A
Anam Sajid
Researcher at Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology
Publications - 5
Citations - 426
Anam Sajid is an academic researcher from Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology. The author has contributed to research in topics: Cloud computing & Information privacy. The author has an hindex of 3, co-authored 5 publications receiving 345 citations.
Papers
More filters
Journal ArticleDOI
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
TL;DR: The focus of the study presented in this paper is to highlight the security challenges that the industrial SCADA systems face in an IoT-cloud environment and provides the existing best practices and recommendations for improving and maintaining security.
Journal ArticleDOI
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges
Anam Sajid,Haider Abbas +1 more
TL;DR: A systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient’s data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community.
Journal ArticleDOI
A framework for cloud forensics evidence collection and analysis using security information and event management
TL;DR: This paper presents a framework using security information and event management SIEM, to address the issue of efficient evidence collection for crime investigation, such as that for cloud forensics, with respect to the cloud service provider.
Journal ArticleDOI
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms
Haider Abbas,Haider Abbas,Muhammad Yasin,Fahad Ahmed,Anam Sajid,Farrukh Aslam Khan,Rana Aamir Raza Ashfaq,Nur Al Hasan Haldar +7 more
Journal ArticleDOI
Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis
Ijaz Ahmad,Haider Abbas,Asad Raza,Kim-Kwang Raymond Choo,Anam Sajid,Maruf Pasha,Farrukh Aslam Khan +6 more
TL;DR: A forensic process to collect and analyse traces of a virtual machine and its corresponding manager, recorded across multiple sources including the file system, Windows registry, history, and log files from a forensic viewpoint is presented.