- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Information and Cyber Security
- Digital and Cyber Forensics
- Internet Traffic Analysis and Secure E-voting
- Privacy-Preserving Technologies in Data
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Cybercrime and Law Enforcement Studies
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Digital Media Forensic Detection
- Vehicular Ad Hoc Networks (VANETs)
- Electric Vehicles and Infrastructure
- Security and Verification in Computing
- Wireless Communication Networks Research
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Spam and Phishing Detection
- Security in Wireless Sensor Networks
- Innovative Energy Harvesting Technologies
- Advanced MIMO Systems Optimization
- Cloud Computing and Resource Management
- Online Learning and Analytics
- Energy Efficient Wireless Sensor Networks
University of Jamestown
2024-2025
North Dakota State University
2023-2024
Air University
2022-2023
National University of Sciences and Technology
2021
Quaid-i-Azam University
2015
National University of Science and Technology
2009
University of the Sciences
2009
University of California, Davis
2008
With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout EV industry. EVs equipped with sensors that maintain sustainable environment for betterment of society enhance human sustainability. However, at same time, as is case any new digital technology, they susceptible to threats security privacy. Recent incidents demonstrate these have been misused car theft, financial fraud, data...
The Metaverse brings together components of parallel processing computing platforms, the digital development physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties real world. It possesses more rigorous requirements for connection, including safe access data privacy, which are necessary advent technology. Traditional, centralized, network-centered solutions fail provide resilient management solution. There...
There is an exponential rise in the use of smartphones government and private institutions due to business dependencies such as communication, virtual meetings, access global information. These are attractive target for cybercriminals one leading causes cyber espionage sabotage. A large number sophisticated malware attacks well advanced persistent threats (APTs) have been launched on smartphone users. becoming significantly more complex, sophisticated, persistent, undetected extended...
In the digital era, evolution of big data, cloud computing, Internet Things (IoT), blockchain, and quantum computing demands a preferable networking infrastructure to handle network expansion usage optimally. traditional Data Center Networks (DCNs), bundling control data plane in same device limits its functionality for dynamic computation storage access. The load balancing developed is not precise, as it based on local information network. Due existing static routing mechanisms networks,...
The growing prevalence of AI-generated multimedia content, particularly deepfakes, has facilitated the spread fake news, propaganda, identity theft, and undermined importance privacy authenticity in digital media. Existing techniques often lack robustness handling complex deepfake artifacts, especially those involving fused facial regions such as eyes, nose, mouth. This study addresses challenges posed by deepfakes across domains social media, politics, entertainment proposing a hybrid deep...
Ransomware attacks are sophisticated, frequent, and pose severe cybersecurity challenges. They challenging to detect due the emergence of more robust encrypting algorithms, polymorphic nature, zero-day threat exploitation. Prior techniques use static analysis signature matching for detection, but drawback is that they cannot new, zero-day, ransomware. This research aims provide an accurate, cost-effective efficient framework Detection using Ensemble Learning (RanDEL). The proposed model...
This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights importance preserving privacy authenticity in digital media. The background study emphasizes growing threat deepfakes, which pose significant challenges various domains, including social media, politics, entertainment. Current methodologies primarily rely visual features that are specific to dataset fail generalize well across varying manipulation However,...
The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity privacy. emergence of zero-day vulnerabilities unexpected exploits highlighted the need innovative solutions combat these threats. Bug bounty programs have gained popularity as cost-effective way crowdsource task identifying vulnerabilities, providing secure efficient means enhancing cybersecurity. This paper provides comprehensive survey various free paid bug in industry,...
The Tor browser is widely used for anonymity, providing layered encryption enhanced privacy. Besides its positive uses, it also popular among cybercriminals illegal activities such as trafficking, smuggling, betting, and illicit trade. There a need Browser forensics to identify use in unlawful explore consequences. This research analyzes artifacts generated by on Windows-based systems. methodology integrates forensic techniques into incident responses per NIST SP (800-86), exploring areas...
<title>Abstract</title> The proliferation of preloaded apps and third-party applications has raised significant concerns regarding user security privacy. This study introduces the Zero Trust Architecture (ZTA), a novel approach to addressing issues caused by poorly designed vulnerable mobile applications. ZTA employs comprehensive strategy safeguard privacy, incorporating thorough app permission analysis alongside dynamic behavior assessment. proposed framework closely monitors real-time...
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit employees access corporate effectively. However, technology raises concerns, including security threats, latency, throughput, scalability, among others. These newer-generation threats are more complex frequent, makes legacy approach ineffective. research paper...
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects society, its influence on political processes and has become a critical area concern. This because language models are far neutral or objective; they inherit biases their training data the individuals who design utilize them, which can sway voter decisions affect democracy. In this research paper, we explore how directly impact election...
Cloud computing has become increasingly prevalent in recent years, providing organizations with on-demand re-sources. While cloud infrastructure matured security en-hancements, attackers' strategies for launching attacks on networks are also becoming more sophisticated, posing a risk to the system's confidentiality, integrity, and availability. Virtualization is key aspect of computing, which allows physical computers share their resources power. To secure infrastructure, multiple defensive...
Electric vehicles (EVs) are becoming increasingly prevalent, with many manufacturers and third-party developers creating mobile applications to manage monitor their use. The security of these is critical, as they handle sensitive information such vehicle location, statistics, personally identifiable (PII) stored in the device. This research conducts a cybersecurity risk assessment several popular developed by (1) EV including Tesla, Mercedes, BMW, Nissan, Volkswagen (2) EVConnect, EVgo,...
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation technological vulnerabilities. The major objective these attacks is gain illegal profits by extorting which adversely impact their normal operations reputation. To mitigate proliferation attacks, it significant for manufacturers evaluate IT products through a set security-related functional assurance requirements. Common Criteria (CC) well-recognized...
In the past few years, Android security is enhanced and state-of-the-art anti-malware tools have been introduced to counter malware. These use both static dynamic analysis techniques detect malicious applications. Despite these, attack surface against phones has risen exponentially malware detection are failed sophisticated threats. Therefore, it a need audit evaluate Anti Malware Solutions (AMTs). our research, we analyzed various evasion techniques, along with their pros cons. Moreover,...
Generative AI chatbots have emerged as a significant scientific contribution. They can produce text, images, audio, and video, their applications are vast varied in every field. However, it is identified that these be used by script kiddies malicious actors to generate phishing emails, security exploits, executable payloads present notable risks challenges for cybersecurity. This research provides an extensive review of the current status three most popular generative which ChatGPT, Google...
The widespread adoption of eCommerce, iBanking, and eGovernment institutions has resulted in an exponential rise the use web applications. Due to a large number users, applications have become prime target cybercriminals who want steal Personally Identifiable Information (PII) disrupt business activities. Hence, there is dire need audit websites ensure information security. In this regard, several vulnerability scanners are employed for assessment but attacks still increasing day by day....
In this work, we develop a joint ARQ receiver design for channel estimation and equalization under bandwidth efficient automatic repeat request (ARQ) in multiple-input multiple- output (MIMO) system. Our retransmission proposal improves efficiency by sending partial response of the original data sequence potentially omitting training sequence. To estimate unknown channels to detect transmitted data, our receivers can implement semiblind detection based on multiple transmissions. We...
It is beneficial for telecommunication authorities and Internet service providers (ISPs) to classify detect voice traffic. can help them block unsubscribed users from using their services, which saves huge revenues. Voice packets be detected easily, but it becomes complicated when the application or port information in packet header hidden due some secure mechanism such as encryption. This work provides effective classification detection based on behavioral statistical analysis, independent...
Android has become ubiquitous by taking more than 86 % of the market share. This rapid expansion brought a slew new threats, including privacy breaches, data thefts, and cyberespionage. As today's malware are highly sophisticated capable to evade even state-of-the-art detection tools using obfuscation repacking techniques. However, existing surveys possess challenges for researchers as they classify based on analysis methodology such static dynamic analysis. They do not cover accuracy rate,...