- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Wireless Networks and Protocols
- Anomaly Detection Techniques and Applications
- Sentiment Analysis and Opinion Mining
- Advanced Wireless Network Optimization
- Internet Traffic Analysis and Secure E-voting
- Smart Grid Security and Resilience
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
University of Jammu
2025
Central University of Jammu
2024-2025
Virginia Tech
2003-2004
ABSTRACT An ensemble‐inspired intrusion detection approach for cyber‐physical systems (CPSs) has been proposed. CPSs are susceptible to different cyber‐attacks. Attacks on result in the hindrance of critical services made available by them. To protect various (IDSs) exist. However, present IDSs have limitations constrained accuracy, high false alarm rate, and latency. A hybrid that integrates pros bagging boosting methods proposed minimize mentioned limitations. The uses AdaBoost random...
ABSTRACT Machine learning (ML) and deep (DL) models have become vital tools in Intrusion Detection Systems (IDS), yet their effectiveness depends heavily on the quality distribution of training data. This study investigates impact dataset size balance performance ML DL using CIC‐IDS 2017 dataset. Five subsets (20%, 40%, 60%, 80%, 100% dataset) were created to assess across varying sizes. Four models, including Random Forest (RF), Artificial Neural Network, Convolutional Network (CNN),...
We propose and analyze a class of autonomous host-centric mobility prediction algorithms via simulation for predicting future movements mobile hosts based on recent past movement histories observed. These are 'autonomous' 'host-centric' since they require individual hosts, rather than fixed base stations, to collect maintain data, thus making them applicable both cellular ad hoc wireless networks. Each host under these is capable the probability that it will leave current location next...
We propose and analyze call admission control algorithms integrated with pricing for revenue optimization QoS guarantee to serve multiple service classes in mobile wireless networks. Traditional make acceptance decision new handoff calls satisfy certain constraints such as the dropping probability of blocking being lower than a pre-specified threshold. class partitioning threshold-based that acceptance/rejection not only requirements but also optimize system, taking into account prices...
Background: The increasing integration of robotic systems across various sectors has highlighted the critical need for robust cybersecurity measures to safeguard these against cyber threats. Objective: This research presents a novel Real-Time Intrusion Detection System (IDS) framework specifically designed enhance systems. Methods: proposed IDS monitors network traffic and continuously identifies potential threats in real time. A testbed is set up using an AlphaBot device server machine...