- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Anomaly Detection Techniques and Applications
- Cybercrime and Law Enforcement Studies
- Text and Document Classification Technologies
- Internet of Things and AI
- Natural Language Processing Techniques
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Urban Heat Island Mitigation
- Privacy, Security, and Data Protection
- Advanced Statistical Methods and Models
- Big Data and Digital Economy
- Energy Load and Power Forecasting
- Mobile Health and mHealth Applications
- Network Packet Processing and Optimization
- Green IT and Sustainability
- Embedded Systems Design Techniques
- IPv6, Mobility, Handover, Networks, Security
- FinTech, Crowdfunding, Digital Finance
Beijing University of Technology
2019-2025
Sindh Agriculture University
2019
University of Sindh
2019
Mehran University of Engineering and Technology
2017
Ensuring robust security in the Internet of Things (IoT) landscape is paramount importance. This research article presents a novel approach to enhance IoT by leveraging collaborative threat intelligence and integrating blockchain technology with machine learning (ML) models. The iOS application acts as central control centre, facilitating reporting sharing detected threats. shared data securely stored on network, enabling ML models access learn from diverse range scenarios. focuses...
Internet of Things (IoT) has caused significant digital disruption to the future world. With emergence 5G technology, IoT would shift rapidly from aspirational vision real-world applications. However, one most pressing issues in is security. Routing protocols IoT, such as Protocol for Low-power and lossy network protocol (RPL), are vulnerable both insider outsider attacks with ones being more challenging because they difficult detect mitigate. Among concerning RPL applications Version Number...
The Internet of Things (IoT) has experienced significant growth in recent years and emerged as a very dynamic sector the worldwide market. Being an open-source platform with substantial user base, Android not only been driving force swift advancement IoT but also garnered attention from malicious actors, leading to malware attacks. Given rapid proliferation times, there is urgent requirement introduce practical techniques for detection such malware. While current machine learning-based...
In the realm of modern healthcare, Electronic Health Records
In recent times social media has become the most important part of everyone to connect with global world share information. Generally, Social is used for multi-purposes such as reading newspaper, magazines and books. The actual involvement, i.e. likes post providing specific interests community. information which we extract from networking websites requires criteria better understanding essential factors their importance. main focus this research on visualization network an involvement All...
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the entire Internet-of-Things (IoT) infrastructure into chaos. As IoT belongs to interconnected devices, it brings along significant security challenges. Cyber threat analysis is an augmentation a network that primarily emphasizes on detection prevention network-based attacks. Moreover, requires by investigation classification malicious activities. In this study, we propose DL-enabled malware scheme using...
This article has been retracted. A retraction notice can be found at https://doi.org/10.3233/JIFS-219433.
Positive developments in smartphone usage have led to an increase malicious attacks, particularly targeting Android mobile devices. has been a primary target for malware exploiting security vulnerabilities due the presence of critical applications, such as banking applications. Several machine learning-based models detection developed recently, but significant research is needed achieve optimal efficiency and performance. The proliferation devices increasing threat made it imperative develop...
There is a link between the cloud and Internet of Things (IoT). The layer that makes up dispersed network environment exactly what it is. Cloud computing brought out to edge through type networking topology referred as fog computing. Users can benefit greatly from Fog's primary role, similar computing, allow people mobility. Fog becoming more popular, whereas at same time, security dangers are growing every day. Users' identification & verification crucial. fact cannot effectively...
Currently, all the devices are using Internet protocol version 4 (IPv4) to access internet. IP addresses of IPv4 now depleted from pool announced by IANA (Internet Assigned Number Authority) in February 2011. To solve this issue 6 (IPv6) is launched. But main problem current can't support directly IPv6 that causes various compatibility issues. Many researchers have proposed techniques, but still, their efficiency and performance a big challenge. This study examines several mechanisms...
The consumption of energy in buildings has risen abruptly over the last decades. Due to less energy-efficient buildings, most is being thrown our surroundings thus making an adverse effect on environment. In this paper, heating and cooling loads private or non-commercial are covered. By implementing proposed technique, which a blend cluster analysis Artificial Neural Network (ANN), evaluation prediction performed. estimation performed using eight input variables ANN-based model. details as...
A healthy human life is the top priority of every humanbeing in present era. In a world full high-tech markets, where everyday new technology introduced to solve prevailing problems more efficient way. We must find out some course actions save as many lives possible. Therefore, this research related Internet Things (IoT). sensors based mobile application that has capability detect heart rate; detected pulse rate are imputed into system performs computations decide whether normal state or...
With the rise in use of Android smartphones, there has been a proportional surge proliferation malicious applications (apps). As mobile phone users are at heightened risk data theft, detecting malware on devices emerged as pressing concern within realm cybersecurity. Conventional techniques, such signature-based routines, no longer sufficient to safeguard from continually evolving sophistication and swift behavioral modifications novel varieties malware. Hence, significant drive recent times...
A key issue facing operators around the globe is most appropriate way to deal with spotting black in networks. For this purpose, technique of passive network monitoring very appropriate; can be utilized incisive problems within individual devices, relating whole LAN (Local Area Network) or core network. This technique, however, not just relevant for troubleshooting, but it also castoff crafting statistics and analyzing enactment. In real time scenarios, a lot applications and/or processes...
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at design, this indeed currently allows investigating harmful behavior in communities. will help organizations to examine external is undoubtedly around. also important police force investigations. forensic techniques used identify source intrusion intruder’s...
Objectives: This paper proposes a method to improve the energy efficiency delivery of instant message group chat messages. A user interaction with messenger using in smart phone causes high power state due undisciplined network transmission between interface (3G or Wi-Fi) and networking operator. Methods/Statistical Analysis: We investigated messaging traffic pattern social chatting apps. In our experimental findings, messages (multi-user friends, colleagues family etc.) delivered by server...
The objective of this study is to discretize the crime rate figures into categorical values and find associations between different rates in multiple cities. Regression modeling used regress value one on basis all others or some other crimes rates. As per US statistics crime, research focused identifying variable cities categorized data by applying machine learning techniques with establishment discretization preprocessing process.
In the 21st century, health care systems worldwide are facing many challenges as a result of growing concern diseases in humans, such intestine, breathing, paralysis, nutritional value, and urogenital disorders. The use mobile technology field healthcare system not only reduces cost but also facilitates quality long-term care, intelligent automation rationalization patient monitoring wherever needed. While regular readings vital signs is critical, it often overlooked because busy life...