Skip to main content

Research Repository

Advanced Search

Outputs (18)

Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning (2020)
Conference Proceeding
Zahra, F., Jhanjhi, N. Z., Brohi, S., Malik, N. A., & Humayun, M. (2020). Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). https://doi.org/10.1109/ICCIS49240.2020.9257607

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating int... Read More about Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning.

Proposing a rank and wormhole attack detection framework using machine learning (2020)
Conference Proceeding
Fatima-tuz-Zahra, Jhanjhi, N. Z., Brohi, S., & Malik, N. A. (2020). Proposing a rank and wormhole attack detection framework using machine learning. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). https://doi.org/10.1109/MACS48846.2019.9024821

Internet of Things (IoT) is a paradigm in digital technology which is prevalently revolutionizing various sectors like healthcare, military, business and more. However, the incremental deployment of this advanced technology has also caused critical s... Read More about Proposing a rank and wormhole attack detection framework using machine learning.

Machine learning: An ethical, social & political perspective (2019)
Conference Proceeding
Mageswaran, G., Nagappan, S. D., Hamzah, N., & Brohi, S. (2019). Machine learning: An ethical, social & political perspective. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776702

Machine Learning is an emerging field which has created a significant positive and undesirable impact too many industries. This technology has been well received and widely used for precise decision making as its ability to process, analyze and visua... Read More about Machine learning: An ethical, social & political perspective.

Transparent workflow system to eliminate biasness in assessing final year projects (2019)
Conference Proceeding
Kaur, S., Angelina, N., Hon, S. S. K., Ntambo, M., Brohi, S., & Hashem, I. A. T. (2019). Transparent workflow system to eliminate biasness in assessing final year projects. In Proceedings - 2018 4th International Conference on Advances in Computing, Communication and Automation, ICACCA 2018. https://doi.org/10.1109/ICACCAF.2018.8776759

The purpose of this study is to understand the Final Year Project System existences and to find improvement in their workflow process. The observation made was based on a case-study workflow conducted by the final year student. In this paper the prop... Read More about Transparent workflow system to eliminate biasness in assessing final year projects.

Middleware power saving scheme for mobile applications (2019)
Conference Proceeding
Jhanjhi, N. Z., Almusalli, F. A., Brohi, S., & Abdullah, A. (2019). Middleware power saving scheme for mobile applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776711

Smartphones popularity, usage and users dependency has been increased over the years. The popularity increase is linked with several factors such as smartphones size, ease in use, and several supported multipurpose apps. This all is enable due to the... Read More about Middleware power saving scheme for mobile applications.

Credit card fraud detection using deep learning technique (2019)
Conference Proceeding
Pillai, T. R., Hashem, I. A. T., Brohi, S., Kaur, S., & Marjani, M. (2019). Credit card fraud detection using deep learning technique. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776797

Credit card fraud detection is growing due to the increase and the popularity of online banking. The need to detect fraudulent within credit card has become as a serious problem among the online shoppers. The multi-layer perceptron (MLP) machine lear... Read More about Credit card fraud detection using deep learning technique.

Data science methodology for Internet-of-Things (2019)
Conference Proceeding
Brohi, S., Marjani, M., Hashem, I. A. T., Pillai, T. R., Kaur, S., & Amalathas, S. S. (2019). Data science methodology for Internet-of-Things. In M. H. Miraz, P. S. Excell, A. Ware, S. Soomro, & M. Ali (Eds.), International Conference for Emerging Technologies in Computing (178-186). https://doi.org/10.1007/978-3-030-23943-5_13

The journey of data from the state of being valueless to valuable has been possible due to powerful analytics tools and processing platforms. Organizations have realized the potential of data, and they are looking far ahead from the traditional relat... Read More about Data science methodology for Internet-of-Things.

NotPetya: Cyber attack prevention through awareness via Gamification (2018)
Conference Proceeding
Lika, R. A., Murugiah, D., Brohi, S., & Ramasamy, D. A. (2018). NotPetya: Cyber attack prevention through awareness via Gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. https://doi.org/10.1109/ICSCEE.2018.8538431

NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue... Read More about NotPetya: Cyber attack prevention through awareness via Gamification.

Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia (2018)
Conference Proceeding
Brohi, S., Pillai, T. R., Asirvatham, D., Ludlow, D., & Bushell, J. (2018). Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia. In IOP Conference Series: Earth and Environmental Science, Volume 167, 8th International Conference on Environment Science and Engineering (ICESE 2018) 11–13 March 2018, Barcelona, Spain. https://doi.org/10.1088/1755-1315/167/1/012015

Increasing number of privately owned vehicles are depicting Malaysians preferred mode of mobility and lack of interest in the public transport system. In most developing countries such as Malaysia, motorized vehicles are the major contributors to air... Read More about Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia.

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.