Tahir Maqsood

ORCID: 0000-0003-0439-5700
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • Interconnection Networks and Systems
  • Opportunistic and Delay-Tolerant Networks
  • Parallel Computing and Optimization Techniques
  • Distributed and Parallel Computing Systems
  • Age of Information Optimization
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Recommender Systems and Techniques
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Energy Efficient Wireless Sensor Networks
  • Green IT and Sustainability
  • Geological and Geophysical Studies
  • IoT Networks and Protocols
  • Vehicular Ad Hoc Networks (VANETs)
  • Anomaly Detection Techniques and Applications
  • Digital Media Forensic Detection
  • Context-Aware Activity Recognition Systems
  • Distributed systems and fault tolerance
  • Peer-to-Peer Network Technologies

COMSATS University Islamabad
2013-2024

Smart Homes
2023

Abbottabad University of Science and Technology
2019-2022

Fog computing has emerged as a revolutionary paradigm to serve the massive data generated in Internet of Things (IoT) environments. It can be considered derivative cloud that provides cloud-like services at edge network. As such, it helps address the, often significant, issue delays encountered when using systems for IoT. According literature, inefficient scheduling user tasks fog actually result higher than computing. Hence, real benefits only obtained by applying effective job strategies....

10.1109/access.2019.2924958 article EN cc-by IEEE Access 2019-01-01

In mobile edge computing (MEC), devices limited to computation and memory resources offload compute-intensive tasks nearby servers. User movement causes frequent handovers in 5G urban networks. The resultant delays task execution due unknown user position base station lead increased energy consumption resource wastage. current MEC offloading solutions separate from mobility. For offloading, techniques that predict the user’s future location do not consider direction. We propose a framework...

10.3390/app12073312 article EN cc-by Applied Sciences 2022-03-24

Cloud computing emerged as one of the leading computational paradigms due to elastic resource provisioning and pay-as-you-go model. Large data centers are used by service providers host various services. These consume enormous energy, which leads increase in operating costs carbon footprints. Therefore, green cloud is a necessity, not only reduces energy consumption, but also affects environment positively. In order reduce workload consolidation approach that consolidates tasks minimum...

10.1109/access.2019.2941145 article EN cc-by IEEE Access 2019-01-01

Data center facilities play a vital role in present and forthcoming information communication technologies. Internet giants, such as IBM, Microsoft, Google, Yahoo, Amazon hold large data centers to provide cloud computing services web hosting applications. Due rapid growth size complexity, it is essential highlight important design aspects challenges of centers. This article presents market segmentation the leading operators discusses infrastructural considerations, namely energy...

10.4018/ijitwe.2019010103 article EN International Journal of Information Technology and Web Engineering 2018-10-31

Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well semi-automobile vehicles. Such vehicles rely heavily on data management exchange Cooperative Awareness Messages (CAMs) for external communication with environment. VANETs vulnerable to a variety attacks, including Black Hole, Gray wormhole, rush attacks. These attacks aimed at disrupting traffic between cars roadside. The discovery Hole attack has become an increasingly critical problem due...

10.3390/app122312448 article EN cc-by Applied Sciences 2022-12-05

Like smart phones, the recent years have seen an increased usage of internet things (IoT) technology. IoT devices, being resource constrained due to smaller size, are vulnerable various security threats. Recently, many distributed denial service (DDoS) attacks generated with help botnets affected services websites. The destructive need be detected at early stage infection. Machine-learning models can utilized for detection botnets. This paper proposes one-class classifier-based...

10.3390/s22103646 article EN cc-by Sensors 2022-05-10

Fossil-fuel-based power generation leads to higher energy costs and environmental impacts. Solar wind are abundant important renewable sources (RES) that make the largest contribution replacing fossil-fuel-based consumption. However, uncertain solar radiation highly fluctuating weather parameters of require an accurate reliable forecasting mechanism for effective efficient load management, cost reduction, green environment, grid stability. From existing literature, artificial neural networks...

10.3390/su142316317 article EN Sustainability 2022-12-06

Geographically distributed cloud data centers (DCs) consume enormous amounts of energy to meet the ever-increasing processing and storage demands users. The brown generated using fossil fuels is expensive significantly contributes global warming. Considering environmental impact caused by high carbon emissions relatively cost energy, we propose integration renewable sources (RES), especially solar wind with power centers. In our earlier study, addressed intermittency sources, where replaced...

10.3390/en17112787 article EN cc-by Energies 2024-06-06

Optimal task allocation in Large-Scale Computing Systems (LSCSs) that endeavors to balance the load across limited computing resources is considered an NP-hard problem. MinMin algorithm one of most widely used heuristic for scheduling tasks on resources. The minimizes makespan compared other algorithms, such as Heterogeneous Earliest Finish Time (HEFT), duplication based and clustering algorithms. However, results unbalanced utilization especially when majority have lower computational...

10.32604/csse.2019.34.079 article EN cc-by Computer Systems Science and Engineering 2019-01-01

High-speed internet has boosted clients’ traffic needs. Content caching on mobile edge computing (MEC) servers reduces and latency. Caching with MEC faces difficulties such as user mobility, limited storage, varying preferences, rising video streaming The current content techniques consider mobility popularity to improve the experience. However, no present solution addresses preferences affecting decisions. We propose mobility- user-preferences-aware for MEC. Using time series, proposed...

10.3390/electronics12020284 article EN Electronics 2023-01-05

Recently, many video streaming services, such as YouTube, Twitch, and Facebook, have contributed to traffic, leading the possibility of unwanted inappropriate content minors or individuals at workplaces. Therefore, monitoring is necessary. Although traffic encrypted, several studies proposed techniques using data decipher users' activity on web. Dynamic Adaptive Streaming over HTTP (DASH) uses Variable Bit-Rate (VBR) - most widely adopted technology, ensure smooth streaming. VBR causes...

10.1109/access.2022.3192458 article EN cc-by IEEE Access 2022-01-01

Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube other video streaming services, further communication, VPNs are used. However, these protocols not sufficient hide identity of videos from someone who can sniff network traffic. The present work explores methodologies features identify in a VPN non-VPN To such videos, side-channel attack using Sequential Convolution Neural Network proposed. results demonstrate that sequence bytes per...

10.3390/electronics11030350 article EN Electronics 2022-01-24

Video streaming service providers are increasingly using end-to-end traffic encryption protocols, such as HTTPS. However, these protocols alone not sufficient to hide the identification of videos being watched by clients on network from anyone who can sniff traffic, administrator or ISP. In this work, we have explored YouTube video streams for identification. We presented a side-channel attack and sequential convolutional neural (SCNN) task. The results shown that even with series bytes per...

10.1109/fit53504.2021.00011 article EN 2021-12-01

Vehicular edge networks (VENs) connect vehicles to share data and infotainment content collaboratively improve network performance. Due technological advancements, growth is accelerating, making it difficult always mobile devices locations. For vehicle-to-vehicle (V2V) communication, are equipped with onboard units (OBU) roadside (RSU). Through back-haul, all user-uploaded cached in the cloud server’s main database. Caching stores delivers database on demand. Pre-caching upcoming predicted...

10.3390/app13020780 article EN cc-by Applied Sciences 2023-01-05
Coming Soon ...