Tel: (042) 111 128 128 Follow us: Homepage Block-B, Faisal Town, Lahore.

Faculty Members

FSC > Faculty > Profile
Dr. Taimur Bakhshi

Assistant Professor

taimur.bakhshi@nu.edu.pk

(042) 111-128-128 Ext:361

Education


  • Ph.D(Software Defined Networking), University of Plymouth, U.K (2016)
  • M.Sc(Network Systems Engineering), University of Plymouth, U.K (2008)
  • B.Sc(Electrical Engineering), University of Azad Jammu Kashmir, Pakistan (2006)

Profile


Dr. Taimur Bakhshi holds a Ph.D. in computer science, specializing in software defined networking from the Department of Computing & Mathematics, University of Plymouth, UK. His academic credentials also include an M.Sc. in network systems engineering completed with distinction from University of Plymouth and a B.Sc. in electronic engineering from Pakistan. Prior to starting his academic career, Dr. Bakhshi worked for more than five years in IT incident management and network engineering roles for BlackBerry Ltd. and Orange SA (France Telecom). He holds the Associate Fellowship of the Higher Education Academy (HEA), U.K and is a professional member of the British Computer Society (BCS) and the Institute of Electrical and Electronic Engineers (IEEE). He is also a research fellow (visiting) at the Center for Security,  Communications and Network Research (CSCAN), University of Plymouth, U.K.

His present research focuses on software defined networking, Internet measurements, systems security and cyber crime. A list of projects, academic affiliations and publication details are available at the Center for Information Management and Cyber Security website, www.cimacs.org

Journal Publications

[1] Bakhshi, T, Ghita, B., "Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning", Security and Communication Networks, vol. 2021, Article ID 5363750, 16 pages, 2021. https://doi.org/10.1155/2021/5363750

[2] Zafar, S., Nazir, M., Bakhshi, T., Raymond, C. et al., "A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things", 9:93529 - 93566, IEEE Access (2021). doi: 10.1109/ACCESS.2021.3093442

[3] Abbas, S.G.; Vaccari, I.; Hussain, F.; Zahid, S.; Fayyaz, U.U.; Shah, G.A.; Bakhshi, T.; Cambiaso, E., "Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach". Sensors 2021, 21, 4816. doi: https://doi.org/10.3390/s21144816
 
[4] Kuzminykh, I.; Ghita, B.; Sokolov, V.; Bakhshi, T., "Information Security Risk Assessment". Encyclopedia 2021, 1, 602-617. https://doi.org/10.3390/encyclopedia1030050
 
[5] Mahmood, N., Shahid, S., Bakhshi, T. et al,  "Identification of significant risks in pediatric acute lymphoblastic leukemia (ALL) through machine learning (ML) approach", Medical & Biological Engineering & Computing (2020). doi: 10.1007/s11517-020-02245-2
 
[6] H. Oudah, B. Ghita, T. Bakhshi, A. Alruban, D. Walker, "Using Burstiness for Network Applications Classification," Journal of Computer Networks and Communications Volume 2019, Article ID 5758437, 10 pages. doi: 10.1155/2019/5758437
 
[7]  H. Oudah, B. Ghita, T. Bakhshi, " A Novel Feature Set for Application Identification ", International Journal of Information Security Research, Issue 1, Volume 8, pages 764-773, Infonomics Society, 2018. doi: 10.20533/ijisr.2042.4639.2018.0088
 
[8] Bakhshi, T., "State-of-the-art and recent research advances in software defined networking", Wireless Communications and Mobile Computing, Volume 2017 (2017), Article ID 7191647, 35 pages. Wiley & Sons 2017. doi: 10.1155/2017/7191647
 
[9] Bakhshi, T. and Ghita, B., "On Internet Traffic Classification: A Two-Phased Machine Learning Approach", Journal of Computer Networks and Communications, vol. 2016, Article ID 2048302, 21 pages, 2016. doi: 10.1155/2016/2048302
 
[10] Bakhshi, T., Papadaki, M. and Furnell, S. (2009), "Social engineering: assessing vulnerabilities in practice", Information Management & Computer Security, Vol. 17 No. 1, pp. 53-63. https://doi.org/10.1108/09685220910944768
 
Conference Publications
 
[1] Tung S. P.. Wong K. Y., Kuzminykh I., Bakhshi T., Ghita B, "Using a Machine Learning Model for Malicious URL Type Detection", The 21st International Conference on Next Generation Wired/Wireless Networks and Systems, August 26 - 27, 2021, St. Petersburg, Russia.
 
[2] B.Ghita and T. Bakhshi, "Internet of Profiling - Traffic, Users and Applications," The 12th International IEEE Conference on Communications (COMM2018), Bucharest, Romania, 2018, pp. 27-32. doi: 10.1109/ICComm.2018.8453638
 
[3] H. Oudah, B. Ghita and T. Bakhshi, "Network Application Detection Using Traffic Burstiness", World Congress on Internet Security, Cambridge, United Kingdom, 11-14 December 2017
 
[4] H. Oudah, B. Ghita, T. Bakhshi, " A Novel Features Set for Internet Traffic Classification using Burstiness ," Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, 397-404, 2019, Prague, Czech Republic. doi: 10.5220/0007384203970404
 
[5] T. Bakhshi and B. Ghita: User-centric network provisioning in software defined data center environments. 41st IEEE Local Computer Networks Conference, Dubai, 7-9 Nov 2016.
 
[6] T. Bakhshi and B. Ghita: OpenFlow-Enabled user traffic profiling in campus software defined networks. 12th IEEEInternational Wireless & Mobile Comp. Conference, New York.17-19 Oct 2016.
 
[7] T. Bakhshi and B. Ghita: User-centric traffic optimization in residential software defined networks. 23rd International Conference on Telecommunications, Thessaloniki, Greece, 14-16 May 2016.
 
[8] T. Bakhshi and B. Ghita: Traffic Profiling: Evaluating Stability in Multi-device User Environments. The 30th IEEE International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, March 23-25, 2016.
 
[9] T. Bakhshi and B. Ghita: User Traffic Profiling In a Software Defined Networking Context. Sixth International Conference on Internet Technologies and Applications, Wrexham, U.K., September 8-11, 2015. [Best paper award]
 
[10] T.Bakhshi, M. Papadaki and S.Furnell: A Practical Assessment of Social Engineering Vulnerabilities. Second International Symposium on Human Aspects of Information Security & Assurance, Plymouth, U.K, July 11-13, 2008
 
Book Chapters
 
[1] Bakhshi, T., Ghita, B. Perspectives on Auditing and Regulatory Compliance in Blockchain Transactions. Trust Models for Next-Generation Blockchain Ecosystems, Springer Nature Switzerland AG (2021). doi: 10.1007/978-3-030-75107-4_2