Tahir Mohammad
PhD, MSc, B.Tech, Senior Member IEEE
tahir.mohammad@utu.fi Office: 454C ORCID identifier: https://orcid.org/0000-0002-6273-4603 |
Cybersecurity, Artificial intelligence for Cybersecurity, wireless networks, Internet of Things (IoT), Resource allocation and management in 5G and beyond networks
Cyber Security Engineering Lab (https://sites.utu.fi/cyber/?lang=en)
Mohammed Tahir received PhD in Engineering in 2016 from the International Islamic University Malaysia, where his research focused on game-theoretic modelling for improving spectrum sensing and network throughput in cognitive radio networks. He completed his Master's degree in Communication Engineering from the International Islamic University Malaysia in 2011, working on the physical layer security for wireless networks. Before joining the University of Turku, Mohammad Tahir worked as a Senior Lecturer and Program Leader at Sunway University Malaysia, where he managed the dual degree program of BSc in Computer Networking and Security offered in partnership with Lancaster University, UK, and successfully led several funded research projects.
Prior to joining academia, Mohammad Tahir worked for government-funded R&D companies in Malaysia (MIMOS, TM R&D). His work included designing and implementing proof-of-concept using software-defined radios for efficient spectrum utilization and architecting and implementing IoT-based vertical solutions. While he was in the industry, he co-authored two patents on wireless communication and two on IoT. He has also worked in start-ups implementing IoT middleware and smart tracking solutions. He has good experience in providing consultancy services, developing educational materials, and delivering industrial training on IoT. His research interests include 5G/6G networks, the Internet of Things, cybersecurity, game theory, and applied machine learning for wireless networks and the application of blockchain for IoT and wireless networks.
My research spans the physical, MAC, and network layers of the OSI model, focusing on designing and developing smart, secure, and self-organizing systems that apply to wireless networks and IoT. Smart cities, for example, need to integrate cyber-physical critical infrastructure (e.g., smart grids, water networks) and wireless systems. Developing resilient and secure processes for managing various smart city components requires multiple components to adaptively and optimally manage resources (power, spectrum, Qo,S etc.) to operate efficiently and recover quickly in case of failure. I am exploring various techniques, such as machine learning, optimization techniques, Blockchain, and game theory to develop appropriate solutions.
If you would like to work/collaborate in a related area, contact me at tahir.mohammad@utu.fi
- Ethical Hacking
- Firewall and IPS Technology
- Communication Technologies and Security in IoT.
- Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions (2026)
- Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
(A2 Refereed review article in a scientific journal ) - LLM-Assisted Codebook Development for Cybersecurity Interviews with Enhanced Accuracy and Reduced Hallucination (2026) 2026 IEEE 5th International Conference on AI in Cybersecurity (ICAIC) Adeseye, Aisvarya; Isoaho, Jouni; Virtanen, Seppo; Mohammad, Tahir
(A4 Refereed article in a conference publication ) - LLM-Augmented Approach for Learning of Human-Centric Cybersecurity (2026)
- Communications in Computer and Information Science
(A4 Refereed article in a conference publication ) - Novel Textual Data Cleaning Techniques for Cybersecurity Recommendation Extraction and Prioritization using Local LLMs (2026) 2026 IEEE 5th International Conference on AI in Cybersecurity (ICAIC) Adeseye, Aisvarya; Isoaho, Jouni; Virtanen, Seppo; Mohammad, Tahir
(A4 Refereed article in a conference publication ) - Performance Evaluation of LLM Hallucination Reduction Strategies for Reliable Qualitative Analysis (2026)
- Communications in Computer and Information Science
(A4 Refereed article in a conference publication ) - AI-Enhanced Threat Intelligence in Remote Patient Monitoring Systems: A Survey on Recent Advances, Challenges and Future Research Directions (2025)
- IEEE Access
(A1 Refereed original research article in a scientific journal) - Cybersecurity for Internet of Things: big data optimization for IoT-based real-time network traffic analysis (2025) Explainable Artificial Intelligence (XAI) for Next Generation Cybersecurity : Concepts, challenges and applications Ahad, Abdul; Jiangbin, Zheng; Wajahat, Ahsan; Ullah, Khan Shamsher; Muhammad, Tahir; Sheikh, Muhammad Aman
(A3 Refereed book chapter or chapter in a compilation book) - Efficient Prompt Design for Resource-Constrained Deployment of Local LLMs (2025) 2025 IEEE Nordic Circuits and Systems Conference (NorCAS) Adeseye, Aisvarya; Isoaho, Jouni; Virtanen, Seppo; Tahir, Mohammad
(A4 Refereed article in a conference publication ) - Enhancing Explainability of Artificial Intelligence for Threat Detection in SDN-based Multicast Systems (2025)
- Procedia Computer Science
(A4 Refereed article in a conference publication ) - Enhancing Privacy Transparency in Remote Patient Monitoring with Explainable AI (2025)
- Procedia Computer Science
(A4 Refereed article in a conference publication ) - Experimental Implementation of a Low Cost Real-Time Threat Intelligence Solution for Smart Home Security (2025)
- Procedia Computer Science
(A4 Refereed article in a conference publication ) - KeyAware: An Ethical Parental Monitoring Keylogger for Child Online Safety (2025) 2025 IEEE 13th Conference on Systems, Process and Control (ICSPC) Rafsanjani, Ahmad Sahban; Aslam, Saad; SaberiKamarposhti, Morteza; Jasser, Muhammed Basheer; Tahir, Mohammad; Lau, Sian Lun
(A4 Refereed article in a conference publication ) - LLM-Assisted Qualitative Data Analysis: Security and Privacy Concerns in Gamified Workforce Studies (2025)
- Procedia Computer Science
(A4 Refereed article in a conference publication ) - On resource consumption of machine learning in communications network security (2025)
- Computer Networks
(A1 Refereed original research article in a scientific journal) - Randomized CNN based deep learning technique for the cyber-attacks detection in SCADA industrial control systems (2025)
- Measurement
(A1 Refereed original research article in a scientific journal) - Systematic Prompt Framework for Qualitative Data Analysis: Designing System and User Prompts (2025) 2025 IEEE 5th International Conference on Human-Machine Systems (ICHMS) Adeseye, Aisvarya; Isoaho, Jouni; Tahir, Mohammad
(A4 Refereed article in a conference publication ) - Why Compromise Privacy? Local LLMs Rival Commercial LLMs in Qualitative Analysis (2025) 2025 Computing, Communications and IoT Applications (ComComAp) Adeseye, Aisvarya; Isoaho, Jouni; Virtanen, Seppo; Mohammad, Tahir
(A4 Refereed article in a conference publication ) - 6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions (2024)
- Internet of things
(A2 Refereed review article in a scientific journal ) - A Cloud-based Secure Architecture for Remote Patient Monitoring Integrating OPC UA and Human Digital Twin (2024)
- Procedia Computer Science
(A4 Refereed article in a conference publication ) - A Fuzz Testing Approach for Embedded Avionic Software (2024)
- Procedia Computer Science
(A4 Refereed article in a conference publication )



