Minhaj Khan

ORCID: 0000-0003-4118-817X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Distributed systems and fault tolerance
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Software Engineering Techniques and Practices
  • Advanced Software Engineering Methodologies
  • Software Engineering Research

D.Y. Patil University
2024

Ajeenkya DY Patil University
2024

Integral University
2023-2024

Shri Ramswaroop Memorial University
2018

Summary The Internet is connected with everyone for sharing and monitoring digital information. However, securing network resources from malicious activities critical several applications. Numerous studies have recently used deep learning‐based models in detecting intrusions received relatively robust recognition outcomes. Nevertheless, most investigations operated old datasets, so they could not detect the delinquent attack Therefore, current research proposes long short‐term memory...

10.1002/cpe.8024 article EN Concurrency and Computation Practice and Experience 2024-01-18

The present study uses the benchmark UNSW-NB15 datasets to detect network anomalies using proposed deep learning-based Convolutional Neural Network (CNN) model. Several studies have already worked on anomaly detection with some limits. However, earlier research has used old and obtained limited accuracy. In addition, previous could not latest malicious activities. Therefore, in study, firstly, we implemented machine random forest method diminish dimensionality of dataset pick most notable...

10.1016/j.procs.2024.04.211 article EN Procedia Computer Science 2024-01-01

Abstract Due to rapidly growing Internet facilities, intruders can steal and misuse the data saved stored digitally. In this case, securing digital is challenging but prominent for various purposes. However, traditional techniques are insufficient secure these computer networks cloud information with a 100% success rate. Recently, machine‐ or deep‐learning‐enabled methods have been used network information, some limits. Therefore, study emphasizes detecting classifying intrusion using...

10.1002/spy2.408 article EN Security and Privacy 2024-04-25

With the improvements of technologies, software systems have been more complex then ever before. This requires new approaches to improve development processes so that they sufficiently and efficiently meet these challenges. Requirement engineering in this regard facing many problems which conflicts resolution gained very little popularity. In paper we present motivation toward requirement discuss how techniques from other domains can be applied area. We also proposed a approach for based on...

10.5897/ijps10.623 article EN International Journal of the Physical Sciences 2011-02-18
Coming Soon ...