Categories
Associate Professor People

Aiash, Dr Mahdi

Email: M.Aiash @ mdx.ac.uk
Office: T119 Town Hall Building, Hendon Campus
Personal Website

About

  • Associate Professor in Computing & Communications Engineering

Research Interests

  • Security of Computer Networks and Information Systems.
  • Security Protocols: design and verification.
  • Future Internet: Internet of Things (IoTs), Software Defined Networks (SDN) and Information Centric Networks (ICNs).
  • Virtualization and Cloud Computing and Big Data.
  • Pervasive Communication and Heterogeneous Networks.
  • Computer Networks and Telecommunications.
  • Advanced Wireless Networking.

More Information

Publications Repository

Signature-based security analysis and detection of IoT threats in advanced message queuing protocol

Hashimyar, M.E., Aiash, M., Khoshkholghi, A. and Nalli, G. 2025. Signature-based security analysis and detection of IoT threats in advanced message queuing protocol. Network. 5 (1). https://doi.org/10.3390/network5010005

Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications

Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221

Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain

Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913

IoT-based emergency vehicle services in intelligent transportation system

Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324

Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

Edris, E., Aiash, M. and Loo, J. 2022. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array. 16. https://doi.org/10.1016/j.array.2022.100254

An introduction of a modular framework for securing 5G networks and beyond

Edris, E., Aiash, M. and Loo, J. 2022. An introduction of a modular framework for securing 5G networks and beyond. Network. 2 (3), pp. 419-439. https://doi.org/10.3390/network2030026

Security in network services delivery for 5G enabled D2D communications: challenges and solutions

Edris, E., Aiash, M. and Loo, J. 2021. Security in network services delivery for 5G enabled D2D communications: challenges and solutions. in: Montasari, R., Jahankhani, H. and Al-Khateeb, H. (ed.) Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats Cham Springer. pp. 1-27

DCSS protocol for data caching and sharing security in a 5G network

Edris, E., Aiash, M. and Loo, J. 2021. DCSS protocol for data caching and sharing security in a 5G network. Network. 1 (2), pp. 75-94. https://doi.org/10.3390/network1020006

Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif

Edris, E., Aiash, M. and Loo, J. 2021. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics. 10 (13). https://doi.org/10.3390/electronics10131608

Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems

Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
« Previous123...7Next »