Zahid Anwar

ORCID: 0000-0002-4608-4305
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Artificial Intelligence in Healthcare
  • Cloud Data Security Solutions
  • Caching and Content Delivery
  • Software-Defined Networks and 5G
  • Machine Learning in Healthcare
  • Smart Grid Security and Resilience
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Steganography and Watermarking Techniques
  • Web Application Security Vulnerabilities
  • Peer-to-Peer Network Technologies
  • Privacy, Security, and Data Protection
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Digital and Cyber Forensics
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Water Quality Monitoring Technologies

North Dakota State University
2021-2024

University of Gujrat
2024

Dakota State University
2022-2024

National University of Sciences and Technology
2012-2021

Fontbonne University
2016-2020

University of North Carolina at Charlotte
2015-2016

University of the Sciences
2011-2015

National University of Science and Technology
2011-2014

University of Illinois Urbana-Champaign
2005-2010

Urbana University
2005

With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout EV industry. EVs equipped with sensors that maintain sustainable environment for betterment of society enhance human sustainability. However, at same time, as is case any new digital technology, they susceptible to threats security privacy. Recent incidents demonstrate these have been misused car theft, financial fraud, data...

10.3390/en16031113 article EN cc-by Energies 2023-01-19

The new attack surface being crafted by the huge influx of IoT devices is both formidable and unpredictable, as it introduces a rich set unexplored techniques unknown vulnerabilities. These are hard to perceive through traditional means, owing concealed cascaded inter-device, inter-system device-environment dependencies. In this paper, we present IoTSAT, formal framework for security analysis IoT. IoTSAT formally models generic behavior system systems, based on device configurations, network...

10.1109/cns.2016.7860484 article EN 2016-10-01

Software-defined networking (SDN) offers a novel paradigm for effective network management by decoupling the control plane from data thereby allowing high level of manageability and programmability. However, notion centralized controller becomes bottleneck opening up host vulnerabilities to various types attacks. One most harmful, stealthy, easy launch attacks against networked systems is link flooding attack (LFA). In this paper, we demonstrate vulnerability SDN layer LFA how strategy...

10.1109/access.2019.2904236 article EN cc-by-nc-nd IEEE Access 2019-01-01

Precise estimation of crop yield is crucial for ensuring food security, managing the supply chain, optimally utilizing resources, promoting economic growth, enhancing climate resilience, controlling losses, and mitigating risks in agricultural industry. Accurate prediction depends upon several interactive factors, including genotype, conditions, soil fertility, sowing & irrigation plan, management practices. For this purpose, remote sensing data machine learning (ML) algorithms are emerging...

10.1109/access.2023.3321020 article EN cc-by-nc-nd IEEE Access 2023-01-01

Advancement in information technology is playing an increasing role the use of systems comprising relational databases. These databases are used effectively collaborative environments for extraction; consequently, they vulnerable to security threats concerning ownership rights and data tampering. Watermarking advocated enforce over shared providing a means tackling When enforced using watermarking, underlying undergoes certain modifications; as result which, quality gets compromised....

10.1109/tkde.2014.2349911 article EN IEEE Transactions on Knowledge and Data Engineering 2014-08-20

Water is a fundamental resource for human survival but the consumption of water that unfit drinking leads to serious diseases. Access high–resolution satellite imagery provides an opportunity innovation in techniques used quality monitoring. With remote sensing, parameter concentrations can be estimated based on band combinations images. In this study, hybrid sensing and deep learning approach forecasting multi–step was investigated advancement traditionally employed assessment techniques....

10.3390/w14132112 article EN Water 2022-07-01

Cloud computing is a paradigm that shifts drastically from traditional architecture. Although this new brings many advantages like utility model but the design in not flawless and hence suffers only known computer vulnerabilities also introduces unique information confidentiality, integrity availability risks as well due its inherent paradigm. As result digital forensics, which relies heavily on physical access to devices applications logs, has become biggest challenge cloud environments...

10.1109/fit.2011.28 article EN Frontiers of Information Technology 2011-12-01

Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology support agricultural efficiency. In large-scale agriculture, role of unmanned aerial vehicles (UAVs) has increased monitoring collecting farm data at regular intervals. However, an open environment, UAVs can be hacked malfunction report false data. Due limited battery life flight times requiring frequent recharging, a compromised UAV wastes precious energy...

10.3390/app13063857 article EN cc-by Applied Sciences 2023-03-17

There is an exponential rise in the use of smartphones government and private institutions due to business dependencies such as communication, virtual meetings, access global information. These are attractive target for cybercriminals one leading causes cyber espionage sabotage. A large number sophisticated malware attacks well advanced persistent threats (APTs) have been launched on smartphone users. becoming significantly more complex, sophisticated, persistent, undetected extended...

10.3390/technologies11030076 article EN cc-by Technologies 2023-06-12

The promise of pay-as-you-go and scalable model Cloud Computing has attracted a large number medium small enterprises to adopt E-Commerce conducting on-line businesses. While applications on the expand businesses by making them more widely accessible, they also makes these susceptible economic denial sustainability attacks - form application layer DDoS attack that drive up cost computing using resources. This paper focuses detection mitigation EDoS for based applications. is different from...

10.1109/inmic.2013.6731321 article EN 2013-12-01

The Internet of Things (IoT) is being deployed for a plethora use-case scenarios. In any deployment, number configuration choices are available that achieve the mission goal. However, IoT security incidents have demonstrated different configurations vulnerable to varied risk levels. We propose IoTRiskAnalyzer framework formally and quantitatively analyze these risks using probabilistic model checking. takes vulnerability scores, candidate configurations, attacker's capabilities as inputs. It...

10.1109/access.2017.2696031 article EN cc-by-nc-nd IEEE Access 2017-01-01

The last few years have seen a radical shift in the cyber defense paradigm from reactive to proactive, and this change is marked by steadily increasing trend of Cyber Threat Intelligence (CTI) sharing. Currently, there are numerous Open Source (OSINT) sources providing periodically updated threat feeds that fed into various analytical solutions. At point, an excessive amount data being produced such sources, both structured (STIX, OpenIOC, etc.) as well unstructured (blacklists, etc.)....

10.1109/fit.2018.00030 article EN 2018-12-01

Abstract Traffic accidents are a common problem in any transportation network. Road traffic predicted to be the seventh leading cause of deaths by year 2030. Recently research integration geographical information systems (GIS) for analyzing accidents, road design and safety management has increased considerably. The perpetual use GIS tools, lead this study propose identification accident hotspots exploiting technology coupled with kernel density estimation (KDE). This paper proposes KDE...

10.1093/comjnl/bxz158 article EN The Computer Journal 2020-01-19
Coming Soon ...