Skip to main content

Research Repository

Advanced Search

All Outputs (18)

Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning (2020)
Conference Proceeding
Zahra, F., Jhanjhi, N. Z., Brohi, S., Malik, N. A., & Humayun, M. (2020). Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). https://doi.org/10.1109/ICCIS49240.2020.9257607

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating int... Read More about Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning.

Proposing a rank and wormhole attack detection framework using machine learning (2020)
Conference Proceeding
Fatima-tuz-Zahra, Jhanjhi, N. Z., Brohi, S., & Malik, N. A. (2020). Proposing a rank and wormhole attack detection framework using machine learning. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). https://doi.org/10.1109/MACS48846.2019.9024821

Internet of Things (IoT) is a paradigm in digital technology which is prevalently revolutionizing various sectors like healthcare, military, business and more. However, the incremental deployment of this advanced technology has also caused critical s... Read More about Proposing a rank and wormhole attack detection framework using machine learning.

Machine learning: An ethical, social & political perspective (2019)
Conference Proceeding
Mageswaran, G., Nagappan, S. D., Hamzah, N., & Brohi, S. (2019). Machine learning: An ethical, social & political perspective. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776702

Machine Learning is an emerging field which has created a significant positive and undesirable impact too many industries. This technology has been well received and widely used for precise decision making as its ability to process, analyze and visua... Read More about Machine learning: An ethical, social & political perspective.

Transparent workflow system to eliminate biasness in assessing final year projects (2019)
Conference Proceeding
Kaur, S., Angelina, N., Hon, S. S. K., Ntambo, M., Brohi, S., & Hashem, I. A. T. (2019). Transparent workflow system to eliminate biasness in assessing final year projects. In Proceedings - 2018 4th International Conference on Advances in Computing, Communication and Automation, ICACCA 2018. https://doi.org/10.1109/ICACCAF.2018.8776759

The purpose of this study is to understand the Final Year Project System existences and to find improvement in their workflow process. The observation made was based on a case-study workflow conducted by the final year student. In this paper the prop... Read More about Transparent workflow system to eliminate biasness in assessing final year projects.

Middleware power saving scheme for mobile applications (2019)
Conference Proceeding
Jhanjhi, N. Z., Almusalli, F. A., Brohi, S., & Abdullah, A. (2019). Middleware power saving scheme for mobile applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776711

Smartphones popularity, usage and users dependency has been increased over the years. The popularity increase is linked with several factors such as smartphones size, ease in use, and several supported multipurpose apps. This all is enable due to the... Read More about Middleware power saving scheme for mobile applications.

Credit card fraud detection using deep learning technique (2019)
Conference Proceeding
Pillai, T. R., Hashem, I. A. T., Brohi, S., Kaur, S., & Marjani, M. (2019). Credit card fraud detection using deep learning technique. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776797

Credit card fraud detection is growing due to the increase and the popularity of online banking. The need to detect fraudulent within credit card has become as a serious problem among the online shoppers. The multi-layer perceptron (MLP) machine lear... Read More about Credit card fraud detection using deep learning technique.

Data science methodology for Internet-of-Things (2019)
Conference Proceeding
Brohi, S., Marjani, M., Hashem, I. A. T., Pillai, T. R., Kaur, S., & Amalathas, S. S. (2019). Data science methodology for Internet-of-Things. In M. H. Miraz, P. S. Excell, A. Ware, S. Soomro, & M. Ali (Eds.), International Conference for Emerging Technologies in Computing (178-186). https://doi.org/10.1007/978-3-030-23943-5_13

The journey of data from the state of being valueless to valuable has been possible due to powerful analytics tools and processing platforms. Organizations have realized the potential of data, and they are looking far ahead from the traditional relat... Read More about Data science methodology for Internet-of-Things.

NotPetya: Cyber attack prevention through awareness via Gamification (2018)
Conference Proceeding
Lika, R. A., Murugiah, D., Brohi, S., & Ramasamy, D. A. (2018). NotPetya: Cyber attack prevention through awareness via Gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. https://doi.org/10.1109/ICSCEE.2018.8538431

NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue... Read More about NotPetya: Cyber attack prevention through awareness via Gamification.

Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia (2018)
Conference Proceeding
Brohi, S., Pillai, T. R., Asirvatham, D., Ludlow, D., & Bushell, J. (2018). Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia. In IOP Conference Series: Earth and Environmental Science, Volume 167, 8th International Conference on Environment Science and Engineering (ICESE 2018) 11–13 March 2018, Barcelona, Spain. https://doi.org/10.1088/1755-1315/167/1/012015

Increasing number of privately owned vehicles are depicting Malaysians preferred mode of mobility and lack of interest in the public transport system. In most developing countries such as Malaysia, motorized vehicles are the major contributors to air... Read More about Towards smart cities development: A study of public transport system and traffic-related air pollutants in Malaysia.

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Conference Proceeding
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (222-226). https://doi.org/10.1145/3168390.3168398

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Conference Proceeding
Mathoosoothenen, V. N., Sundaram, J. S., Palanichamy, R. A., & Brohi, S. N. (2017). An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. . https://doi.org/10.1145/3168390.3168397

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

An analytical model for reliability evaluation of cloud service provisioning systems (2017)
Conference Proceeding
Alturkistani, F. M., Alaboodi, S. S., & Brohi, S. (2017). An analytical model for reliability evaluation of cloud service provisioning systems. In 2017 IEEE Conference on Dependable and Secure Computing (340-347). https://doi.org/10.1109/DESEC.2017.8073821

With the growing popularity of cloud computing, the reliability of cloud services has become a key concern of cloud service providers and users. Several researchers have studied the problem of cloud service reliability assurance. However, the complex... Read More about An analytical model for reliability evaluation of cloud service provisioning systems.

Towards an efficient and secure educational platform on cloud infrastructure (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Chuprat, S., & Ab Manan, J. L. (2012). Towards an efficient and secure educational platform on cloud infrastructure. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (145-150). https://doi.org/10.1109/ICCCTAM.2012.6488088

Existing educational platforms are highly cost-consuming and inefficient in-terms of scalability, flexibility of infrastructures, availability, recovery, accessibility and security. Cloud computing is considered as a flexible business and technologic... Read More about Towards an efficient and secure educational platform on cloud infrastructure.

Identifying and analyzing security threats to virtualized cloud computing infrastructures (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Brohi, M. N., & Kamran, R. (2012). Identifying and analyzing security threats to virtualized cloud computing infrastructures. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (151-155). https://doi.org/10.1109/ICCCTAM.2012.6488089

A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monit... Read More about Identifying and analyzing security threats to virtualized cloud computing infrastructures.

Cloud implementation security challenges (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Brohi, M. N. (2012). Cloud implementation security challenges. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (174-178). https://doi.org/10.1109/ICCCTAM.2012.6488093

Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcar... Read More about Cloud implementation security challenges.

A study on significance of adopting cloud computing paradigm in healthcare sector (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Ab Manan, J. L. (2012). A study on significance of adopting cloud computing paradigm in healthcare sector. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management (65-68). https://doi.org/10.1109/ICCCTAM.2012.6488073

Healthcare sector is information critical industry that deals with human lives. Transforming from traditional paper-based to Electronic Health Records (EHRs) was not efficient enough since EHRs require resources, integration, maintenance and high cos... Read More about A study on significance of adopting cloud computing paradigm in healthcare sector.

Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures (2012)
Conference Proceeding
Bamiah, M. A., Brohi, S., & Chuprat, S. (2012). Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures. In Y. Li, & Z. Zeng (Eds.), Proceedings Volume 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis. https://doi.org/10.1117/12.920880

Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud... Read More about Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures.