WANT A PROFILE LIKE THIS?
Create my FREE Plan Or learn about other options
Muhammad Zunnurain Hussain
PeerJ Author & Reviewer
15 Points

Contributions by role

Reviewer 15
Answers 15

Contributions by subject area

Computer Networks and Communications

By Q&A topic

Muhammad Zunnurain Hussain

PeerJ Author & Reviewer

Summary

Muhammad Zunnurain Hussain, an accomplished academic with over 15 years of experience, has significantly contributed to the fields of computer science and engineering. He is currently pursuing a Ph.D. in IoT Security at Universiti Putra Malaysia and holds an MSc in Computer Networking from the University of Bedfordshire. With a rich background in academia, Muhammad has served in various capacities at reputable institutions, notably Bahria University Lahore Campus, where he has been instrumental in leading accreditation processes, supervising projects, and fostering student employability through industry linkage. His expertise spans a broad range of topics, including Cyber Security, Information Security, and Machine Learning, and he has a notable record of publications and conference contributions. Muhammad's commitment to academic excellence, research, and industry collaboration positions him as a leader in the evolving landscape of computer science and technology.

Artificial Intelligence Autonomous Systems Bioinformatics Blockchain Computer Networks & Communications Cryptography Data Mining & Machine Learning Data Science

Past or current institution affiliations

Universiti Putra Malaysia

Work details

PhD Scholar

Universiti Putra Malaysia
August 2020
FSKTM

Assistant Professor

Bahria University Lahore Campus
February 2017
Computer Science
Teaching as Assistant Professor at Bahria Univesity Lahore Campus Pakistan

Identities

@MZunurainHusain

Websites

  • LinkedIn
  • Google Scholar
  • GitHub

PeerJ Contributions

  • Articles 1
  • Answers 1
August 9, 2024
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
Muhammad Zunnurain Hussain, Zurina Mohd Hanapi, Azizol Abdullah, Masnida Hussin, Mohd Izuan Hafez Ninggal
https://doi.org/10.7717/peerj-cs.2231

1 Answer

0
accepted What distinguishes Sybil attacks from other types of security threats in IoT networks?