Our Publications

  • 2023

    [1] Bakhshi, T. Anomalous Host Identification in High-Cardinality Network Streams using ML-Enabled Reverse-Sketching, Communications in Computer and Information Science (CCIS), ICCET, Springer (2023). doi: TBA

  • [2] Bakhshi, T. Using HAK5 Pineapple for Wireless Auditing, Ethical Hacking and Penetration Testing in a Higher Education Context - Lab Manuals, CIMACS (2023).

  • [3] Bakhshi, T., Ghita, B, Kuzminykh, I. SAFE: a Standardized Automotive Forensic Engine for Law Enforcement Agencies, Communications in Computer and Information Science (CCIS), ICCET, Springer (2023). doi: TBA

  • [4] Xi, T., Kuzminykh, I., Ghita, B., Bakhshi, T., Evaluating Learning Algorithms for Keystroke Based User Authentication, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Istanbul, Turkey (2023). doi: TBA

  • 2022

    [1] McDonald, A., Hashmat, F., Ghazanfar A., Hina S., Shah G., Bakhshi, T. Abbas, T. An automated context-aware IoT vulnerability assessment rule-set generator, Computer Communications, 133 - 152, Elsevier (2022). doi: https://doi.org/10.1016/j.comcom.2022.01.022

  • [2] Zafar, S., Bakhshi, T. A Deep Learning approach for anomaly detection in bio-luminecent interfacing in Internet of Bio-Nano Things, Security and Communication Networks (2022). doi: TBA

  • 2021

    [1] Bakhshi, T., Ghita, B. Perspectives on Auditing and Regulatory Compliance in Blockchain Transactions. Trust Models for Next-Generation Blockchain Ecosystems, Springer Nature Switzerland AG (2021). doi: 10.1007/978-3-030-75107-4_2

  • [2] Zafar, S., Nazir, M., Bakhshi, T., Raymond, C. et al. A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things, 9:93529 - 93566, IEEE Access (2021). doi: 10.1109/ACCESS.2021.3093442

  • [3] Abbas, S.G.; Vaccari, I.; Hussain, F.; Zahid, S.; Fayyaz, U.U.; Shah, G.A.; Bakhshi, T.; Cambiaso, E. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors 2021, 21, 4816. doi: https://doi.org/10.3390/s21144816

  • [4] Bakhshi, T.; Ghita, B. Anomaly Detection in Encrypted Internet Traffic using Hybrid Deep Learning. Security and Communication Networks 2021, 21. doi: https://doi.org/10.1155/2021/5363750

  • [5] Tung, S.P; Wong, K.Y.; Kuzminykh, I.; Ghita, B. Bakhshi, T.; Using a Machine Learning Model for Malicious URL Type Detection. The 21st International Conference on Next Generation Wired/Wireless Networks and Systems 2021, St. Petersburg, Russia. doi: TBA

  • [6] Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T. Information Security Risk Assessment. Encyclopedia 2021, 1, 602-617. doi: https://doi.org/10.3390/encyclopedia1030050

  • 2020

    [1] Mahmood, N., Shahid, S., Bakhshi, T. et al. Identification of significant risks in pediatric acute lymphoblastic leukemia (ALL) through machine learning (ML) approach. Medical & Biological Engineering & Computing (2020). doi: 10.1007/s11517-020-02245-2

  • [2] Z. Tariq, N. Batool, I. Nadir and T. Bakhshi, Towards Dynamic Hash-Based Key Establishment in Mobile Wireless Sensor Networking Nodes, IEEE INMIC 2020, Pakistan. doi: 10.1109/INMIC50486.2020.9318055

  • 2019

    [1] H. Oudah, B. Ghita, T. Bakhshi, A. Alruban, D. Walker, "Using Burstiness for Network Applications Classification," Journal of Computer Networks and Communications Volume 2019, Article ID 5758437, 10 pages. doi: 10.1155/2019/5758437

  • [2] Asif Ali, Kashif Zafar, Taimur Bakhshi, "On Nature-Inspired Dynamic Route Planning: Hammerhead Shark Optimization Algorithm". 15th International Conference on Emerging Technologies 2019 (ICET’19), Peshawar, Pakistan, 12/2019

  • [3] Taimur Bakhshi, Ibrahim Nadir, "On MOS-Enabled Differentiated VoIP Provisioning in Campus Software Defined Networking". 15th International Conference on Emerging Technologies 2019 (ICET’19), Peshawar, Pakistan, 12/2019

  • [4] Taimur Bakhshi, Saman Shahid, "Securing Internet of Bio-Nano Things: ML-Enabled Parameter Profiling of Bio-Cyber Interfaces". 22nd IEEE International Multi Topic Conference 2019, Islamabad, Pakistan, 11/2019

  • [5] Taimur Bakhshi, "Securing Software Defined Networks: On Feasibility of Network Behaviour Profiling". International Conference On Latest trends in Electrical Engineering & Computing Technologies, Karachi, Pakistan, 11/2019

  • [6] Taimur Bakhshi, "Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things". 4th International Conference on Emerging Trends in Engineering, Sciences & Technology, Karachi, Pakistan, 12/2019

  • [7] Sarah Tahir Bokhari, Taimur Bakhshi, Tehreem Aftab, Ibrahim Nadir, "Exploring Blockchain-Secured Data Validation in Smart Meter Readings". 22nd IEEE International Multi Topic Conference 2019, Islamabad, Pakistan, 11/2019

  • [8] H. Oudah, B. Ghita, T. Bakhshi, " A Novel Features Set for Internet Traffic Classification using Burstiness ," Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, 397-404, 2019, Prague, Czech Republic. doi: 10.5220/0007384203970404

  • 2018

    [1] T. Bakhshi, "Securing wireless software defined networks: Appraising threats, defenses and research challenges," 2018 International Conference on Advancements in Computational Sciences (ICACS), Lahore, Pakistan, 2018, pp. 1-6. doi: 10.1109/ICACS.2018.8333279

  • [2] I. Nadir and T. Bakhshi, "A Taxonomy of Ransomware Threats and Mitigation Techniques," 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCOMET), Sukkur, Pakistan, 2018, pp. 1-6. doi: 10.1801/ICOMET.2018.125893

  • [3] B.Ghita and T. Bakhshi, "Internet of Profiling - Traffic, Users and Applications," The 12th International IEEE Conference on Communications (COMM2018), Bucharest, Romania, 2018, pp. 27-32. doi: 10.1109/ICComm.2018.8453638

  • [4] T. Bakhshi and M. Ahmed, "IoT-Enabled Smart City Waste Management using Machine Learning Analytics," The 2nd International Conference on Energy Conservation and Efficiency (IEEE ICECE 2018), Lahore, Pakistan, 2018, pp. 1-6. doi: TBA


  • 2017

    [1] T. Bakhshi: State-of-the-art and recent research advances in software defined networking. Wireless Communications and Mobile Computing, Volume 2017 (2017), Article ID 7191647, 35 pages. John Wiley & Sons 2017. doi: 10.1155/2017/7191647

  • [2] T. Bakhshi, "Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors," 2017 13th International Conference on Emerging Technologies (ICET), Islamabad, 2017, pp. 1-6. [Best paper award]. doi: 10.1109/ICET.2017.8281653

  • [3] T. Bakhshi and B. Ghita, "Towards dynamic network policy composition and conflict resolution in software defined networking," 2017 International Conference on Information and Communication Technologies (ICICT), Karachi, Pakistan, 2017, pp. 34-39. doi: 10.1109/ICICT.2017.8320162

  • [4] T. Bakhshi, "Multi-feature Enterprise Traffic Characterization in OpenFlow-based Software Defined Networks," 2017 International Conference on Frontiers of Information Technology (FIT), Islamabad, 2017, pp. 23-28. doi: 10.1109/FIT.2017.00012

  • [5] H. Oudah, B. Ghita and T. Bakhshi, "Network Application Detection Using Traffic Burstiness", World Congress on Internet Security, Cambridge, United Kingdom, 11-14 December 2017.


  • 2016

    [1] T. Bakhshi and B. Ghita: On Internet Traffic Classification: A Two-Phased Machine Learning Approach. Journal of Computer Networks and Communications, vol. 2016, Article ID 2048302, 21 pages, 2016.Hindawi Publishing. doi: 10.1155/2016/2048302

  • [2] T. Bakhshi and B. Ghita, "User-Centric Network Provisioning in Software Defined Data Center Environment," 2016 IEEE 41st Conference on Local Computer Networks (LCN), Dubai, 2016, pp. 289-297. doi: 10.1109/LCN.2016.57

  • [3] T. Bakhshi and B. Ghita, "OpenFlow-enabled user traffic profiling in campus software defined networks," 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, NY, 2016, pp. 1-8. doi: 10.1109/WiMOB.2016.7763235

  • [4] T. Bakhshi and B. Ghita, "User-centric traffic optimization in residential software defined networks," 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, 2016, pp. 1-6. doi: 10.1109/ICT.2016.7500389

  • [5] T. Bakhshi and B. Ghita, "Traffic Profiling: Evaluating Stability in Multi-device User Environments," 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, 2016, pp. 731-736. doi: 10.1109/WAINA.2016.8

  • ©2023 CIMACS