- Mobile Ad Hoc Networks
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
- Cooperative Communication and Network Coding
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Security Techniques
- Innovation and Knowledge Management
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- University-Industry-Government Innovation Models
- Advanced MIMO Systems Optimization
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- Advanced Wireless Network Optimization
- Spam and Phishing Detection
- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Intellectual Capital and Performance Analysis
- Software-Defined Networks and 5G
- Energy Harvesting in Wireless Networks
- Blockchain Technology Applications and Security
- IPv6, Mobility, Handover, Networks, Security
Universiti Malaysia Sarawak
2016-2025
Advocate Lutheran General Hospital
2024
King Fahd University of Petroleum and Minerals
2022
Saint Louis University
2021
Qatar University
2020
Behman Hospital
2019
Bangladesh University of Engineering and Technology
2018
University of Missouri–Kansas City
2016
Innopolis University
2016
University of Technology Malaysia
2010-2013
Abstract The rapid advances in the internet and communication fields have resulted a huge increase network size corresponding data. As result, many novel attacks are being generated posed challenges for security to accurately detect intrusions. Furthermore, presence of intruders with aim launch various within cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents from possible intrusions by inspecting traffic, ensure its confidentiality, integrity,...
Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to (V2V) infrastructure (V2I) improve road safety enhance the efficiency of traffic flow. Due its open wireless boundary high mobility, is vulnerable malicious nodes that could gain access into network carry out serious medium control (MAC) layer threats, such denial service (DoS) attacks, data modification impersonation Sybil replay...
The revolutionary idea of the internet things (IoT) architecture has gained enormous popularity over last decade, resulting in an exponential growth IoT networks, connected devices, and data processed therein. Since devices generate exchange sensitive traditional internet, security become a prime concern due to generation zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide much-needed efficient solution network by protecting entry points through constant...
The dynamics of computer networks have changed rapidly over the past few years due to a tremendous increase in volume connected devices and corresponding applications. This growth network's size our dependence on it for all aspects life therefore resulted generation many attacks network by malicious parties that are either novel or mutations older attacks. These pose challenges security personnel protect nodes data from possible intrusions. A intrusion detection system (NIDS) can act as one...
The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities impersonation. Thus, it becomes an imperative detect such code in real time before any activity is performed. This study proposes efficient method of detecting previously unknown java scripts using interceptor at the client side classifying key features code. Feature subset was obtained wrapper dimensionality reduction. Supervised machine learning...
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it mandatory to be secured from all known threats because minor attacker’s disturbance severely threatens the whole system. A server posed with numerous threats; an adversary can easily enter access sensitive information, especially for healthcare industry, which offers services patients, researchers, labs, hospitals flexible way minimal...
Short Message Service (SMS) spam poses significant risks, including financial scams and phishing attempts. Although numerous datasets from online repositories have been utilized to address this issue, little attention has given evaluating their effectiveness impact on SMS detection models. This study fills gap by assessing the performance of ten using Decision Tree Multinomial Naïve Bayes Datasets were evaluated based accuracy qualitative factors such as authenticity, class imbalance,...
Purpose: The purpose of this work is to understand the changes brought by artificial intelligence (AI) and big data analytics (BDA) supply chain management (SCM) sustainable manufacturing (SM) in developing countries context. It seeks identify key enablers, advantages, challenges implementing those technologies toward advancement UN SDGs. Design/Methodology/Approach: Cross-sectional survey research method was adopted; specifically, structured questionnaires were administered 356 mid senior...
In this work, a new heuristic computing design is presented with an artificial intelligence approach to exploit the models feed-forward (FF) Gudermannian neural networks (GNN) accomplished global search capability of genetic algorithms (GA) combined local convergence aptitude active-set method (ASM), i.e., FF-GNN-GAASM solve second kind Lane–Emden nonlinear singular (LE-NSM). The proposed based on intelligent kernel incorporated hidden layer configuration FF-GNN differential operatives...
Abstract Software‐defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, the ability exercise centralized control. However, control plane of system is vulnerable denial‐of‐service (DoS) attacks, which are a primary focus for attackers. These attacks have potential result in substantial delays packet loss. In this study, we present novel called Two‐Phase Authentication Attack Detection...
With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result effective device-to-device (D2D) communication. High throughput requirement 5G/6G technology requires each device to act as intelligent transmission relays. Inclusion of such intelligence relays and quantum computing at D2D may compromise existing security mechanisms lead towards primitive attacks impersonation attack, rouge replay MITM DoS attack. Thus, an yet...
This paper demonstrates a broad exploration of existing authentication and secure communication unmanned aerial vehicles (UAVs) in ‘6G network’. We begin with an overview surveys that deal UAV 6G beyond communications, standardization, applications security. In order to highlight the impact blockchain ‘UAV networks’ future systems, we categorize groups this review into two comprehensive groups. The first group, named Performance Group (PG), comprises performance-related needs on data rates,...
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. gained researchers' interest as it offers communication large bandwidth, high throughput, data transmission, greater signal gain. eliminates the idea cell boundary in reduces frequent handover inter-cell interference issues. However, effectiveness current authentication protocol could become serious...
Vehicular ad hoc networks (VANETs) have earned a gigantic consideration in the recent era. Wide deployment of VANETs for enhancing traffic safety, management, and assisting drivers through elegant transportation system is facing several research challenges that need to be addressed. One crucial issues consists design scalable routing algorithms are robust rapid topology changes frequent link disconnections caused by high mobility vehicles. In this article, first all, we give detailed...
Nowadays, the organizations are emphasizing on security and resilient aspect of cloud computing to protect privacy confidentiality their data information. However, hypervisor attack remains a hot issue by user even though enormous research have accomplished inhibit vulnerabilities in virtualized environment. Therefore, we proposed Virtual Machines Hypervisor Intrusion Detection System, VMHIDS as our technique detecting preventing attacks The has adopted several features from other techniques...
VANET (Vehicular Ad-hoc Network) is an emerging offshoot of MANETs (Mobile Networks) with highly mobile nodes. It envisioned to play a vital role in providing safety communications and commercial applications the on-road public. Establishing optimal route for vehicles send packets their respective destinations VANETs challenging because quick speed vehicles, dynamic nature network, intermittent connectivity among This paper presents novel position based routing technique called Dynamic...