Expertise
Engineering & Materials Science
# Authentication
# Cryptocurrency
# Entropy
# Internet Of Things
# Rna
Medicine & Life Sciences
# Internet Of Things
Physics & Astronomy
# Attack
# Vulnerability
Research
His research interests are in the areas of Blockchain technologies, IOTA, IoT security, and cloud security.
Publications
Recent
Ullah, I., de Roode, G.
, Meratnia, N.
, & Havinga, P. (2021).
Threat Modeling — How to Visualize Attacks on IOTA?
Sensors (Switzerland),
21(5), [1834].
https://doi.org/10.3390/s21051834
Brady, M. A.
, Ullah, I.
, & Havinga, P. J. M. (2021).
DOSing Distributed Ledger Technology: IOTA. In
2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP) (pp. 55-61). [9357600] IEEE.
https://doi.org/10.1109/CSP51677.2021.9357600
Mijuskovic, A.
, Ullah, I.
, Bemthuis, R.
, Meratnia, N.
, & Havinga, P. J. M. (2021).
Comparing Apples and Oranges in IoT context: A deep dive into methods for comparing IoT platforms.
IEEE Internet of Things Journal,
8(3), 1797-1816. [9169714].
https://doi.org/10.1109/JIOT.2020.3016921
Ullah, I.
, Meratnia, N.
, & Havinga, P. J. M. (2020).
iMAC: Implicit Message Authentication Code for IoT Devices. In
2020 IEEE 6th World Forum on Internet of Things (WF-IoT) IEEE.
https://doi.org/10.1109/WF-IoT48130.2020.9221331
Ullah, I.
, Meratnia, N.
, & Havinga, P. J. M. (2020).
Entropy as a Service: A Lightweight Random Number Generator for Decentralized IoT Applications. Paper presented at 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2020, Austin, Texas, United States.
https://doi.org/10.1109/PerComWorkshops48775.2020.9156205
de Roode, G.
, Ullah, I.
, & Havinga, P. J. M. (2019).
How to break IOTA heart by replaying? In
2018 IEEE Globecom Workshops (GC Wkshps)
https://doi.org/10.1109/GLOCOMW.2018.8644437
Khan, B., Hasan, L., Wadud, Z., Bangash, M. Y.
, & Ullah, I. (2018).
An Analysis of Tophat: A Fast Splice Junction Mapper for RNA-Sequencing. In
ICBBT 2018 - 2018 10th International Conference on Bioinformatics and Biomedical Technology (pp. 37-41). Association for Computing Machinery.
https://doi.org/10.1145/3232059.3232066
Google Scholar Link
Education
Ikram Ullah did his Bachelor in Electronics and Computer Engineering from Politecnico Di Torino in Italy. Afterwards he studied one year Master of Computer Science at University of Trento. He has earned a dual Master degree in Cyber Security from the Technical University of Berlin and University of Twente. In order to gain in-depth knowledge of Artificial intelligence and algorithms, he joined Halmstad University Sweden. His MSc thesis research was performed at the FOX-IT company in the Netherlands.
Affiliated Study Programmes
Master
Projects
Countdown project
Contact Details
Visiting Address
University of Twente
Drienerlolaan 5
7522 NB Enschede
The Netherlands
Mailing Address
University of Twente
P.O. Box 217
7500 AE Enschede
The Netherlands