Dr. David Samuel Bhatti
Assistant Professor
Ext: 613
Dr. David Samuel Bhatti received his PhD Computer Science (Specialization: Computer & Communication Security) from NUST, MS from Riphah International University, MSC from Federal Urdu University of Arts Science and Technology and BSc Hons in Computing and Information System from London Metropolitan University UK. He has more than fifteen years of teaching experience in different higher education institutes of Pakistan such as NUST, University of Lahore, Foundation University, Institute of Management Sciences (Lahore), Saint Mary’s College (NUML) , CDS College (NCC UK, London Metropolitan University UK). Dr. David had been working on HEC funded R&D projects during his PhD at NUST. He has strong linkage with local and foreign researchers. His areas of interest are
1. Network security
2. Mobiles and smart-phones security
3. Secure routing protocol
4. Secret key establishment and device authentication in low resource devices such as wearable/body-worn and WBAN devices.
5. Machine Learning (ML) based security solutions for networks and smart-devices.
6. Prediction/Estimation of resource utilization using Machine Learning
PhD | Computer Science | Information Security NUST | 2020 |
MS Computer Science | Computer Science | Riphah International Uni | 2018 |
MSc | Network System | Federal Urdu Uni. Of Arts, Science and Technology | 2007 |
BCIS(Hons) | Computing & Information Systems | London Metropolitan Uni UK | 2002 |
Asst. Professor | IMS (Lahore) | 1.5 years |
Asst. Professor | University of Lahore | 6 |
Research Associate | SEECS NUST | 10 Months |
Teacher Visiting Faculty (TVF) | SEECS NUST | One Semester |
Lecturer | Saint Mary’s College | 2 |
HOD IT | NICON Institute of Pakistan NICON group of Colleges | 2 |
Degree Faculty Member | CDS College | 5 |
Software Developer | CDS College | 2 |
Lab Instructor | CDS College | 1 |
1 | D. S. Bhatti, M. M. Hussain, B. Suh, Z. Ali, I. Akobir and K. -I. Kim, "IoT-Enhanced Transport and Monitoring of Medicine Using Sensors, MQTT, and Secure Short Message Service," in IEEE Access, vol. 12, pp. 46690-46703, 2024, doi: 10.1109/ACCESS.2024.3382508. |
2 | D. S. Bhatti, S. Saleem, Z. Ali, T.-J. Park, B. Suh, A. Kamran, W. J. Buchanan, and K.-I. Kim, "Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks," in IEEE Access, vol. 12, pp. 41499-41516, 2024, doi: 10.1109/ACCESS.2024.3377144. Published |
3 | Bhatti, D.S., Saleem, S., Imran, A. et al. Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions. Sci Rep 14, 3428 (2024). online Published |
4 | David Samuel Bhatti , Salbia Sidrat , Shahzad Saleem, Ki-Il Kim, “Performance Analysis: Securing SIP on Multi-threaded/Multi-core Proxy Server using Public Keys on Diffie–Hellman (DH) in Single and Multi-Server Queuing Scenarios”,PLosOne, Published |
5 | D. S. Bhatti, N. Tariq, Z. Ali and U. A. Raza, "AI’s Challenge to Ethics and Law: Privacy, Bias, and Beyond," 2023 25th International Multitopic Conference (INMIC), Lahore, Pakistan, 2023, pp. 1-7, doi: 10.1109/INMIC60434.2023.10466146. Published |
6 | Malik, A.W.; Bhatti, D.S.; Park, T.-J.; Ishtiaq, H.U.; Ryou, J.-C.; Kim, K.-I. Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors 2024, 24, 433. online published |
7 | A. W. Malik, A. H. Zahid, D. S. Bhatti, H. J. Kim and K. -I. Kim, "Designing S-box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map," in IEEE Access, doi: 10.1109/ACCESS.2023.3298111. Published |
8 | Bhatti, David Samuel, Shahzad Saleem, Azhar Imran, Zafar Iqbal, Abdulkareem Alzahrani, HyunJung Kim, and Ki-Il Kim. 2022. "A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy" Sensors 22, no. 20: 7722. Online Published |
9 | D. S. Bhatti and S. Saleem, "Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication," in IEEE Access, vol. 8, pp. 24242-24257, 2020. Published |
10 | David Samuel Bhatti, Kinza Sardar, Meh Jabeen and Umair B. Chaudhry, “Combating the Looping Behavior: A Result of Routing Layer Attack” International Journal of Advanced Computer Science and Applications (IJACSA), 9(4), 2018.Online Published |
11 | David Samuel Bhatti, Shehla Saeed, Muhammad Asad Ullah, Naila Samar Naaz, Syed Saqib Raza Rizvi, Syed Taha Ali, “SRoWM: Smart Review on Wormhole Mitigation”, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.12, December 2017. Published |
12 | D. Bhatti, N. A. Saqib, Z. Anwar “SCEAM: Secure Corporate Environment Adhered to Mobility”, INTECH 2016, Dubline Ireland, August 2016 Published |