Skip to main content

Research Repository

Advanced Search

Outputs (34)

Task scheduling mechanisms for fog computing: A systematic survey (2023)
Journal Article
Hosseinzadeh, M., Azhir, E., Lansky, J., Mildeova, S., Ahmed, O. H., Malik, M. H., & Khan, F. (2023). Task scheduling mechanisms for fog computing: A systematic survey. IEEE Access, 11, 50994-51017. https://doi.org/10.1109/ACCESS.2023.3277826

In the Internet of Things (IoT) ecosystem, some processing is done near data production sites at higher speeds without the need for high bandwidth by combining Fog Computing (FC) and cloud computing. Fog computing offers advantages for real-time syst... Read More about Task scheduling mechanisms for fog computing: A systematic survey.

Self-adapting security monitoring in Eucalyptus cloud environment (2023)
Journal Article
Mahmood, S., Yahaya, A., Hasan, R., Hussain, S., Malik, M. H., & Kamal Sarker, U. (2023). Self-adapting security monitoring in Eucalyptus cloud environment. International Journal of Advanced Computer Science and Applications, 14(3), 80-93. https://doi.org/10.14569/IJACSA.2023.0140310

This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling the increasing number of tasks due to virtualization and cloud computing technology adoption. The paper evaluates legacy me... Read More about Self-adapting security monitoring in Eucalyptus cloud environment.

Toward designing a secure authentication protocol for IoT environments (2023)
Journal Article
Hosseinzadeh, M., Malik, M. H., Safkhani, M., Bagheri, N., Le, Q. H., Tightiz, L., & Mosavi, A. H. (2023). Toward designing a secure authentication protocol for IoT environments. Sustainability, 15(7), 5934. https://doi.org/10.3390/su15075934

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig... Read More about Toward designing a secure authentication protocol for IoT environments.

Integrity auditing for secure cloud storage on sensitive data protection (2023)
Conference Proceeding
Sivakumar, J., Malik, M., & Rajasekaran, A. S. (2023). Integrity auditing for secure cloud storage on sensitive data protection. In 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC). https://doi.org/10.1109/ICMNWC56175.2022.10031918

Users can interchange data with others and remotely store their data on the cloud using cloud storage services. The integrity of data saved in the cloud should be ensured through remote data integrity audits. An electronic health record system is one... Read More about Integrity auditing for secure cloud storage on sensitive data protection.

Inventory management optimization with data analytics for a trading company (2023)
Journal Article
Khan, S. O., Hasan, R., Hussain, S., Malik, M. H., & Mahmood, S. (2023). Inventory management optimization with data analytics for a trading company. Journal of Big Data & Smart City,

Distributors, manufacturers, and suppliers face the daunting challenge of inventory control. Each supply management problem that arises has ramifications. To satisfy supply and demand, inventory optimization will ensure that the correct commodity is... Read More about Inventory management optimization with data analytics for a trading company.

An energy-aware routing method using firefly algorithm for flying ad hoc networks (2023)
Journal Article
Lansky, J., Rahmani, A. M., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., Khan, M. U., & Hosseinzadeh, M. (2023). An energy-aware routing method using firefly algorithm for flying ad hoc networks. Scientific Reports, 13(1), Article 1323. https://doi.org/10.1038/s41598-023-27567-7

Flying ad-hoc networks (FANETs) include a large number of drones, which communicate with each other based on an ad hoc model. These networks provide new opportunities for various applications such as military, industrial, and civilian applications. H... Read More about An energy-aware routing method using firefly algorithm for flying ad hoc networks.

Chatbot in E-learning (2023)
Conference Proceeding
Hussain, S., Al-Hashmi, S. H., Malik, M. H., & Ali Kazmi, S. I. (2023). Chatbot in E-learning. In SHS Web of Conferences: International Conference on Teaching and Learning – Digital Transformation of Education and Employability (ICTL 2022). https://doi.org/10.1051/shsconf/202315601002

In many modern apps, especially those that provide the user intelligence help, the usage of chatbots is quite common. In reality, these systems frequently have chatbots that can read user inquiries and give the appropriate replies quickly and accurat... Read More about Chatbot in E-learning.

Cryptanalysis of two recent ultra-lightweight authentication protocols (2022)
Journal Article
Servati, M. R., Safkhani, M., Ali, S., Malik, M. H., Ahmed, O. H., Hosseinzadeh, M., & Mosavi, A. H. (2022). Cryptanalysis of two recent ultra-lightweight authentication protocols. Mathematics, 10(23), 4611. https://doi.org/10.3390/math10234611

Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things (IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices’ numerous limitations (such as memory space, computing capabil... Read More about Cryptanalysis of two recent ultra-lightweight authentication protocols.

Development of a lightweight centralized authentication mechanism for the internet of things driven by fog (2022)
Journal Article
Lansky, J., Sadrishojaei, M., Rahmani, A. M., Malik, M. H., Kazemian, F., & Hosseinzadeh, M. (2022). Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166

The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power a... Read More about Development of a lightweight centralized authentication mechanism for the internet of things driven by fog.

SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks (2022)
Journal Article
Jeong, H., Lee, S., Hussain Malik, M., Yousefpoor, E., Yousefpoor, M. S., Ahmed, O. H., …Mosavi, A. (2022). SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks. Frontiers in Medicine, 9, Article 829055. https://doi.org/10.3389/fmed.2022.829055

In recent decades, the use of sensors has dramatically grown to monitor human body activities and maintain the health status. In this application, routing and secure data transmission are very important to prevent the unauthorized access by attackers... Read More about SecAODV: A Secure healthcare routing scheme based on hybrid cryptography in wireless body sensor networks.