Shafiq Ul Rehman

ORCID: 0000-0003-2266-218X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Network Packet Processing and Optimization
  • Blockchain Technology Applications and Security
  • Context-Aware Activity Recognition Systems
  • Internet of Things and AI
  • User Authentication and Security Systems
  • Information and Cyber Security
  • Cloud Data Security Solutions
  • Non-Invasive Vital Sign Monitoring
  • ECG Monitoring and Analysis
  • Digital Transformation in Industry
  • Education Systems and Policy
  • Security in Wireless Sensor Networks
  • Wireless Networks and Protocols
  • Dementia and Cognitive Impairment Research
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Higher Education Learning Practices
  • Software-Defined Networks and 5G
  • IoT-based Smart Home Systems
  • Energy Efficient Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Machine Learning in Healthcare

Kingdom University
2024-2025

Universiti Sains Malaysia
2014-2022

University of Malaya
2021

Singapore University of Technology and Design
2018-2020

Iqra University
2012

In the coming years, technology will impact learning experience in many ways. Internet of Things (IoT) continues to confirm its important position context Information and Communication Technologies development society. With support IoT, institutions can enhance outcomes by providing more affluent experiences, improved operational efficiency, gaining real-time, actionable insight into student performance. The purpose this study is find out potential IoT higher education how maximize benefits...

10.1088/1742-6596/892/1/012017 article EN Journal of Physics Conference Series 2017-09-01

Alzheimer's disease (AD) is a progressive, incurable condition leading to decline of nerve cells and cognitive functions over time. Early detection essential for improving quality life, as treatment strategies aim decelerate its progression. AD also impacts fine motor control, including handwriting. Utilizing machine learning (ML) with efficient data analysis methods early through handwriting holds considerable promise clinical diagnosis, albeit challenging undertaking. In this study, we...

10.1109/access.2024.3401104 article EN cc-by-nc-nd IEEE Access 2024-01-01

In the context of Alzheimer's disease (AD), timely identification is paramount for effective management, acknowledging its chronic and irreversible nature, where medications can only impede progression. Our study introduces a holistic solution, leveraging hippocampus VGG16 model with transfer learning early AD detection. The hippocampus, pivotal affected region linked to memory, plays central role in classifying patients into three categories: cognitively normal (CN), representing...

10.1016/j.heliyon.2024.e29375 article EN cc-by-nc Heliyon 2024-04-01

As the world is moving towards Internet of Things, smart home now rapidly becoming a reality. Home appliances and devices are interconnected, i.e., area network, via proprietary or standard TCP/IP protocols allowing for better management monitoring. Nevertheless, as with any form also prone to security threats vulnerabilities. This paper aims at presenting importance in environment. Herein, we will discuss (a) concepts environment, (b) various communication mechanisms, (c) challenges...

10.1142/s0218539316400052 article EN International Journal of Reliability Quality and Safety Engineering 2016-05-13

The internet of things (IoT) technology can be nowadays used to track user activity in daily living and health-related quality life. IoT healthcare sensors play a great role reducing costs. It helps users assess their health progression. Nonetheless, these solutions add security challenges due direct access numerous personal information close integration into activities. As such, this is always viable target for cybercriminals. More importantly, any adversarial attacks on an individual node...

10.1016/j.cmpbup.2022.100071 article EN cc-by-nc-nd Computer Methods and Programs in Biomedicine Update 2022-01-01

Stress negatively impacts health, contributing to hypertension, cardiovascular diseases, and immune dysfunction. While conventional diagnostic methods, such as self-reported questionnaires basic physiological measurements, often lack the objectivity precision needed for effective stress management, wearable devices present a promising avenue early detection management. This study conducts three-stage validation of technology monitoring, transitioning from controlled experimental data...

10.1016/j.mex.2025.103205 article EN cc-by-nc MethodsX 2025-02-05

Alzheimer’s disease (AD) is a persistent neurologic disorder that has no cure. For successful treatment to be implemented, it essential diagnose AD at an early stage, which may occur up eight years before dementia manifests. In this regard, new predictive machine learning model proposed works in two stages and takes advantage of both unsupervised supervised approaches provide fast, affordable, yet accurate solution. The first stage involved fuzzy partitioning gold-standard dataset, DARWIN...

10.3390/info16030249 article EN cc-by Information 2025-03-20

Botnet-based Distributed Denial of Service (DDoS) attacks are considered as the main concerns and problems today's Internet. The damage these very serious since number computers involved in is huge distributed worldwide. However, many protocols such Domain Name System (DNS) have several security vulnerabilities nowadays that utilized by botnet attackers. amplification most popular Internet which require robust hardware software for assurance. In this paper, we provide an overview...

10.1109/ictc.2016.7763485 article EN 2021 International Conference on Information and Communication Technology Convergence (ICTC) 2016-10-01

The use of technology in healthcare is one the most critical application areas today. With development medical applications, people's quality life has improved. However, it impractical and unnecessary for medium-risk people to receive specialized daily hospital monitoring. Due their health status, they will be exposed a high risk severe damage or even life-threatening conditions without Therefore, remote, real-time, low-cost, wearable, effective monitoring ideal this problem. Many...

10.1016/j.mex.2024.102834 article EN cc-by-nc-nd MethodsX 2024-06-30

Internet Protocol version 6 (IPv6) is currently being deployed progressively around the world and soon will become de facto IP communication standard. Nevertheless, due to nature of protocol design IPv6, it has brought about various security issues. One issues relates leveraging vulnerability that exists in way Duplicate Address Detection (DAD) process carried out leading Denial or Service (DoS) attacks. Such attacks can render whole network non-functional. Several mechanisms have been...

10.1109/icrito.2015.7359243 article EN 2015-09-01

Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing sector, where all integral components involved production processes are getting digitally interconnected. Fused with improved automation and robotics, machine learning, artificial intelligence, big data, cloud computing, Internet of Things (IoT), this open network interconnectivity makes industrial systems increasingly vulnerable to cyber-attacks. While impacts intentions cyber-attacks vary, they always...

10.1109/access.2021.3127515 article EN cc-by IEEE Access 2021-01-01

Cloud computing is the next revolution in Information and Communication Technology arena. It a model which delivered as commoditized service similar to electricity, water telecommunication. provides software, platform, infrastructure other hybrid models are subscription-based services customers pay based on usage. Nevertheless, security one of main factors that inhibit proliferation cloud computing. Economic Denial Sustainability (EDoS) new breed economical threats Unlike traditional...

10.1109/icrito.2014.7014767 article EN 2014-10-01

From the days of ARPANET, with slightly over two hundred connected hosts involving five organizations to a massive global, always-on network connecting in billions, Internet has become as important need for electricity and water. Protocol version 4 (IPv4) could not sustain growth Internet. In ensuring is stunted, new protocol, i.e. 6 (IPv6) was introduced that resolves addressing issue IPv4 had. addition, IPv6 also laden features capabilities. One them being address auto-configuration. This...

10.14569/ijacsa.2017.080209 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

In this paper, we compare problems of cluster formation and cluster-head selection between different protocols for data aggregation transmission. We focus on two aspects the problem: (i) how to guess number clusters required proficiently consume available sources a sensor network, (ii) select cluster-heads cover up networks more proficiently. A in Wireless Sensor Networks (WSNs) can communicate directly only with other sensors that are within radio range cluster. However, order enable...

10.1109/bwcca.2012.110 preprint EN 2012-11-01

Cloud computing (CC) is the next revolution in Information and Communication Technology arena. CC often provided as a service comparable to utility services such electricity, water, telecommunications. providers (CSP) offers tailored which are delivered subscription-based services, customers pay based on usage. Many organizations have started shifting from traditional server-cluster infrastructure cloud-based infrastructure. Nevertheless, security one of main factors that inhibit...

10.14569/ijacsa.2017.080907 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

IPv6 deployment is currently under way at a rapid pace. introduced new features and capabilities lacking in IPv4 but as with any technology, there are always security risks challenges that need to be addressed. Duplicate Address Detection (DAD) part of IPv6’s Network Discovery Protocol vulnerable threats such as: Spoofing, Denial Service (DoS). This survey paper, aims present various techniques were mitigate highlight the limitations techniques. Herein, we will discuss a) concepts Neighbor...

10.17485/ijst/2015/v8i30/85940 article EN Indian Journal of Science and Technology 2015-11-16

IPv6 was designed to replace the existing Internet Protocol, that is, IPv4. The main advantage of over IPv4 is vastness address space. In addition, various improvements were brought drawbacks in Nevertheless, as with any new technology, suffers from security vulnerabilities. One vulnerabilities discovered allows Denial Service Attack using Duplicate Address Detection mechanism. order study and analyse this attack, an testbed implemented. This paper presents our experience deployment...

10.14569/ijacsa.2016.070630 article EN cc-by International Journal of Advanced Computer Science and Applications 2016-01-01
Coming Soon ...