Employee Profile

Dr. Munwar Ali

Assistant Professor

PhD(I.T) from Univerisiti Teknologi PETRONAS, Malaysia

Email: munwar.ali@sbbusba.edu.pk

Work Experience

SBBU-SBA (Assistant Professor)

01-03-2019 - Present

MUET KhairpurMir’s (Assistant Professor)

11-06-2018 - 28-02-2019

COMSATS University Lahore (Assistant Professor)

03-10-2016 — 08-06-2018

Universiti Teknologi PETRONAS (UTP), Malaysia (Graduate Assistant)

March-2012 — July-2016

Mashriq Foundation, Hyderabad, Pakistan (IT Manager)

May 2010 — March 2011

HIST, Pakistan (Junior Software Engineer)

April 2009 — February 2010

Qualification

PhD (Data Security; application Cloud Computing) UniverisitiTeknologi PETRONAS, Malaysia

March 2012 — July 2016

Master of Engineering (IT) Mehran University of Engineering and Technology, Pakistan

2009 — 2011

Bachelor of Engineering (SoftwareEngineering) Mehran University of Engineering and Technology, Pakistan

2005 — 2009

Research Area

Cloud Computing

Data Security

Data Mining

Data Science

IOTs

Edge/Fog Computing

Publications

1) M. Ali, R. Shah and A. Ali Wagan, " Cloud Computing and Data Security Threats Taxonomy: A Review", Journal of Intelligent and Fuzzy System, IOS press (IF1.637).

2) M. Ali, L. T. Jung, A. Ali Wagan, and R. Ali, "A New Text based W-Distance Metric to Find the Perfect Match between Words", Journal of Intelligent and Fuzzy System, IOS press(IF1.637).

3) A. A Wagan, M. Zardari, R. A. Shah, and A. Ali, "Multipath Mobility Management Protocol for Mobility Networds", Sindh University Research Journal (Science Series), Vol. 51, No. 4, 2019 .

4) R. A. Shah, A. A. Wagan, M. Ali, K. Hussain, R. Bibi, "Ann Efficient Technique for Network Intrusion Detection Using Feature Selection", Sindh University Research Journal (Science Series), Vol. 51, No. 3, 2019.

5) Ahmad Adnan, Whitworth Brain, ZeshanFurukh, Janczewski Lech, Ali Munwar, Chaudary Muhammad Hasanain and Friedman Robert, "A Relation-Aware Multiparty Access Control", Journal of Intelligence and Fuzzy Systerm, 19-April-2019, pp.1-13. (I.F:1.426).

6) Munwar Ali, Nouman Q. Soomro, Huzaifa Ali, Ahsan Awan, and MohsinKirmani, " Distributed File Sharing and Retrieval Model for Cloud Virtual Environment", International journal of Engineering, Technology and Applied Science Research (ETASR),Vol. 9, No. 2, 2019, 4062-4065. (Index: Thomson Reuters Web of Science/Master list).

7) Z. A. Zardari, M. Ali, R. Shah, L. Zardari, "A Hybrid Technique for Tunneling Mechanism of IPV6 using Teredo and 6RD to Enhance Network Performance", International Journal of Advanced Computer Science and Application , 9(11), pp.100-105. (Indexed: Web of Science, Scopus).

8) T. Ali, U. Draz, S. Yasin, J. Noureen, A. Shaf, and M. Zardari, "An Efficient Participant's Selection Algorithm for Crowdsensing", International Journal of Advanced Computer Science and Applications, 9(1), pp. 399-404, 2018. (Thomson Reuters emerging source citation-index).

9) R. A. Shah, Y. Qian, D. Kumar, M. Ali and M. B. bux, "Network Intrusion detection through discriminative feature selection by using spare logistic regression", Future Internet, 9(4), pp. 1-15, 2017. (EI-index).

10) M. A. Zardari and L. T. Jung, “Data security rules/regulations based classification of file data using TsF-kNN algorithm”, Cluster Computing, pp.1-20, 2016. (Q2; IF:1.85 ).

11) M. A. Zardari, and L.T. Jung, "Classification of file data based on confidentiality in cloud computing using K-NN classifier", International Journal of Business Analysis, Vol. 3(4), 2016.

12) M. A. Zardari, L.T. Jung and M .N .Zakaria, “Data Classification Based on Confidentiality in Virtual Cloud Environment”, Research Journal of Applied Sciences, Engineering and Technology, Vol. 8(13), pp. 1498-1509, 2014.

13) M. A. Zardari and B. Samir, “Generation of Prime Numbers from Advanced Sequence and Decomposition Method”, IJPAM ISSN 1311-8080, Vol. 85. pp. 833-847, 2013.

ISI/Scopus Indexed International Conferences (Published):

14) M. A. Zardari and L. T. Jung, “ Data classification with k-NN using novel character frequency-direct word frequency (CF-DWF) similarity formula”, International Symposium on Mathematical Sciences and Computing Research (iSMSC), 2016.

15) M. A. Zardariand L. T. Jung, “Confidentiality Based File Attributes and Data Classification Using TsF-KNN”, International Conference on IT Convergence and Security, 2015.

16) M. A. Zardari, L.T. Jung and M. N. Zakaria, “K-NN Classifier for Data Confidentiality in Cloud Computing”, ICCOINS, Malaysia, 2014.

17) M. A. Zardari, L.T. Jung and M. N. Zakaria, “A Quantitative Analysis of Cloud UsersSatisfaction and Data Security in Cloud Models”, Science and information conference, UK, 29 August 2014.

18) M. A. Zardari, L.T. Jung and M. N. Zakaria, “Data Security Analysis of Market- Oriented Clouds“, IEEE Conference on Wireless Sensors, Malaysia, 2013.

19) M. A. Zardari, L.T. Jung and M. N. Zakaria,“ Hybrid multi-cloud data security model and data classification”, International conference on advanced computer science application and technologies, Malaysia, 2013.