- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Internet Traffic Analysis and Secure E-voting
- Network Packet Processing and Optimization
- Cryptography and Data Security
- Software-Defined Networks and 5G
- Vehicular Ad Hoc Networks (VANETs)
- Anomaly Detection Techniques and Applications
- Privacy-Preserving Technologies in Data
- Software System Performance and Reliability
- Caching and Content Delivery
- Wireless Body Area Networks
- Cloud Computing and Resource Management
- Parallel Computing and Optimization Techniques
- Non-Invasive Vital Sign Monitoring
- Autonomous Vehicle Technology and Safety
- EEG and Brain-Computer Interfaces
- Advanced Data Storage Technologies
- Blockchain Technology Applications and Security
- Biometric Identification and Security
- Smart Grid Security and Resilience
King Abdulaziz University
2017-2024
King Abdul Aziz University Hospital
2021
Universitas Budi Luhur
2019
University of Waterloo
2008-2015
Nowadays, many cloud providers offer Virtual Network Function (VNF) services that are dynamically scaled according to the workload. Enterprises enjoy these by only paying for actual consumed resources. From a provider's standpoint, cost of must be kept as low possible, while QoS is maintained and service downtime minimized. In this paper, we introduce Elastic Placement (EVNFP) problem present model minimizing operational costs in providing VNF services. model, elasticity overhead trade-off...
The Internet of Things (IoT) combines hundreds millions devices which are capable interaction with each other minimum user interaction. IoT is one the fastest-growing areas in computing; however, reality that extremely hostile environment internet, vulnerable to numerous types cyberattacks. To resolve this, practical countermeasures need be established secure networks, such as network anomaly detection. Regardless attacks cannot wholly avoided forever, early detection an attack crucial for...
The distributed nature of Internet Things (IoT) and its rapid increase on a large scale raises many security privacy issues. Access control is one the major challenges currently addressed through centralized approaches that may rely third party they are constrained by availability scalability, which result in performance bottleneck. Therefore, this paper proposes novel solution to manage delivery lightweight decentralized secure access an IoT system based multi-agent blockchain. main...
The Internet of Medical Things are susceptible to Man-in-the-Middle (MitM) attack, which can identify healthcare emergency monitored patients and replay normal physiological data prevent the system from raising an alarm. In this article, we propose a framework MitM disrupting operations prohibiting raise alarms by remote monitoring system. To reduce energy consumption for transmission, preserve privacy health data, our transmits smaller size signature derived acquired with message...
The outbreak of Covid-19 and the enforcement lockdown, social distancing, other precautionary measures lead to a global increase in online shopping. increasing significance shopping extensive use e-commerce has increased competition between companies for selling. Highlights that reviews play significant role boosting business or slandering it. Product review is an essential factor customers' decision-making, leading intense topic known as fraudulent fake detection. Given these reviews' power...
Detecting botnet threats has been an ongoing research endeavor. Machine Learning (ML) techniques have widely used for detection with flow-based features. The prime challenges features are that they high computational overhead and do not fully capture network communication patterns. Recently, graph-based ML witnessed a dramatic increase in attention. In networks, graph data offers insights information about patterns between hosts. this paper, we propose model first considers the significance...
In this article, a new procedure is proposed on the basis of Hilbert-Huang Transform and deep learning for cyber-attacks detection in direct current (DC) micro-grids (MGs) as well attacks distributed generation (DG) units its sensors. An advanced elective group method with Krill Herd Optimization (KHO) algorithm proposed. At first, used aim extracting signals feature next these features are applied multiple input models made capturing automatically sentient traits from raw fluctuation...
This paper proposes a novel improved polar bear optimization (IPBO) algorithm and employs it along with (PBO) chaotic population-based variants of to solve combined economic emission dispatch (CEED) problem. PBO is meta-heuristic technique inspired by the hunting mechanisms bears in harsh arctic regions based only on their sense sight. Polar nature exhibits prey not sight but also keen smell. Hence, variant which enhances its operation equipping tracking capabilities utilizing smell has been...
The use of Wireless Body Area Networks (WBANs) in healthcare for pervasive monitoring enhances the lives patients and allows them to fulfill their daily life activities while being monitored. Various non-invasive sensors are placed on skin monitor several physiological attributes, measured data transmitted wirelessly a centralized processing unit detect changes health monitored patient. However, transferred vulnerable various sources interference, sensor faults, measurement injection...
Software-defined network (SDN) is an enabling technology that meets the demand of dynamic, adaptable, and manageable networking architecture for future. In contrast to traditional networks are based on a distributed control plane, plane SDN centralized architecture. As result, SDNs susceptible critical cyber attacks exploit single point failure. A denial service (DDoS) attack one most crucial risky attacks, targeting controller disrupting its services. Several researchers have proposed...
Intrusion Detection Systems (IDSs) are designed to monitor user and/or network activity and generate alerts whenever abnormal activities detected. The number of these can be very large; making the task security analysts difficult manage. Furthermore, IDS alert management techniques, such as clustering correlation, suffer from involving unrelated in their processes consequently provide imprecise results. In this paper, we propose a fuzzy-logic based technique for scoring prioritizing...
Modern vehicles are no longer considered as mere mechanical-based device, instead, they have been hugely replaced by sophisticated electric devices known Electronic Control Unit (ECU). These ECUs communicating with each other publishing/receiving messages that complies well-known protocol called Area Network (CAN). CAN bus is responsible to ensure all critical parts in vehicle e.g. engine, braking, airbag deployment, steering wheel, acceleration, etc. functioning properly. This indicates the...
The wireless body area networks (WBANs) play a vital role in the state-of-the-art medical systems for remote monitoring and maintaining health of patients. These WBANs collect real-time status patients using intelligent sensors submit to servers through internet being utilized by experts. This communication must be anonymous as well secure from attackers reliable dispensation services. In recent years, many authentication protocols WBAN could witnessed. this study, we demonstrate that one...
Cloud data storage is revolutionary because it eliminates the need for additional hardware, which often costly, inconvenient, and requires space. allows owners to store large amounts of in a flexible way at low cost. The number online cloud services their consumers has therefore increased dramatically. However, ensuring privacy security on digital platform challenge. A cryptographic task-role-based access control (T-RBAC) approach can be used protect privacy. This ensures accessibility...
The Internet of Drones (IoD) has blown up the interest academia and industry due to their deployment in military civil fields. In IoD environment, drones collect transmit real-time data users through an insecure wireless medium. A secure efficient authentication protocol is required ensure that only authorized communicate send authentic users. For this purpose, Zhang et al. introduced for environment asserted it could hold out against many known attacks. However, after cautious scrutiny,...
In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range applications services aimed at enhancing road safety driver/passenger comfort. However, massive amount data spread across this network makes securing it challenging. The IoV generates, collects, processes vast amounts valuable sensitive that intruders can manipulate. An intrusion detection system (IDS) is most typical method...
Summary The ongoing Cloud‐IoT (Internet of Things)–based technological advancements have revolutionized the ways in which remote patients could be monitored and provided with health care facilities. real‐time monitoring patient's leads to dispensing right medical treatment at time. professionals need access patients' sensitive data for such monitoring, if treated negligence, it also used malevolent objectives by adversary. Hence, Cloud‐IoT–based technology gains only conferred professionals,...
Video games have become a ubiquitous part of demographically diverse cultures. Numerous studies focused on analyzing the cognitive aspects involved in game playing that could help providing an optimal gaming experience by improving video design. To this end, we present framework for classifying player’s expertise level using wearable electroencephalography (EEG) headset. We hypothesize expert and novice players’ brain activity is different, which can be classified frequency domain features...
The tremendous growth in the realm of Internet Things (IoT) has materialized architecture Drones (IoD). Being an extension IoT technology, IoD may control and monitor drones a particular flight area. emerging 5G mobile communication infrastructure can greatly help transmitting High-Definition (HD) data making to communicate even faster. Nonetheless, these remain vulnerable known security threats due exchange messages on public channel. In addition, also be exposed physical capture...
SUMMARY Intrusion detection systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities detected. The number of these can be very large, making their evaluation by security analysts difficult task. Management is complicated the need configure different components alert systems. In addition, IDS management techniques, such as clustering correlation, suffer from involving unrelated in processes consequently provide results that inaccurate...
Education 4.0 contemplates the involvement of emerging technologies like IoT (Internet Things), Fog and cloud computing. Ubiquitous real-time monitoring under challenging environment an educational institution is key requirement for proper implementation around world. Conspicuously, this research presents a novel irregularity detection framework institutions. In research, acquisition data while deploying being suggested in comprehensive environs Pre-processing acquired feature extraction...