Mohammed Kaosar

ORCID: 0000-0003-1101-3264
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Data Mining Algorithms and Applications
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • IoT and Edge/Fog Computing
  • Privacy, Security, and Data Protection
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Authentication Protocols Security
  • Complexity and Algorithms in Graphs
  • Wireless Networks and Protocols
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • Power System Optimization and Stability
  • Cloud Data Security Solutions
  • Internet of Things and AI
  • Spam and Phishing Detection
  • IoT-based Smart Home Systems

Universitas 'Aisyiyah Yogyakarta
2025

Murdoch University
2021-2024

RMIT University
2020

Effat University
2014-2019

Charles Sturt University
2013-2015

Victoria University
2008-2013

King Fahd University of Petroleum and Minerals
2006-2007

In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) user wants database location data, known Points Of Interest (POIs), and does not want reveal his/her server due privacy concerns; (ii) owner that is, server, simply distribute its data all users. The desires have some control over since asset. We propose major enhancement upon previous solutions by introducing two stage approach, where first step based on Oblivious...

10.1109/tkde.2013.87 article EN IEEE Transactions on Knowledge and Data Engineering 2013-05-27

Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database without revealing server value i. In this paper, we present PIR protocol with communication complexity O(γ logn) bits, where -y is ciphertext size. Furthermore, extend private block retrieval (PBR) protocol, natural and more practical extension in which retrieves instead retrieving single bit. Our protocols are built on state-of-the-art fully homomorphic encryption (FHE) techniques provide privacy...

10.1109/tkde.2012.90 article EN IEEE Transactions on Knowledge and Data Engineering 2012-04-27

One of the common problems that occurs in Indonesia regarding conflict management Taekwondo, is leadership Taekwondo organizations. In addition, general occur include educational problems, such as limited access to education, inequality, teacher quality, and curriculum considered irrelevant. Social can also trigger conflict, power struggles political economic contexts. a serious concern, with number social conflicts tending increase from year year. Therefore, needs pay attention various...

10.47467/edu.v5i1.6477 article EN cc-by-nd EduInovasi Journal of Basic Educational Studies 2025-01-04

Abstract Cloud computing has emerged as an efficient distribution platform in modern distributed offering scalability and flexibility. Task scheduling is considered one of the main crucial aspects cloud computing. The primary purpose task mechanism to reduce cost makespan determine which virtual machine (VM) needs be selected execute task. It widely acknowledged a nondeterministic polynomial-time complete problem, necessitating development solution. This paper presents innovative approach...

10.1007/s10586-024-04594-1 article EN cc-by Cluster Computing 2024-06-27

The recent mass production and usage of the Internet Things (IoT) have posed serious concerns due to unavoidable security complications. firmware IoT systems is a critical component security. Although multiple organizations released guidelines, few vendors are following these guidelines properly, either lack accountability or availability appropriate resources. Some tools for this purpose can use static, dynamic, fuzzing techniques test firmware, which may result in false positives failure...

10.1016/j.iotcps.2021.07.001 article EN cc-by-nc-nd Internet of Things and Cyber-Physical Systems 2021-01-01

Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a System successfully detects prevents various attacks, it is possible that inside attacker performs malicious act compromises node. A compromised node can inflict considerable damage on the whole collaborative network. For instance, when gives false alert attack, other nodes will unnecessarily...

10.1109/access.2021.3117938 article EN cc-by-nc-nd IEEE Access 2021-01-01

The dining sector in developing countries faces numerous challenges, including inefficiencies order handling, resource management, and ensuring food quality customer privacy. Traditional methods often lead to delays, errors, dissatisfaction. This paper proposes a quick-witted, intelligent order-handling system utilizing the Internet of Things (IoT) address these challenges enhance overall experience. We present comprehensive approach implementing an IoT-based automated tailored restaurants'...

10.37385/jaets.v5i2.4937 article EN cc-by-sa Journal of Applied Engineering and Technological Science (JAETS) 2024-06-06

Concealing a message and ensuring its security is inevitable in data transmission. Among various concepts, one approach steganography that encodes secret indiscernible way. In this paper, we present an audio steganographic technique propose novel to hide the least significant bit (LSB) of stereo-audio samples with CD-quality. Here, on basis stego-key parity, bits are encoded into cover samples. terms imperceptibility, method improvement LSB for hiding information audio.

10.1109/iccitechn.2014.6997310 article EN 2014-03-01

Network traffic classification (NTC) has attracted considerable attention in recent years. The importance of stems from the fact that data modern networks is extremely complex and ever-evolving different aspects, e.g. volume, velocity variety. inherent security requirements Internet-based applications also highlights further role classification. Gaining clear insights into network for performance evaluation planning purposes, behavior analysis, management not a trivial task. Fortunately, NTC...

10.1145/3472735.3473386 article EN 2021-08-13

In this paper we propose a new method of improving the performance dynamic source routing (DSR) protocol. DSR, as well other on-demand protocols, every established path is considered temporary to reflect mobility effect, therefore, once established, it associated with an expiration time. After that time deleted from route cache nodes. practice nodes are not equal all and treat paths differently according their stationary, rather than deleting them after improve performance. By simulation...

10.1109/wocn.2006.1666532 article EN 2006-01-01

The electronic health record (eHR) system has recently been considered one of the biggest advancements in healthcare services. A personally controlled (PCEHR) is proposed by Australian government to make more agile, secure, and sustainable. Although PCEHR claims records can be patients, professionals database/system operators may assist disclosing patients’ eHRs for retaliation or other ill purposes. As conventional methods preserving privacy solely trust operators, these data are vulnerable...

10.4225/75/579706bc40a9a article EN 2013-01-01

Wireless sensor networks (WSNs) are prone to vulnerabilities due their resource constraints and deployment in remote unattended areas. A node exhibits anomaly behaviour its dying energy level or being compromised by the intruders. The showing anomalous behaviours a leader (LN) of cluster/group multifolds vulnerability problem. To identify nodes WSNs, this paper presents model, which uses Voronoi diagram based network architecture. architecture, deploys mobile data collectors (MDCs), ensures...

10.4304/jnw.9.11.2914-2924 article EN Journal of Networks 1969-12-31

Homomorphic encryption system (HES) schemes are anticipated to play a significant role in cloud-based applications. Moving storage and analytic services securely two of the most important advantages HES. Several HES have been recently proposed. However, majority them either limited capabilities or impractical real-world Various provide ability perform computations for statistical analysis (e.g. average, mean variance) on encrypted data. Domingo-Ferrer is one scheme that has privacy...

10.1016/j.jksuci.2015.10.001 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2015-11-06

Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal Healthcare Engineering, vol. 2020] presented a new offline/online Int... | Find, read and cite all the research you need on Tech Science Press

10.32604/iasc.2021.019486 article EN cc-by Intelligent Automation & Soft Computing 2021-01-01

Agriculture faces several uncertain problems in terms of making the best use its natural resources. As a result, and light growing threat changing weather conditions, we must closely track local soil conditions meteorological data to expedite adoption culture-friendly decisions. In Internet Things (IoT) era, deploying Wireless Sensor Networks (WSN) as low-cost remote monitoring management system for these types features is viable choice. However, WSN hampered by motes’ insufficient energy...

10.1142/s0218488521400171 article EN International Journal of Uncertainty Fuzziness and Knowledge-Based Systems 2021-12-01
Coming Soon ...