- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Access Control and Trust
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Cryptography and Data Security
- Smart Agriculture and AI
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Security and Verification in Computing
- Adversarial Robustness in Machine Learning
- Digital and Cyber Forensics
- Smart Grid Security and Resilience
- Information and Cyber Security
- Mobile Crowdsensing and Crowdsourcing
- Vehicular Ad Hoc Networks (VANETs)
- Business Process Modeling and Analysis
- Context-Aware Activity Recognition Systems
- Privacy, Security, and Data Protection
- Software-Defined Networks and 5G
- Internet Traffic Analysis and Secure E-voting
- COVID-19 Digital Contact Tracing
- Service-Oriented Architecture and Web Services
- Software Engineering Research
Tennessee Technological University
2020-2025
International Institute of Information Technology, Hyderabad
2022
Graphic Era University
2022
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2022
University of Sharjah
2022
Motilal Nehru National Institute of Technology
2022
Indian Institute of Information Technology Allahabad
2022
Qatar University
2022
The University of Texas at San Antonio
2016-2021
ORCID
2020
Internet of Things (IoT) and smart computing technologies have revolutionized every sphere 21 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">st</sup> century humans. IoT the data driven services they offer were beyond imagination just a decade ago. Now, surround us influence variety domains such as automobile, home, healthcare, etc. In particular, Agriculture Farming industries also embraced this technological intervention. Smart devices are...
Undoubtedly, the evolution of Generative AI (GenAI) models has been highlight digital transformation in year 2022. As different GenAI like ChatGPT and Google Bard continue to foster their complexity capability, it's critical understand its consequences from a cybersecurity perspective. Several instances recently have demonstrated use tools both defensive offensive side cybersecurity, focusing on social, ethical privacy implications this technology possesses. This research paper highlights...
Smart cities' vision will encompass connected industrial vehicles, which offer data-driven and intelligent services to the user. Such interaction within dispersed objects are sometimes referred as Internet-of-Vehicles (IIoV). The prime motivation of an transportation system (ITS) is ensuring safety drivers offering a comfortable experience However, such complex infrastructures opens broad attack surfaces adversaries, can remotely exploit control critical mechanics in smart including engine...
Smart farming also known as precision agriculture is gaining more traction for its promising potential to fulfill increasing global food demand and supply. In a smart farm, technologies connected devices are used in variety of ways, from finding the real-time status crops soil moisture content deploying drones assist with tasks such applying pesticide spray. However, use heterogeneous internet-connected has introduced numerous vulnerabilities within farm ecosystem. Attackers can exploit...
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts data spurring the rise Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support devices, agriculture farming sector is shifting towards IoT connected ecosystem to balance increase demand for food supply. As number farms reach critical mass, it now possible include AI assisted systems at a cooperative (co-op) level. Today, United States alone there are about...
Internet of Things (IoT) is revolutionizing and enhancing the quality human lives in every aspect. With a disruption IoT devices applications, attackers are leveraging weak authentication access control mechanisms on these applications to gain unauthorized user data cause them harm. Access critical security mechanism secure ecosystem which comprises cloud computing edge services along with smart devices. Today major service providers including Amazon Web Services (AWS), Google Cloud Platform...
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation smart medical devices and applications used in hospitals, smart-home based care, nursing homes. It utilizes cloud computing services along core (IoT) technologies to sense patients' vital body parameters, monitor health conditions generate multivariate data support just-in-time services. Mostly, this large amount analyzed centralized servers. Anomaly Detection (AD) healthcare ecosystem often plagued by significant...
Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings new paradigm of adaptable network provisioning. However, with diversification services increasing complexity infrastructures, simultaneous rise in security vulnerabilities becomes evident. These flaws go beyond limitations conventional affect aspects slice...
Apache Hadoop is a predominant software framework for distributed compute and storage with capability to handle huge amounts of data, usually referred as Big Data. This data collected from different enterprises government agencies often includes private sensitive information, which needs be secured unauthorized access. paper proposes extensions the current authorization capabilities offered by core other ecosystem projects, specifically Ranger Sentry. We present fine-grained attribute-based...
Internet of Things has become a predominant phenomenon in every sphere smart life. Connected Cars and Vehicular Things, which involves communication data exchange between vehicles, traffic infrastructure or other entities are pivotal to realize the vision city intelligent transportation. Cloud offers promising architecture wherein storage processing capabilities objects utilized provide on-the-fly fog platform. Researchers have demonstrated vulnerabilities this emerging vehicular IoT...
Smart cars are among the essential components and major drivers of future cities connected world. The interaction entities in this vehicular internet things (IoT) domain, which also involves smart traffic infrastructure, restaurant beacons, emergency vehicles, etc., offer several real-time applications provide safer pleasant driving experience to consumers. With more than 100 million lines code hundreds sensors, these vehicles (CVs) expose a large attack surface, can be remotely compromised...
Several organizations are utilizing cloud technologies and resources to run a range of applications. These services help businesses save on hardware management, scalability maintainability concerns underlying infrastructure. Key service providers (CSPs) like Amazon, Microsoft Google offer Infrastructure as Service (IaaS) meet the growing demand such enterprises. This increased utilization platforms has made it an attractive target attackers, thereby, making security top priority for CSPs. In...
On one side, the security industry has successfully adopted some AI-based techniques. Use varies from mitigating denial of service attacks, forensics, intrusion detection systems, homeland security, critical infrastructures protection, sensitive information leakage, access control, and malware detection. other we see rise Adversarial AI. Here core idea is to subvert AI systems for fun profit. The methods utilized production are systematically vulnerable a new class vulnerabilities....
Realizing access control to sensitive data offloaded a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected. Despite solutions, National Institute Standards Technology (NIST)'s Attribute-Based Access Control (ABAC) model one preferred techniques literature. In this model, users who satisfy policies using both static dynamic attributes allowed data. However, NIST's ABAC does not support encryption...
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication access control are the most significant concerns computing. Several researchers this field suggest numerous approaches to enhance authentication towards robustness. User names associated passwords have been a common practice for long as Single Factor Authentication. However, advancements speed simple methods, starting from Brute Force technique...
The prevalence of Internet Things (IoT) is growing rapidly with increasing influence on our daily life. IoT has received considerable attention in both academia and industry recently there been significant studies security privacy aspects cyber-physical systems. Researchers have developed novel access control models mechanisms for IoT. On the side, companies including cloud services providers like Microsoft, Amazon Google deployed Cloud-Enabled Platforms to ensure wide scale adoption....
Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes world. Several IoT applications have been envisioned facilitate data driven smart application for user. Smart City Intelligent Transportation System (ITS) offer futuristic vision smart, secure safe experience end user, at same time efficiently manage sparse resources optimize efficiency city operations. However, outbreaks pandemics like COVID-19 revealed limitations existing...
The ubiquitous presence of smart devices along with advancements in connectivity coupled the elastic capabilities cloud and edge systems have nurtured revolutionized ecosystems. Intelligent, integrated cyber-physical offer increased productivity, safety, efficiency, speed support for data driven applications beyond imagination just a decade ago. Since several connected work together as coordinated unit to ensure efficiency automation, individual operations they perform are often reliant on...
The variety of services and functionality offered by various cloud service providers (CSP) have exploded lately. Utilizing such has created numerous opportunities for enterprises infrastructure to become cloud-based and, in turn, assisted the easily flexibly offer their customers. practice renting out access servers clients computing storage purposes is known as Infrastructure a Service (IaaS). popularity IaaS led serious critical concerns with respect cyber security privacy. In particular,...