Adnan Anwar

ORCID: 0000-0003-3916-1381
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Energy Management
  • Energy Load and Power Forecasting
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Optimal Power Flow Distribution
  • Microgrid Control and Optimization
  • User Authentication and Security Systems
  • Electricity Theft Detection Techniques
  • Security and Verification in Computing
  • Electric Power System Optimization
  • Solar Radiation and Photovoltaics
  • Advanced Authentication Protocols Security
  • Information and Cyber Security
  • Power System Optimization and Stability
  • Software-Defined Networks and 5G
  • Data Stream Mining Techniques
  • Digital and Cyber Forensics
  • Adversarial Robustness in Machine Learning

Deakin University
2019-2025

Hamdard University
2022-2024

Karachi Medical and Dental College
2024

Fatima Jinnah Dental College
2024

Jinnah Sindh Medical University
2024

Ziauddin University
2024

Liaquat National Hospital
2023-2024

Daffodil International University
2024

Abbasi Shaheed Hospital
2023

Hazara University
2021-2022

Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent remote management, it also increases risk cyber-attacks. The potential threats to IoT applications need reduce have recently become an interesting research topic. It is crucial that effective Intrusion Detection Systems (IDSs) tailored be developed. Such IDSs require updated representative dataset for training evaluation. However, there a lack benchmark IIoT datasets assessing IDSs-enabled...

10.1109/access.2020.3022862 article EN cc-by IEEE Access 2020-01-01

10.1007/s00521-020-04874-y article EN Neural Computing and Applications 2020-05-11

The Internet of Things (IoT) is a rapidly emerging field technologies that delivers numerous cutting-edge solutions in various domains including the critical infrastructures. Thanks to IoT, conventional power system network can be transformed into an effective and smarter energy grid. In this article, we review architecture functionalities IoT-enabled smart grid systems. Specifically, focus on different IoT sensing, communication, computing technologies, their standards relation This article...

10.1109/access.2021.3067331 article EN cc-by IEEE Access 2021-01-01

We present a detailed survey of the Zero Trust (ZT) security paradigm which has growing number advocates in critical infrastructure risk management space. The article employs descriptive approach to fundamental tenets ZT and provides review numerous potential options available for successful realization this paradigm. describe role authentication access control Architectures (ZTA) an in-depth discussion state-of-the-art techniques different scenarios. Furthermore, we comprehensively discuss...

10.1109/access.2022.3174679 article EN cc-by IEEE Access 2022-01-01

Several recent studies have suggested Blockchain for Peer-to-Peer energy trading (P2P-ET) to achieve better security, privacy and fast payment settlement. Most of them however rely on either public Blockchains (which low performance) or permissioned blockchains decentralization level do not provide byzantine fault tolerance). Moreover, these solutions limitations when capturing the business model existing systems. This article proposes a Unified blockchain-based P2P-ET Architecture (UBETA)...

10.1109/tsg.2021.3056147 article EN IEEE Transactions on Smart Grid 2021-02-03

Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these are constantly emerging and changing, therefore, sophisticated dependable defense solutions necessary against such threats. With the rapid development networks evolving threat types, traditional machine learning-based IDS must update cope with security requirements current sustainable environment. In recent years, deep learning, transfer...

10.1109/tii.2022.3164770 article EN IEEE Transactions on Industrial Informatics 2022-04-05

Space anomaly detection plays a critical role in safeguarding the integrity and reliability of space systems amid rising tide threats. This survey aims to deepen comprehension cyber threats through threat modeling, meticulously examine unique challenges detection. The identifies scalability, real-time detection, limited labeled data availability, concept drift, adversarial attacks as key based on thorough literature analysis synthesis. By extensively exploring state-of-the-art techniques,...

10.1016/j.cose.2024.103705 article EN cc-by Computers & Security 2024-01-10

The industrial ecosystem has been unprecedentedly affected by the COVID-19 pandemic because of its immense contact restrictions. Therefore, manufacturing and socio-economic operations that require human involvement have significantly intervened since beginning outbreak. As experienced, social-distancing lesson in potential new-normal world seems to force stakeholders encourage deployment contactless Industry 4.0 architecture. Thus, human-less or less-human keep these IoT-enabled ecosystems...

10.1007/s10586-021-03367-4 article EN other-oa Cluster Computing 2021-07-29

Breast cancer is the most diagnosed in Australia with crude incidence rates increasing drastically from 62.8 at ages 35-39 to 271.4 50-54 (cases per 100,000 women). Various researchers have proposed methods and tools based on Machine Learning Convolutional Neural Networks for assessing mammographic images, but these produced detection interpretation errors resulting false-positive false-negative cases when used real world. We believe that this problem can potentially be resolved by...

10.1109/access.2021.3058773 article EN cc-by IEEE Access 2021-01-01

The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle (IVN) systems for its simple, suitable, and robust architecture. risk of IVN devices has still been insecure vulnerable due to complex data-intensive architectures which greatly increase accessibility unauthorized networks possibility various types cyberattacks. Therefore, detection cyberattacks become a growing interest. With rapid development IVNs evolving threat types, traditional machine...

10.3390/s21144736 article EN cc-by Sensors 2021-07-11

Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as promising privacy-preserving machine learning alternative which enables collaborative of model without exposing private raw short term load forecasting. Despite its virtue, standard FL is still vulnerable an intractable cyber threat known Byzantine attack carried out by...

10.1109/tsg.2023.3292382 article EN IEEE Transactions on Smart Grid 2023-07-05

In a smart grid, state estimation (SE) is very important component of energy management system. Its main functions include system SE and detection cyber anomalies. Recently, it has been shown that conventional techniques are vulnerable to false data injection (FDI) attack, which sophisticated new class attacks on integrity in grid. The contribution this paper propose FDI attack technique using data-driven model, different from the traditional weighted least square based model. This model...

10.35833/mpce.2020.000827 article EN Journal of Modern Power Systems and Clean Energy 2023-01-01

Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile (MANETs), are wire- less networks formed around moving vehicles, enabling communication between roadside infrastructure, and servers. With the rise autonomous connected security concerns surrounding VANETs have grown. still face challenges related to privacy with full-scale deployment due lack user trust. Critical factors shaping include their dynamic topology high mobility characteristics. Authentication protocols emerge as cornerstone...

10.1016/j.vehcom.2024.100804 article EN cc-by Vehicular Communications 2024-06-01

Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform channel has been highlighted as a key requirement for reliable condominium which can be ensured by utilization of advanced techniques platforms like Software-Defined Network (SDN), Function Virtualization (NFV) Blockchain (BC). These technologies provide robust, secured meet all kinds challenges, such safety,...

10.1109/access.2020.3039113 article EN cc-by IEEE Access 2020-01-01

Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security privacy preserving authentication mechanism. To this end, we propose a multi-level blockchain-based privacy-preserving protocol. The paper thoroughly explains the formation of centers, vehicles registration, key generation processes. In proposed architecture, global center (GAC) is responsible...

10.3390/su13010400 article EN Sustainability 2021-01-04

Breast Cancer is one of the leading causes death worldwide. Early detection very important in increasing survival rates. Intensive research therefore done to improve early such cancers through use available technology. This includes various image processing techniques andgeneral machine learning. However, reported accuracy for many these studies was often not at desirable level. Deep Learning based are a promising approach Cancer. We have comparative analysis seven applied Wisconsin...

10.1109/ijcnn52387.2021.9534293 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18

The rapid evolution of the Internet Things (IoT) paradigm during last decade has lead to its adoption in critical infrastructure. However, multitude benefits that are derived from IoT short-lived due exponential rise associated security and privacy threats. Adversaries carry out privacy-oriented attacks gain access sensitive confidential data infrastructure for various self-centered, political commercial gains. In past, researchers have employed several preservation approaches including...

10.1109/access.2021.3124309 article EN cc-by IEEE Access 2021-01-01

The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures been suffering from security challenges. Since emergence IoT, lightweight block ciphers a better option intelligent sensor-based applications. When public-key infrastructure dominates worldwide, symmetric key encipherment such as Advanced Encryption Standard (AES) shows immense...

10.3390/electronics11071083 article EN Electronics 2022-03-30

Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Injection (FDI) into measurement signal which can circumvent conventional detection methods interfere with normal operation grids, turn could potentially lead huge financial losses have a large impact on public safety. It is imperative an accurate state estimation power...

10.3390/en15134877 article EN cc-by Energies 2022-07-02

To achieve carbon neutral by 2025, Deakin University launched a AUD 23 million Renewable Energy Microgrid in 2020 with 7-megawatt solar farm, the largest at an Australian University. A web-based digital twin (DT) is developed to provide operators intelligence and insights through several AI-driven capabilities. Accurate computationally efficient power generation prediction one of critical elements this DT. end, we researched literature identified commonly used Machine Learning-based models...

10.1016/j.ecmx.2023.100370 article EN cc-by-nc-nd Energy Conversion and Management X 2023-03-15
Coming Soon ...