- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- IoT and Edge/Fog Computing
- Advanced Steganography and Watermarking Techniques
- Digital and Cyber Forensics
- Privacy, Security, and Data Protection
- Biosimilars and Bioanalytical Methods
- vaccines and immunoinformatics approaches
- Advanced Authentication Protocols Security
- Monoclonal and Polyclonal Antibodies Research
- Cybercrime and Law Enforcement Studies
Imam Abdulrahman Bin Faisal University
2022-2025
The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements intelligent transportation. However, the present system setup, phenomenon of providing low computation overhead with massive serving capability is crucial. In existing scenario, computational complexity rises when an authenticated driver travels from one roadside unit (RSU) area another RSU region and must undergo re-authentication by RSU. this paper, efficient...
Autoimmune disorders (AID) present significant challenges due to their complex etiologies and diverse clinical manifestations. Traditional diagnostic methods, which rely on symptom observation biomarker detection, often lack specificity fail provide personalized treatment options. This study proposes ImmunoNet, a deep learning-based framework that integrates genetic, molecular, data enhance the accuracy of autoimmune disease diagnosis treatment. ImmunoNet leverages convolutional neural...
In the rapidly evolving landscape of modern technology, convergence blockchain innovation and machine learning advancements presents unparalleled opportunities to enhance computer forensics. This study introduces SentinelFusion, an ensemble-based framework designed bolster secrecy, privacy, data integrity within systems. By integrating cutting-edge security properties with predictive capabilities learning, SentinelFusion aims improve detection prevention breaches tampering. Utilizing a...
Vehicular fog systems that are enabled by fifth-generation (5G) networks can significantly improve traffic safety and efficiency through vehicle-to-vehicle communication. Vehicles must have their legal status verified before they join the network, as vehicular depend on open Consequently, several anonymous authentication schemes been created to withstand malicious vehicles, with foundations being bilinear pairing or elliptic curve cryptography. But quantum attacks easily defeat these...
Vehicular fog computing (VFC) is a developing concept that utilizes the ideas of to facilitate immediate communication and cooperative decision-making among vehicles. However, guaranteeing safe authentication in VFC presents notable difficulties as result characteristics such dynamic network topology, extensive mobility, limitations on resources. This paper introduces D-BlockAuth, an innovative mechanism for 5G-assisted dual blockchain approach. To reach most vehicles, this link makes use...
In the development of technology in various fields like big data analysis, mining, data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used providing by encrypting sharing information. applied peer-to-peer (P2P) network it has a decentralized ledger. Providing against unauthorized breaches distributed required. To detect breaches, there are numerous techniques were developed those inefficient have poor integrity. Hence, novel technique needs to...