- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Smart Grid Energy Management
- Energy Load and Power Forecasting
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Optimal Power Flow Distribution
- Microgrid Control and Optimization
- User Authentication and Security Systems
- Electricity Theft Detection Techniques
- Security and Verification in Computing
- Electric Power System Optimization
- Solar Radiation and Photovoltaics
- Advanced Authentication Protocols Security
- Information and Cyber Security
- Power System Optimization and Stability
- Software-Defined Networks and 5G
- Data Stream Mining Techniques
- Digital and Cyber Forensics
- Adversarial Robustness in Machine Learning
Deakin University
2019-2025
Hamdard University
2022-2024
Karachi Medical and Dental College
2024
Fatima Jinnah Dental College
2024
Jinnah Sindh Medical University
2024
Ziauddin University
2024
Liaquat National Hospital
2023-2024
Daffodil International University
2024
Abbasi Shaheed Hospital
2023
Hazara University
2021-2022
Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent remote management, it also increases risk cyber-attacks. The potential threats to IoT applications need reduce have recently become an interesting research topic. It is crucial that effective Intrusion Detection Systems (IDSs) tailored be developed. Such IDSs require updated representative dataset for training evaluation. However, there a lack benchmark IIoT datasets assessing IDSs-enabled...
The Internet of Things (IoT) is a rapidly emerging field technologies that delivers numerous cutting-edge solutions in various domains including the critical infrastructures. Thanks to IoT, conventional power system network can be transformed into an effective and smarter energy grid. In this article, we review architecture functionalities IoT-enabled smart grid systems. Specifically, focus on different IoT sensing, communication, computing technologies, their standards relation This article...
We present a detailed survey of the Zero Trust (ZT) security paradigm which has growing number advocates in critical infrastructure risk management space. The article employs descriptive approach to fundamental tenets ZT and provides review numerous potential options available for successful realization this paradigm. describe role authentication access control Architectures (ZTA) an in-depth discussion state-of-the-art techniques different scenarios. Furthermore, we comprehensively discuss...
Several recent studies have suggested Blockchain for Peer-to-Peer energy trading (P2P-ET) to achieve better security, privacy and fast payment settlement. Most of them however rely on either public Blockchains (which low performance) or permissioned blockchains decentralization level do not provide byzantine fault tolerance). Moreover, these solutions limitations when capturing the business model existing systems. This article proposes a Unified blockchain-based P2P-ET Architecture (UBETA)...
Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these are constantly emerging and changing, therefore, sophisticated dependable defense solutions necessary against such threats. With the rapid development networks evolving threat types, traditional machine learning-based IDS must update cope with security requirements current sustainable environment. In recent years, deep learning, transfer...
Space anomaly detection plays a critical role in safeguarding the integrity and reliability of space systems amid rising tide threats. This survey aims to deepen comprehension cyber threats through threat modeling, meticulously examine unique challenges detection. The identifies scalability, real-time detection, limited labeled data availability, concept drift, adversarial attacks as key based on thorough literature analysis synthesis. By extensively exploring state-of-the-art techniques,...
The industrial ecosystem has been unprecedentedly affected by the COVID-19 pandemic because of its immense contact restrictions. Therefore, manufacturing and socio-economic operations that require human involvement have significantly intervened since beginning outbreak. As experienced, social-distancing lesson in potential new-normal world seems to force stakeholders encourage deployment contactless Industry 4.0 architecture. Thus, human-less or less-human keep these IoT-enabled ecosystems...
Breast cancer is the most diagnosed in Australia with crude incidence rates increasing drastically from 62.8 at ages 35-39 to 271.4 50-54 (cases per 100,000 women). Various researchers have proposed methods and tools based on Machine Learning Convolutional Neural Networks for assessing mammographic images, but these produced detection interpretation errors resulting false-positive false-negative cases when used real world. We believe that this problem can potentially be resolved by...
The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle (IVN) systems for its simple, suitable, and robust architecture. risk of IVN devices has still been insecure vulnerable due to complex data-intensive architectures which greatly increase accessibility unauthorized networks possibility various types cyberattacks. Therefore, detection cyberattacks become a growing interest. With rapid development IVNs evolving threat types, traditional machine...
Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning (FL) as promising privacy-preserving machine learning alternative which enables collaborative of model without exposing private raw short term load forecasting. Despite its virtue, standard FL is still vulnerable an intractable cyber threat known Byzantine attack carried out by...
In a smart grid, state estimation (SE) is very important component of energy management system. Its main functions include system SE and detection cyber anomalies. Recently, it has been shown that conventional techniques are vulnerable to false data injection (FDI) attack, which sophisticated new class attacks on integrity in grid. The contribution this paper propose FDI attack technique using data-driven model, different from the traditional weighted least square based model. This model...
Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile (MANETs), are wire- less networks formed around moving vehicles, enabling communication between roadside infrastructure, and servers. With the rise autonomous connected security concerns surrounding VANETs have grown. still face challenges related to privacy with full-scale deployment due lack user trust. Critical factors shaping include their dynamic topology high mobility characteristics. Authentication protocols emerge as cornerstone...
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform channel has been highlighted as a key requirement for reliable condominium which can be ensured by utilization of advanced techniques platforms like Software-Defined Network (SDN), Function Virtualization (NFV) Blockchain (BC). These technologies provide robust, secured meet all kinds challenges, such safety,...
Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security privacy preserving authentication mechanism. To this end, we propose a multi-level blockchain-based privacy-preserving protocol. The paper thoroughly explains the formation of centers, vehicles registration, key generation processes. In proposed architecture, global center (GAC) is responsible...
Breast Cancer is one of the leading causes death worldwide. Early detection very important in increasing survival rates. Intensive research therefore done to improve early such cancers through use available technology. This includes various image processing techniques andgeneral machine learning. However, reported accuracy for many these studies was often not at desirable level. Deep Learning based are a promising approach Cancer. We have comparative analysis seven applied Wisconsin...
The rapid evolution of the Internet Things (IoT) paradigm during last decade has lead to its adoption in critical infrastructure. However, multitude benefits that are derived from IoT short-lived due exponential rise associated security and privacy threats. Adversaries carry out privacy-oriented attacks gain access sensitive confidential data infrastructure for various self-centered, political commercial gains. In past, researchers have employed several preservation approaches including...
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures been suffering from security challenges. Since emergence IoT, lightweight block ciphers a better option intelligent sensor-based applications. When public-key infrastructure dominates worldwide, symmetric key encipherment such as Advanced Encryption Standard (AES) shows immense...
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Injection (FDI) into measurement signal which can circumvent conventional detection methods interfere with normal operation grids, turn could potentially lead huge financial losses have a large impact on public safety. It is imperative an accurate state estimation power...
To achieve carbon neutral by 2025, Deakin University launched a AUD 23 million Renewable Energy Microgrid in 2020 with 7-megawatt solar farm, the largest at an Australian University. A web-based digital twin (DT) is developed to provide operators intelligence and insights through several AI-driven capabilities. Accurate computationally efficient power generation prediction one of critical elements this DT. end, we researched literature identified commonly used Machine Learning-based models...