- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Cloud Computing and Resource Management
- Interconnection Networks and Systems
- Opportunistic and Delay-Tolerant Networks
- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Age of Information Optimization
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- Recommender Systems and Techniques
- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Energy Efficient Wireless Sensor Networks
- Green IT and Sustainability
- Geological and Geophysical Studies
- IoT Networks and Protocols
- Vehicular Ad Hoc Networks (VANETs)
- Anomaly Detection Techniques and Applications
- Digital Media Forensic Detection
- Context-Aware Activity Recognition Systems
- Distributed systems and fault tolerance
- Peer-to-Peer Network Technologies
COMSATS University Islamabad
2013-2024
Smart Homes
2023
Abbottabad University of Science and Technology
2019-2022
Fog computing has emerged as a revolutionary paradigm to serve the massive data generated in Internet of Things (IoT) environments. It can be considered derivative cloud that provides cloud-like services at edge network. As such, it helps address the, often significant, issue delays encountered when using systems for IoT. According literature, inefficient scheduling user tasks fog actually result higher than computing. Hence, real benefits only obtained by applying effective job strategies....
In mobile edge computing (MEC), devices limited to computation and memory resources offload compute-intensive tasks nearby servers. User movement causes frequent handovers in 5G urban networks. The resultant delays task execution due unknown user position base station lead increased energy consumption resource wastage. current MEC offloading solutions separate from mobility. For offloading, techniques that predict the user’s future location do not consider direction. We propose a framework...
Cloud computing emerged as one of the leading computational paradigms due to elastic resource provisioning and pay-as-you-go model. Large data centers are used by service providers host various services. These consume enormous energy, which leads increase in operating costs carbon footprints. Therefore, green cloud is a necessity, not only reduces energy consumption, but also affects environment positively. In order reduce workload consolidation approach that consolidates tasks minimum...
Data center facilities play a vital role in present and forthcoming information communication technologies. Internet giants, such as IBM, Microsoft, Google, Yahoo, Amazon hold large data centers to provide cloud computing services web hosting applications. Due rapid growth size complexity, it is essential highlight important design aspects challenges of centers. This article presents market segmentation the leading operators discusses infrastructural considerations, namely energy...
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well semi-automobile vehicles. Such vehicles rely heavily on data management exchange Cooperative Awareness Messages (CAMs) for external communication with environment. VANETs vulnerable to a variety attacks, including Black Hole, Gray wormhole, rush attacks. These attacks aimed at disrupting traffic between cars roadside. The discovery Hole attack has become an increasingly critical problem due...
Like smart phones, the recent years have seen an increased usage of internet things (IoT) technology. IoT devices, being resource constrained due to smaller size, are vulnerable various security threats. Recently, many distributed denial service (DDoS) attacks generated with help botnets affected services websites. The destructive need be detected at early stage infection. Machine-learning models can utilized for detection botnets. This paper proposes one-class classifier-based...
Fossil-fuel-based power generation leads to higher energy costs and environmental impacts. Solar wind are abundant important renewable sources (RES) that make the largest contribution replacing fossil-fuel-based consumption. However, uncertain solar radiation highly fluctuating weather parameters of require an accurate reliable forecasting mechanism for effective efficient load management, cost reduction, green environment, grid stability. From existing literature, artificial neural networks...
Geographically distributed cloud data centers (DCs) consume enormous amounts of energy to meet the ever-increasing processing and storage demands users. The brown generated using fossil fuels is expensive significantly contributes global warming. Considering environmental impact caused by high carbon emissions relatively cost energy, we propose integration renewable sources (RES), especially solar wind with power centers. In our earlier study, addressed intermittency sources, where replaced...
Optimal task allocation in Large-Scale Computing Systems (LSCSs) that endeavors to balance the load across limited computing resources is considered an NP-hard problem. MinMin algorithm one of most widely used heuristic for scheduling tasks on resources. The minimizes makespan compared other algorithms, such as Heterogeneous Earliest Finish Time (HEFT), duplication based and clustering algorithms. However, results unbalanced utilization especially when majority have lower computational...
High-speed internet has boosted clients’ traffic needs. Content caching on mobile edge computing (MEC) servers reduces and latency. Caching with MEC faces difficulties such as user mobility, limited storage, varying preferences, rising video streaming The current content techniques consider mobility popularity to improve the experience. However, no present solution addresses preferences affecting decisions. We propose mobility- user-preferences-aware for MEC. Using time series, proposed...
Recently, many video streaming services, such as YouTube, Twitch, and Facebook, have contributed to traffic, leading the possibility of unwanted inappropriate content minors or individuals at workplaces. Therefore, monitoring is necessary. Although traffic encrypted, several studies proposed techniques using data decipher users' activity on web. Dynamic Adaptive Streaming over HTTP (DASH) uses Variable Bit-Rate (VBR) - most widely adopted technology, ensure smooth streaming. VBR causes...
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube other video streaming services, further communication, VPNs are used. However, these protocols not sufficient hide identity of videos from someone who can sniff network traffic. The present work explores methodologies features identify in a VPN non-VPN To such videos, side-channel attack using Sequential Convolution Neural Network proposed. results demonstrate that sequence bytes per...
Video streaming service providers are increasingly using end-to-end traffic encryption protocols, such as HTTPS. However, these protocols alone not sufficient to hide the identification of videos being watched by clients on network from anyone who can sniff traffic, administrator or ISP. In this work, we have explored YouTube video streams for identification. We presented a side-channel attack and sequential convolutional neural (SCNN) task. The results shown that even with series bytes per...
Vehicular edge networks (VENs) connect vehicles to share data and infotainment content collaboratively improve network performance. Due technological advancements, growth is accelerating, making it difficult always mobile devices locations. For vehicle-to-vehicle (V2V) communication, are equipped with onboard units (OBU) roadside (RSU). Through back-haul, all user-uploaded cached in the cloud server’s main database. Caching stores delivers database on demand. Pre-caching upcoming predicted...