialization
Citations

This map shows the geographic impact of Muhammad Asim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Muhammad Asim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Muhammad Asim more than expected).

Fields of papers citing papers by Muhammad Asim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Muhammad Asim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Muhammad Asim. The network helps show where Muhammad Asim may publish in the future.

Co-authorship network of co-authors of Muhammad Asim

This figure shows the co-authorship network connecting the top 25 collaborators of Muhammad Asim. A scholar is included among the top collaborators of Muhammad Asim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Muhammad Asim. Muhammad Asim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Asim, Muhammad, et al.. (2025). SecT: A Zero-Trust Framework for Secure Remote Access in Next-Generation Industrial Networks. IEEE Journal on Selected Areas in Communications. 43(6). 2293–2311.
3.
Javed, Abdul Rehman, et al.. (2024). DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning. Computers & Security. 139. 103712–103712. 25 indexed citations
4.
Iram, Shamaila, et al.. (2024). Intelligent framework of sustainable cyber-physical services for autonomous manufacturing industries. Service Oriented Computing and Applications. 19(4). 291–311. 1 indexed citations
5.
Hanif, Muhammad, Ahmed E. Radwan, Chuanxiu Luo, et al.. (2023). Depositional and diagenetic modeling of the Margala Hill Limestone, Hazara area (Pakistan): Implications for reservoir characterization using outcrop analogues. Geoenergy Science and Engineering. 224. 211584–211584. 18 indexed citations
7.
Asim, Muhammad, et al.. (2023). Efficient Approach for Anomaly Detection in IoT Using System Calls. Sensors. 23(2). 652–652. 7 indexed citations
8.
Javed, Abdul Rehman, et al.. (2023). Toward explainable AI-empowered cognitive health assessment. Frontiers in Public Health. 11. 1024195–1024195. 19 indexed citations
9.
Asim, Muhammad, et al.. (2023). Isolated bubble ascent in a non-Newtonian media inside an infinite bubble column: a CFD study. Brazilian Journal of Chemical Engineering. 41(4). 1127–1138. 1 indexed citations
10.
Farooq, Umer, Muhammad Asim, Noshina Tariq, Thar Baker, & Ali Ismail Awad. (2022). Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security. Sensors. 22(12). 4539–4539. 12 indexed citations
11.
Farooq, Umer, Noshina Tariq, Muhammad Asim, Thar Baker, & A. I. Al-Shamma’a. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing. 162. 89–104. 42 indexed citations
12.
Tariq, Noshina, et al.. (2020). A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors. 21(1). 23–23. 44 indexed citations
13.
Javed, Abdul Rehman, Mirza Omer Beg, Muhammad Asim, Thar Baker, & Ali H. Al‐Bayatti. (2020). AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes. Journal of Ambient Intelligence and Humanized Computing. 14(5). 4869–4882. 79 indexed citations
14.
Asim, Muhammad, et al.. (2019). A Mechanism for Securing IoT-enabled Applications at the Fog Layer. Journal of Sensor and Actuator Networks. 8(1). 16–16. 83 indexed citations
15.
Tariq, Noshina, Muhammad Asim, Feras Al‐Obeidat, et al.. (2019). The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors. 19(8). 1788–1788. 188 indexed citations
16.
Aldawsari, Bandar, Thar Baker, Muhammad Asim, et al.. (2018). A Survey of Resource Management Challenges in Multi-cloud Environment: Taxonomy and Empirical Analysis. Liverpool John Moores University. 1(1). 51–65. 3 indexed citations
17.
Asim, Muhammad, et al.. (2013). Urdu in anglicized world: A corpus based study. 4(4). 135–141. 3 indexed citations
18.
Zhou, Bo, David Llewellyn‐Jones, Qi Shi, Muhammad Asim, & M. Merabti. (2013). Prototype for design-time secure and trustworthy service composition. 847–848. 1 indexed citations
19.
Asim, Muhammad, et al.. (2011). A corpus based study of discourse markers in British and Pakistani speech. PUB – Publications at Bielefeld University (Bielefeld University). 5 indexed citations
20.
Asim, Muhammad, et al.. (2010). Quality function deployment of cement industry in Pakistan. 2095–2099. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026