Publications

Publications

  1. Abdulsatar, Majid, Ahmad, Hussain, Goel, Diksha, and Ullah, Faheem (2025).
    Towards deep learning enabled cybersecurity risk assessment for microservice architectures.
    Cluster Computing, 28(6), 350.
  2. Ahmad, Hussain, Ullah, Faheem, and Jafri, Rehan (2025).
    A survey on immersive cyber situational awareness systems.
    Journal of Cybersecurity and Privacy, 5(2), 33.
  3. Beahan, Samuel, Ullah, Faheem, Chalmers, Lachlan, Fatima, Uswa, and Shahin, Mojtaba (2025).
    Characterizing Vulnerabilities in Microservices: Source, Age and Severity.
    2025 IEEE 22nd International Conference on Software Architecture (ICSA), 96–106.
  4. Ullah, Faheem, Ye, Xiaohan, Fatima, Uswa, Akhtar, Zahid, Wu, Yuxi, and Ahmad, Hussain (2025).
    What Skills Do Cyber Security Professionals Need?.
    arXiv preprint, arXiv:2502.13658.
  5. Kaushik, Pragya, Ullah, Faheem, and Taj, Muhammad Imran (2025).
    Mapping Industry Demands for Digital Forensics: A Study of Penetration Tester Requirements.
    2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 8–16.
  6. Ullah, Faheem, Wang, Liwei, Fatima, Uswa, and Taj, Muhammad Imran (2025).
    Data Breaches: What Happened over the Last 20 Years?.
    Unpublished/preprint.
  7. Jayalath, Raveen Kanishka, Ahmad, Hussain, Goel, Diksha, Syed, Muhammad Shuja, and Ullah, Faheem (2024).
    Microservice vulnerability analysis: A literature review with empirical insights.
    IEEE Access.
  8. Ullah, Faheem, Dhingra, Shagun, Xia, Xiaoyu, and Babar, M. Ali (2024).
    Evaluation of distributed data processing frameworks in hybrid clouds.
    Journal of Network and Computer Applications, 224, 103837.
  9. Tyllis, Nikolas, Ullah, Faheem, and Uzair, Muhammad (2023).
    An exploratory study of vulnerabilities in big data systems.
    2023 IEEE International Conference on Big Data (BigData), 1360–1367.
  10. Dharmadasa, Isuru and Ullah, Faheem (2023).
    Co-tuning of cloud infrastructure and distributed data processing platforms.
    2023 IEEE International Conference on Big Data (BigData), 207–214.
  11. Phu, Anh Tuan, Li, Bo, Ullah, Faheem, Huque, Tanvir Ul, Naha, Ranesh, Babar, Muhammad Ali, and Nguyen, Hung (2023).
    Defending SDN against packet injection attacks using deep learning.
    Computer Networks, 234, 109935.
  12. Mansouri, Yaser, Ullah, Faheem, Dhingra, Shagun, and Babar, M. Ali (2023).
    Design and implementation of fragmented clouds for evaluation of distributed databases.
    IEEE Transactions on Cloud Computing.
  13. Ullah, Faheem and Babar, Muhammad Ali (2023).
    Guidance Models for Designing Big Data Cyber Security Analytics Systems.
    European Conference on Software Architecture, 70–80.
  14. Mansouri, Yaser, Prokhorenko, Victor, Ullah, Faheem, and Babar, Muhammad Ali (2023).
    Resource utilization of distributed databases in edge–cloud environment.
    IEEE Internet of Things Journal, 10(11), 9423–9437.
  15. Ahmad, Hussain, Dharmadasa, Isuru, Ullah, Faheem, and Babar, Muhammad Ali (2023).
    A review on C3I systems’ security: Vulnerabilities, attacks, and countermeasures.
    ACM Computing Surveys, 55(9), 1–38.
  16. Aurangzaib, Rana, Iqbal, Waheed, Abdullah, Muhammad, Bukhari, Faisal, Ullah, Faheem, and Erradi, Abdelkarim (2022).
    Scalable containerized pipeline for real-time big data analytics.
    2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 25–32.
  17. Ullah, Faheem, and Babar, M. Ali (2022).
    Design and evaluation of adaptive system for big data cyber security analytics.
    Expert Systems with Applications, 207, 117948.
  18. Ullah, Faheem, and Babar, M. Ali (2022).
    On the scalability of big data cyber security analytics systems.
    Journal of Network and Computer Applications, 198, 103294.
  19. Ullah, Faheem, Mohammed, Imaduddin, and Babar, M. Ali (2022).
    A framework for energy-aware evaluation of distributed data processing platforms in edge-cloud environment.
    arXiv preprint, arXiv:2201.01972.
  20. Mansouri, Yaser, Prokhorenko, Victor, Ullah, Faheem, and Babar, M. Ali (2021).
    Evaluation of distributed databases in hybrid clouds and edge computing: Energy, bandwidth, and storage consumption.
    arXiv preprint, arXiv:2109.07260.
  21. Sabir, Bushra, Ullah, Faheem, Babar, M. Ali, and Gaire, Raj (2021).
    Machine learning for detecting data exfiltration: A review.
    ACM Computing Surveys (CSUR), 54(3), 1–47.
  22. Duan, Xuanyu, Ge, Mengmeng, Le, Triet Huynh Minh, Ullah, Faheem, Gao, Shang, Lu, Xuequan, and Babar, M. Ali (2021).
    Automated security assessment for the internet of things.
    2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), 47–56.
  23. Ullah, Faheem, and Babar, M. Ali (2019).
    Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation.
    2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), 146–153.
  24. Ullah, Faheem, and Babar, M. Ali (2019).
    QuickAdapt: scalable adaptation for Big Data cyber security analytics.
    2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), 81–86.
  25. Ullah, Faheem, and Babar, Muhammad Ali (2019).
    An architecture-driven adaptation approach for big data cyber security analytics.
    2019 IEEE International Conference on Software Architecture (ICSA), 41–50.
  26. Ullah, Faheem, and Babar, Muhammad Ali (2019).
    Architectural tactics for big data cybersecurity analytics systems: a review.
    Journal of Systems and Software, 151, 81–118.
  27. Ullah, Faheem, Edwards, Matthew, Ramdhany, Rajiv, Chitchyan, Ruzanna, Babar, M. Ali, and Rashid, Awais (2018).
    Data exfiltration: A review of external attack vectors and countermeasures.
    Journal of Network and Computer Applications, 101, 18–54.
  28. Raft, Faheem UllahAdam Johannes, and Mojtaba, Muhammed Ali Babar (2017). Security Support in Continuous Deployment Pipeline.
    12th International Conference on Evaluation of Novel Approaches to Software.
  1. Abdulsatar, Majid, Ahmad, Hussain, Goel, Diksha, and Ullah, Faheem (2025). Towards deep learning enabled cybersecurity risk assessment for microservice architecturesCluster Computing, 28(6), 350.
  2. Ahmad, Hussain, Ullah, Faheem, and Jafri, Rehan (2025). A survey on immersive cyber situational awareness systemsJournal of Cybersecurity and Privacy, 5(2), 33.
  3. Beahan, Samuel, Ullah, Faheem, Chalmers, Lachlan, Fatima, Uswa, and Shahin, Mojtaba (2025). Characterizing Vulnerabilities in Microservices: Source, Age and Severity2025 IEEE 22nd International Conference on Software Architecture (ICSA), 96–106.
  4. Ullah, Faheem, Ye, Xiaohan, Fatima, Uswa, Akhtar, Zahid, Wu, Yuxi, and Ahmad, Hussain (2025). What Skills Do Cyber Security Professionals Need? arXiv preprint, arXiv:2502.13658.
  5. Kaushik, Pragya, Ullah, Faheem, and Taj, Muhammad Imran (2025). Mapping Industry Demands for Digital Forensics: A Study of Penetration Tester Requirements2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 8–16.
  6. Ullah, Faheem, Wang, Liwei, Fatima, Uswa, and Taj, Muhammad Imran (2025). Data Breaches: What Happened over the Last 20 Years? Unpublished/preprint.
  7. Jayalath, Raveen Kanishka, Ahmad, Hussain, Goel, Diksha, Syed, Muhammad Shuja, and Ullah, Faheem (2024). Microservice vulnerability analysis: A literature review with empirical insightsIEEE Access.
  8. Ullah, Faheem, Dhingra, Shagun, Xia, Xiaoyu, and Babar, M. Ali (2024). Evaluation of distributed data processing frameworks in hybrid cloudsJournal of Network and Computer Applications, 224, 103837.
  9. Tyllis, Nikolas, Ullah, Faheem, and Uzair, Muhammad (2023). An exploratory study of vulnerabilities in big data systems2023 IEEE International Conference on Big Data (BigData), 1360–1367.
  10. Dharmadasa, Isuru and Ullah, Faheem (2023). Co-tuning of cloud infrastructure and distributed data processing platforms2023 IEEE International Conference on Big Data (BigData), 207–214.
  11. Phu, Anh Tuan, Li, Bo, Ullah, Faheem, Huque, Tanvir Ul, Naha, Ranesh, Babar, Muhammad Ali, and Nguyen, Hung (2023). Defending SDN against packet injection attacks using deep learningComputer Networks, 234, 109935.
  12. Mansouri, Yaser, Ullah, Faheem, Dhingra, Shagun, and Babar, M. Ali (2023). Design and implementation of fragmented clouds for evaluation of distributed databasesIEEE Transactions on Cloud Computing.
  13. Ullah, Faheem and Babar, Muhammad Ali (2023). Guidance Models for Designing Big Data Cyber Security Analytics SystemsEuropean Conference on Software Architecture, 70–80.
  14. Mansouri, Yaser, Prokhorenko, Victor, Ullah, Faheem, and Babar, Muhammad Ali (2023). Resource utilization of distributed databases in edge–cloud environmentIEEE Internet of Things Journal, 10(11), 9423–9437.
  15. Ahmad, Hussain, Dharmadasa, Isuru, Ullah, Faheem, and Babar, Muhammad Ali (2023). A review on C3I systems’ security: Vulnerabilities, attacks, and countermeasuresACM Computing Surveys, 55(9), 1–38.
  16. Aurangzaib, Rana, Iqbal, Waheed, Abdullah, Muhammad, Bukhari, Faisal, Ullah, Faheem, and Erradi, Abdelkarim (2022). Scalable containerized pipeline for real-time big data analytics2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 25–32.
  17. Ullah, Faheem, and Babar, M. Ali (2022). Design and evaluation of adaptive system for big data cyber security analyticsExpert Systems with Applications, 207, 117948.
  18. Ullah, Faheem, and Babar, M. Ali (2022). On the scalability of big data cyber security analytics systemsJournal of Network and Computer Applications, 198, 103294.
  19. Ullah, Faheem, Mohammed, Imaduddin, and Babar, M. Ali (2022). A framework for energy-aware evaluation of distributed data processing platforms in edge-cloud environmentarXiv preprint, arXiv:2201.01972.
  20. Mansouri, Yaser, Prokhorenko, Victor, Ullah, Faheem, and Babar, M. Ali (2021). Evaluation of distributed databases in hybrid clouds and edge computing: Energy, bandwidth, and storage consumptionarXiv preprint, arXiv:2109.07260.
  21. Sabir, Bushra, Ullah, Faheem, Babar, M. Ali, and Gaire, Raj (2021). Machine learning for detecting data exfiltration: A reviewACM Computing Surveys (CSUR), 54(3), 1–47.
  22. Duan, Xuanyu, Ge, Mengmeng, Le, Triet Huynh Minh, Ullah, Faheem, Gao, Shang, Lu, Xuequan, and Babar, M. Ali (2021). Automated security assessment for the internet of things2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), 47–56.
  23. Ullah, Faheem, and Babar, M. Ali (2019). Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), 146–153.
  24. Ullah, Faheem, and Babar, M. Ali (2019). QuickAdapt: scalable adaptation for Big Data cyber security analytics2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), 81–86.
  25. Ullah, Faheem, and Babar, Muhammad Ali (2019). An architecture-driven adaptation approach for big data cyber security analytics2019 IEEE International Conference on Software Architecture (ICSA), 41–50.
  26. Ullah, Faheem, and Babar, Muhammad Ali (2019). Architectural tactics for big data cybersecurity analytics systems: a review.
    Journal of Systems and Software, 151, 81–118.
  27. Ullah, Faheem, Edwards, Matthew, Ramdhany, Rajiv, Chitchyan, Ruzanna, Babar, M. Ali, and Rashid, Awais (2018). Data exfiltration: A review of external attack vectors and countermeasuresJournal of Network and Computer Applications, 101, 18–54.
  28. Raft, Faheem Ullah, Adam Johannes, and Mojtaba, Muhammed Ali Babar (2017). Security Support in Continuous Deployment Pipeline12th International Conference on Evaluation of Novel Approaches to Software.