Zia Muhammad

ORCID: 0000-0002-9172-5212
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Digital and Cyber Forensics
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • Cybercrime and Law Enforcement Studies
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Digital Media Forensic Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Electric Vehicles and Infrastructure
  • Security and Verification in Computing
  • Wireless Communication Networks Research
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Security in Wireless Sensor Networks
  • Innovative Energy Harvesting Technologies
  • Advanced MIMO Systems Optimization
  • Cloud Computing and Resource Management
  • Online Learning and Analytics
  • Energy Efficient Wireless Sensor Networks

University of Jamestown
2024-2025

North Dakota State University
2023-2024

Air University
2022-2023

National University of Sciences and Technology
2021

Quaid-i-Azam University
2015

National University of Science and Technology
2009

University of the Sciences
2009

University of California, Davis
2008

With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout EV industry. EVs equipped with sensors that maintain sustainable environment for betterment of society enhance human sustainability. However, at same time, as is case any new digital technology, they susceptible to threats security privacy. Recent incidents demonstrate these have been misused car theft, financial fraud, data...

10.3390/en16031113 article EN cc-by Energies 2023-01-19

The Metaverse brings together components of parallel processing computing platforms, the digital development physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties real world. It possesses more rigorous requirements for connection, including safe access data privacy, which are necessary advent technology. Traditional, centralized, network-centered solutions fail provide resilient management solution. There...

10.3390/fi16050176 article EN cc-by Future Internet 2024-05-18

There is an exponential rise in the use of smartphones government and private institutions due to business dependencies such as communication, virtual meetings, access global information. These are attractive target for cybercriminals one leading causes cyber espionage sabotage. A large number sophisticated malware attacks well advanced persistent threats (APTs) have been launched on smartphone users. becoming significantly more complex, sophisticated, persistent, undetected extended...

10.3390/technologies11030076 article EN cc-by Technologies 2023-06-12

In the digital era, evolution of big data, cloud computing, Internet Things (IoT), blockchain, and quantum computing demands a preferable networking infrastructure to handle network expansion usage optimally. traditional Data Center Networks (DCNs), bundling control data plane in same device limits its functionality for dynamic computation storage access. The load balancing developed is not precise, as it based on local information network. Due existing static routing mechanisms networks,...

10.1109/icacs60934.2024.10473246 article EN 2024-02-19

The growing prevalence of AI-generated multimedia content, particularly deepfakes, has facilitated the spread fake news, propaganda, identity theft, and undermined importance privacy authenticity in digital media. Existing techniques often lack robustness handling complex deepfake artifacts, especially those involving fused facial regions such as eyes, nose, mouth. This study addresses challenges posed by deepfakes across domains social media, politics, entertainment proposing a hybrid deep...

10.20944/preprints202502.0552.v1 preprint EN 2025-02-07

Ransomware attacks are sophisticated, frequent, and pose severe cybersecurity challenges. They challenging to detect due the emergence of more robust encrypting algorithms, polymorphic nature, zero-day threat exploitation. Prior techniques use static analysis signature matching for detection, but drawback is that they cannot new, zero-day, ransomware. This research aims provide an accurate, cost-effective efficient framework Detection using Ensemble Learning (RanDEL). The proposed model...

10.20944/preprints202502.1824.v1 preprint EN 2025-02-24

This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights importance preserving privacy authenticity in digital media. The background study emphasizes growing threat deepfakes, which pose significant challenges various domains, including social media, politics, entertainment. Current methodologies primarily rely visual features that are specific to dataset fail generalize well across varying manipulation However,...

10.3390/info16040270 article EN cc-by Information 2025-03-27

The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity privacy. emergence of zero-day vulnerabilities unexpected exploits highlighted the need innovative solutions combat these threats. Bug bounty programs have gained popularity as cost-effective way crowdsource task identifying vulnerabilities, providing secure efficient means enhancing cybersecurity. This paper provides comprehensive survey various free paid bug in industry,...

10.3390/blockchains2030010 article EN Blockchains 2024-07-08

The Tor browser is widely used for anonymity, providing layered encryption enhanced privacy. Besides its positive uses, it also popular among cybercriminals illegal activities such as trafficking, smuggling, betting, and illicit trade. There a need Browser forensics to identify use in unlawful explore consequences. This research analyzes artifacts generated by on Windows-based systems. methodology integrates forensic techniques into incident responses per NIST SP (800-86), exploring areas...

10.3390/info15080495 article EN cc-by Information 2024-08-19

<title>Abstract</title> The proliferation of preloaded apps and third-party applications has raised significant concerns regarding user security privacy. This study introduces the Zero Trust Architecture (ZTA), a novel approach to addressing issues caused by poorly designed vulnerable mobile applications. ZTA employs comprehensive strategy safeguard privacy, incorporating thorough app permission analysis alongside dynamic behavior assessment. proposed framework closely monitors real-time...

10.21203/rs.3.rs-4464369/v1 preprint EN cc-by Research Square (Research Square) 2024-06-05

Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit employees access corporate effectively. However, technology raises concerns, including security threats, latency, throughput, scalability, among others. These newer-generation threats are more complex frequent, makes legacy approach ineffective. research paper...

10.3390/info15110734 article EN cc-by Information 2024-11-17

The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects society, its influence on political processes and has become a critical area concern. This because language models are far neutral or objective; they inherit biases their training data the individuals who design utilize them, which can sway voter decisions affect democracy. In this research paper, we explore how directly impact election...

10.3390/blockchains2040020 article EN Blockchains 2024-11-21

Cloud computing has become increasingly prevalent in recent years, providing organizations with on-demand re-sources. While cloud infrastructure matured security en-hancements, attackers' strategies for launching attacks on networks are also becoming more sophisticated, posing a risk to the system's confidentiality, integrity, and availability. Virtualization is key aspect of computing, which allows physical computers share their resources power. To secure infrastructure, multiple defensive...

10.1109/icai58407.2023.10136655 article EN 2023-02-22

Electric vehicles (EVs) are becoming increasingly prevalent, with many manufacturers and third-party developers creating mobile applications to manage monitor their use. The security of these is critical, as they handle sensitive information such vehicle location, statistics, personally identifiable (PII) stored in the device. This research conducts a cybersecurity risk assessment several popular developed by (1) EV including Tesla, Mercedes, BMW, Nissan, Volkswagen (2) EVConnect, EVgo,...

10.1109/icai58407.2023.10136682 article EN 2023-02-22

Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation technological vulnerabilities. The major objective these attacks is gain illegal profits by extorting which adversely impact their normal operations reputation. To mitigate proliferation attacks, it significant for manufacturers evaluate IT products through a set security-related functional assurance requirements. Common Criteria (CC) well-recognized...

10.7717/peerj-cs.701 article EN cc-by PeerJ Computer Science 2021-10-26

In the past few years, Android security is enhanced and state-of-the-art anti-malware tools have been introduced to counter malware. These use both static dynamic analysis techniques detect malicious applications. Despite these, attack surface against phones has risen exponentially malware detection are failed sophisticated threats. Therefore, it a need audit evaluate Anti Malware Solutions (AMTs). our research, we analyzed various evasion techniques, along with their pros cons. Moreover,...

10.1109/wetice53228.2021.00034 article EN 2021-10-01

Generative AI chatbots have emerged as a significant scientific contribution. They can produce text, images, audio, and video, their applications are vast varied in every field. However, it is identified that these be used by script kiddies malicious actors to generate phishing emails, security exploits, executable payloads present notable risks challenges for cybersecurity. This research provides an extensive review of the current status three most popular generative which ChatGPT, Google...

10.20944/preprints202410.1909.v1 preprint EN 2024-10-24

The widespread adoption of eCommerce, iBanking, and eGovernment institutions has resulted in an exponential rise the use web applications. Due to a large number users, applications have become prime target cybercriminals who want steal Personally Identifiable Information (PII) disrupt business activities. Hence, there is dire need audit websites ensure information security. In this regard, several vulnerability scanners are employed for assessment but attacks still increasing day by day....

10.1109/icai55435.2022.9773750 article EN 2022-03-30

In this work, we develop a joint ARQ receiver design for channel estimation and equalization under bandwidth efficient automatic repeat request (ARQ) in multiple-input multiple- output (MIMO) system. Our retransmission proposal improves efficiency by sending partial response of the original data sequence potentially omitting training sequence. To estimate unknown channels to detect transmitted data, our receivers can implement semiblind detection based on multiple transmissions. We...

10.1109/glocom.2008.ecp.685 article EN 2008-01-01

It is beneficial for telecommunication authorities and Internet service providers (ISPs) to classify detect voice traffic. can help them block unsubscribed users from using their services, which saves huge revenues. Voice packets be detected easily, but it becomes complicated when the application or port information in packet header hidden due some secure mechanism such as encryption. This work provides effective classification detection based on behavioral statistical analysis, independent...

10.3906/elk-1501-126 article EN TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2017-01-01

Android has become ubiquitous by taking more than 86 % of the market share. This rapid expansion brought a slew new threats, including privacy breaches, data thefts, and cyberespionage. As today's malware are highly sophisticated capable to evade even state-of-the-art detection tools using obfuscation repacking techniques. However, existing surveys possess challenges for researchers as they classify based on analysis methodology such static dynamic analysis. They do not cover accuracy rate,...

10.1109/euc53437.2021.00025 article EN 2021-10-01
Coming Soon ...