Skip to main content

Research Repository

Advanced Search

All Outputs (38)

Accuracy comparison of machine learning algorithms for predictive analytics in higher education (2019)
Journal Article
Brohi, S. N., Pillai, T. R., Kaur, S., Kaur, H., Sukumaran, S., & Asirvatham, D. (2019). Accuracy comparison of machine learning algorithms for predictive analytics in higher education. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 254-261. https://doi.org/10.1007/978-3-030-23943-5_19

In this research, we compared the accuracy of machine learning algorithms that could be used for predictive analytics in higher education. The proposed experiment is based on a combination of classic machine learning algorithms such as Naive Bayes an... Read More about Accuracy comparison of machine learning algorithms for predictive analytics in higher education.

A review and survey on smartphones: The closest enemy to privacy (2019)
Journal Article
Jayakumar, P., Lawrence, L., Chean, R. L. W., & Brohi, S. N. (2019). A review and survey on smartphones: The closest enemy to privacy. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 106-118. https://doi.org/10.1007/978-3-030-23943-5_8

Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distr... Read More about A review and survey on smartphones: The closest enemy to privacy.

NotPetya: Cyber attack prevention through awareness via Gamification (2018)
Conference Proceeding
Lika, R. A., Murugiah, D., Brohi, S., & Ramasamy, D. A. (2018). NotPetya: Cyber attack prevention through awareness via Gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. https://doi.org/10.1109/ICSCEE.2018.8538431

NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue... Read More about NotPetya: Cyber attack prevention through awareness via Gamification.

Big data in smart cities: A systematic mapping review (2018)
Journal Article
Brohi, S. N., Bamiah, M., & Brohi, M. N. (2018). Big data in smart cities: A systematic mapping review. Journal of Engineering Science and Technology, 13(7), 2246-2270

Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of... Read More about Big data in smart cities: A systematic mapping review.

Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia (2018)
Conference Proceeding
Brohi, S., Pillai, T. R., Asirvatham, D., Ludlow, D., & Bushell, J. (2018). Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia. In IOP Conference Series: Earth and Environmental Science, Volume 167, 8th International Conference on Environment Science and Engineering (ICESE 2018) 11–13 March 2018, Barcelona, Spain. https://doi.org/10.1088/1755-1315/167/1/012015

Increasing number of privately owned vehicles are depicting Malaysians preferred mode of mobility and lack of interest in the public transport system. In most developing countries such as Malaysia, motorized vehicles are the major contributors to air... Read More about Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia.

Big data technology in education: Advantages, implementations, and challenges (2018)
Journal Article
Brohi, S. N., Bamiah, M. A., & Brohi, M. N. (2018). Big data technology in education: Advantages, implementations, and challenges. Journal of Engineering Science and Technology, 13(7 Special Issue on ICCSIT 2018), 229-241

This study provides an in-depth review of Big Data Technology (BDT) advantages, implementations, and challenges in the education sector. BDT plays an essential role in optimizing education intelligence by facilitating institutions, management, educat... Read More about Big data technology in education: Advantages, implementations, and challenges.

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Conference Proceeding
Mathoosoothenen, V. N., Sundaram, J. S., Palanichamy, R. A., & Brohi, S. N. (2017). An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. . https://doi.org/10.1145/3168390.3168397

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Conference Proceeding
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (222-226). https://doi.org/10.1145/3168390.3168398

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.

An analytical model for reliability evaluation of cloud service provisioning systems (2017)
Conference Proceeding
Alturkistani, F. M., Alaboodi, S. S., & Brohi, S. (2017). An analytical model for reliability evaluation of cloud service provisioning systems. In 2017 IEEE Conference on Dependable and Secure Computing (340-347). https://doi.org/10.1109/DESEC.2017.8073821

With the growing popularity of cloud computing, the reliability of cloud services has become a key concern of cloud service providers and users. Several researchers have studied the problem of cloud service reliability assurance. However, the complex... Read More about An analytical model for reliability evaluation of cloud service provisioning systems.

Identifying and analyzing the transient and permanent barriers for big data (2016)
Journal Article
Brohi, S. N., Bamiah, M., & Nawaz Brohi, M. N. (2016). Identifying and analyzing the transient and permanent barriers for big data. Journal of Engineering Science and Technology, 11(12), 1793-1807

Auspiciously, big data analytics had made it possible to generate value from immense amounts of raw data. Organizations are able to seek incredible insights which assist them in effective decision making and providing quality of service by establishi... Read More about Identifying and analyzing the transient and permanent barriers for big data.

Trusted cloud computing framework for healthcare sector (2013)
Journal Article
Bamiah, M., Brohi, S., Chuprat, S., & Manan, J. (2014). Trusted cloud computing framework for healthcare sector. Journal of Computer Science, 10(2), 240-250. https://doi.org/10.3844/jcssp.2014.240.250

Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to... Read More about Trusted cloud computing framework for healthcare sector.

Design and implementation of a privacy preserved off-premises cloud storage (2013)
Journal Article
Chuprat, S., Ab, J. L., Bamiah, M. A., & Brohi, S. N. (2014). Design and implementation of a privacy preserved off-premises cloud storage. Journal of Computer Science, 10(2), 210-223. https://doi.org/10.3844/jcssp.2014.210.223

Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as Healthcare and Payment Card Industry where confident... Read More about Design and implementation of a privacy preserved off-premises cloud storage.

Towards an efficient and secure educational platform on cloud infrastructure (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Chuprat, S., & Ab Manan, J. L. (2012). Towards an efficient and secure educational platform on cloud infrastructure. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (145-150). https://doi.org/10.1109/ICCCTAM.2012.6488088

Existing educational platforms are highly cost-consuming and inefficient in-terms of scalability, flexibility of infrastructures, availability, recovery, accessibility and security. Cloud computing is considered as a flexible business and technologic... Read More about Towards an efficient and secure educational platform on cloud infrastructure.

Identifying and analyzing security threats to virtualized cloud computing infrastructures (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Brohi, M. N., & Kamran, R. (2012). Identifying and analyzing security threats to virtualized cloud computing infrastructures. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (151-155). https://doi.org/10.1109/ICCCTAM.2012.6488089

A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monit... Read More about Identifying and analyzing security threats to virtualized cloud computing infrastructures.

Cloud implementation security challenges (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Brohi, M. N. (2012). Cloud implementation security challenges. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (174-178). https://doi.org/10.1109/ICCCTAM.2012.6488093

Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcar... Read More about Cloud implementation security challenges.

A study on significance of adopting cloud computing paradigm in healthcare sector (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Ab Manan, J. L. (2012). A study on significance of adopting cloud computing paradigm in healthcare sector. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management (65-68). https://doi.org/10.1109/ICCCTAM.2012.6488073

Healthcare sector is information critical industry that deals with human lives. Transforming from traditional paper-based to Electronic Health Records (EHRs) was not efficient enough since EHRs require resources, integration, maintenance and high cos... Read More about A study on significance of adopting cloud computing paradigm in healthcare sector.

Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures (2012)
Conference Proceeding
Bamiah, M. A., Brohi, S., & Chuprat, S. (2012). Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures. In Y. Li, & Z. Zeng (Eds.), Proceedings Volume 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis. https://doi.org/10.1117/12.920880

Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud... Read More about Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures.