- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- IoT and Edge/Fog Computing
- Wireless Communication Networks Research
- Multimedia Communication and Technology
- Wireless Networks and Protocols
- Neural Networks and Applications
- Dermatoglyphics and Human Traits
- Scientific Computing and Data Management
- Teacher Education and Leadership Studies
- Cryptography and Data Security
- Internet of Things and AI
- Cybersecurity and Information Systems
- Digital Mental Health Interventions
- User Authentication and Security Systems
- Organizational Leadership and Management Strategies
- Biometric Identification and Security
- Cryptographic Implementations and Security
- Education and Islamic Studies
- Chaos-based Image/Signal Encryption
- Mobile Learning in Education
- Information and Cyber Security
Auckland University of Technology
2019-2021
Qurtuba University of Science and Information Technology
2017-2020
The study presents a blockchain-based incentive mechanism intended to encourage those in underserved communities engage with healthcare services. smart system, which is the result of amalgamation advanced technologies, has emerged recently and increasingly seen as essential meet needs modern society. An important part system prescription management but studies show that affordability accessibility play creating unequal access for communities. This form results living become disengaged from...
This study is conducted in order to analyze the perception of students on use mobile learning 3G/4G higher education.Data has been collected through survey data, this comprises research questions based previous literature review and formulated hypotheses check tentative statements.Furthermore, data analysis using Kmean algorithm.Additionally, explore methodological gap K-Mean clustering algorithm.The sample consisted 200 department computer science at Gomal Qurtuba universities Dere Ismail Khan.
For any PPT adversary, most traditional leakage-resilient cryptographic primitives cannot ensure that all elements in ciphertext are random. What's worse, a continuous leakage setting, there few available. Currently, not many researchers studying hybrid encryption (LR-HE) scheme. Thus, two (CLR-HE) schemes constructed this paper, and the schemes' security proven based on standard static assumption. Our constructions only can maintain their claimed but also enjoy better performances. Because...
Network security attacks are the major and very common problem being faced by researchers as well network users. Different solution techniques tools technologies have been developed tested for complete provision of tight data over but still hundred percent securities is not assured any tool or technology. SIEM latest monitoring evaluation which alarm based helps in figuring out threats network. This study on performance within a order to evaluate its efficiency frequency types it can handle....
Authentication in personal identication using palm print method provides valuable evidence one's identication. It has been investigated over years by different methods employed both high resolution images which are further processed computerized techniques and software systems low have attracted many researchers attention. This paper proposes a brief introduction about prints its the current classication system is less time consuming followed for research to be carried out biometric...