- Service-Oriented Architecture and Web Services
- User Authentication and Security Systems
- IoT and Edge/Fog Computing
- Wireless Body Area Networks
- Network Security and Intrusion Detection
- Advanced Software Engineering Methodologies
- Software System Performance and Reliability
- Biometric Identification and Security
- Advanced Authentication Protocols Security
- Context-Aware Activity Recognition Systems
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Mobile Agent-Based Network Management
- Smart Grid Security and Resilience
- Data Quality and Management
- Blockchain Technology Applications and Security
- Healthcare Technology and Patient Monitoring
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Data Security
- Energy Efficient Wireless Sensor Networks
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
- Security in Wireless Sensor Networks
- Semantic Web and Ontologies
- Cloud Data Security Solutions
Embry–Riddle Aeronautical University
2018-2021
Edith Cowan University
2017-2021
University of Amsterdam
2020
Albert Einstein College of Medicine
2019
ORCID
2019
Innopolis University
2015-2016
Shifa International Hospital
2016
Universiti Malaysia Sarawak
2016
Jeonbuk National University
2012-2014
University of Technology Malaysia
2011-2013
A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers.The most common attacks use some form electronic messaging such as email provide link what appears be legitimate site but actually malicious controlled by the attacker.Phishing hybrid combining both social engineering technological aspects combatting requires dealing with
A healthcare network as a new context-aware cyber-physical system (CPS) includes embedded sensors, Internet of Things technology, and cloud computing. With the intellectualization mobile terminal devices, networks are automatically generated can provide convenient services real-time communication. However, two problems in CPS need to resolved. solution first problem is mitigate computational storage cost terminal. second privacy security for data. Ciphertext-policy attribute-based encryption...
Most existing biometric systems designed for healthcare applications only use biometrics authentication/access control without considering its other function-data encryption. In this paper, we propose a cancelable finger-vein-based bio-cryptosystem, which not can provide authentication but also encrypt sensitive data through cryptographic technique, fuzzy commitment scheme (FCS). The proposed bio-cryptosystem stores both the encrypted version of and template on smart card reason that it is...
The task of protecting healthcare information systems (HIS) from immediate cyber security risks has been intertwined with cloud computing adoption. data and resources HISs are inherently shared other for remote access, decision making, emergency, related perspectives. In the case a multitude requirements by multiple stakeholders, various, diverse models being adopted across public health industry, which defies real essence sharing using in this domain. misconception is one key hurdles...
Introduction Men who have sex with men (MSM) are disproportionately impacted by HIV/AIDS resulting from risky sexual behaviors. Social and contextual factors known to mediate risk behaviors, but there is limited information about the prevalence of practices Rwandan MSM concomitant socio-contextual determinants making it difficult assess implications for preventing HIV/STI transmission in this key population. Methods Using exploratory qualitative design, we obtained regarding behavior...
The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because the unique functional requirement omni-inclusiveness, HEs expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In absence literature on provisioning frameworks that connect VANETs HEs, this paper presents a smart zero-knowledge proof statistical fingerprinting-based trusted secure communication framework fog computing...
Wireless sensor networks (WSNs) consist of many small wireless nodes which are capable sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity computational power. Also, since they frequently deployed in hostile environments left unattended, vulnerable several attacks such as sinkhole attacks. Sinkhole occur when a compromised node attracts network traffic by advertising fake routing updates. This paper first...
In this paper we investigate the problem of phishing. Phishing is a hybrid in that it involves both technical and social issues. paper, also discuss polymorphic nature phishing attacks how can make defense more difficult. Despite persistence problem, there are ways to combat them paper. We highlight countermeasures tackle propose suggestions businesses order minimize loss revenue reputation attacks. The discusses methods defending against hardening infrastructure, training employees
Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates.The victim sends data the rather than sending it was formerly using.Sinkhole are typically used launch other on such as selective forwarding and wormhole attacks.Once is very hard predict kind of attack that follow.For this reason, there need strengthen security networks.In paper, we first describe challenges detecting sinkhole...
The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation going lead the health informatics industry cloud-hoarding data, control flows, site governance. While different enterprises opt for cloud-based solutions, it a matter time when fog computing environment are formed. Because major gaps in reported techniques security administration data i.e. absence an overarching...
The Internet of Things (IoT) with a direct internet connectivity for global access is one the promising technologies future communication systems. Protocol version 6 (IPv6) based routing protocols that are currently available IoT prone to various vulnerabilities. Hence, Personally Identifiable Information (PII) stored and/or communicated in can easily be compromised. In this paper, we propose Bio-inspired Secure IPv6 Communication (BSCoP) IoT. We have enhanced Routing Low-Power and Lossy...
In the past years, we are witnessing an increasing interest in semantic Web and relevant technologies, which can have a significant impact enterprise environment of information knowledge management. An important observation is that entity identification problem lies at core many applications. this paper, examine special requirements storage management for entities, context system Web. We study with respect to creating modifying these as well managing their evolution over time. Finally,...
Mobility management has been a long-standing issue in mobile wireless sensor networks and especially the context of cyber physical systems; its implications are immense. This paper presents critical analysis current approaches to mobility by evaluating them against set criteria which essentially inherent characteristics such systems on these expected provide acceptable performance. We summarize using quadruple metrics. Additionally, this we classify various that discussed paper. Finally,...
Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, automatic parallelism. These characteristics made this technology a de facto standard for developing ambient systems to meet the open dynamic nature today's online communities. Although multi-agent are...
The traditional and most common authentication method employs usernames passwords composed of alphanumeric text possibly combined with some symbols.This has proven to be insecure in practice as that can resist attack are difficult or impossible for users remember.This paper includes a survey alternative methods their possible application areas describe an system use Korea combines multiple methods.