Skip to main content

Research Repository

Advanced Search

All Outputs (16)

Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT (2023)
Journal Article
Ahmad, W., Ullah, A., Sheharyar, Jhanjhi, N. Z., Ghoniem, R. M., & Brohi, S. N. (2024). Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT. ICT Express, 10(1), 111-117. https://doi.org/10.1016/j.icte.2023.07.006

Internet of Things (IoT) is getting growing interest to offer great opportunities in combination with Mobile Crowd Sensing for real-time applications. Existing approaches motivate mobile workers (MWs) for approaching the distant locations to receive... Read More about Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT.

Protocol-specific and sensor network-inherited attack detection in IoT using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Khan, N. A., Brohi, S. N., Masud, M., & Aljahdali, S. (2022). Protocol-specific and sensor network-inherited attack detection in IoT using machine learning. Applied Sciences, 12(22), https://doi.org/10.3390/app122211598

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been... Read More about Protocol-specific and sensor network-inherited attack detection in IoT using machine learning.

Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Brohi, S. N., Khan, N., Masud, M., & AlZain, M. A. (2022). Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning. Sensors, 22(18), 1 - 17. https://doi.org/10.3390/s22186765

The proliferation of the internet of things (IoT) technology has led to numerous challenges in various life domains, such as healthcare, smart systems, and mission-critical applications. The most critical issue is the security of IoT nodes, networks,... Read More about Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning.

Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Almusaylim, Z. A. (2021). Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication. Lecture Notes in Networks and Systems, 248, 413-423. https://doi.org/10.1007/978-981-16-3153-5_44

Recently, the use of unmanned aerial vehicles has become increased rapidly in both civilian and military applications. With the increased popularity and wide range of applications, these systems’ global manufacturer market has also been improved. UAV... Read More about Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication.

A secure communication protocol for unmanned aerial vehicles (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Almazroi, A. A., & Almazroi, A. A. (2021). A secure communication protocol for unmanned aerial vehicles. Computers, Materials & Continua, 70(1), 601-618. https://doi.org/10.32604/cmc.2022.019419

Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Statio... Read More about A secure communication protocol for unmanned aerial vehicles.

Performance of deep learning vs machine learning in plant leaf disease detection (2020)
Journal Article
Sujatha, R., Chatterjee, J. M., Jhanjhi, N. Z., & Brohi, S. (2020). Performance of deep learning vs machine learning in plant leaf disease detection. Microprocessors and Microsystems, 80, 103615. https://doi.org/10.1016/j.micpro.2020.103615

Plants are recognized as essential as they are the primary source of humanity's energy production since they are having nutritious, medicinal, etc. values. At any time between crop farming, plant diseases can affect the leaf, resulting in enormous cr... Read More about Performance of deep learning vs machine learning in plant leaf disease detection.

Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs) (2020)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Usmani, R. S. A., & Nayyar, A. (2020). Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). Computer Communications, 157, 434-443. https://doi.org/10.1016/j.comcom.2020.04.049

Road traffic accidents are one of the leading causes of deaths and injuries in the word resulting in the not only loss of precious human lives but also affect the economic resources. According to the World Health Organization (WHO), over 1.35 million... Read More about Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs).

An experimental study to evaluate the performance of machine learning algorithms in ransomware detection (2020)
Journal Article
Dion, Y., & Brohi, S. N. (2020). An experimental study to evaluate the performance of machine learning algorithms in ransomware detection. Journal of Engineering Science and Technology, 15(2), 967-981

The research in the domain of ransomware is rapidly emerging, and the application of machine learning algorithms in ransomware detection is one of the recent breakthroughs. In this research, we constructed an experimental platform using ransomware da... Read More about An experimental study to evaluate the performance of machine learning algorithms in ransomware detection.

A three-level ransomware detection and prevention mechanism (2020)
Journal Article
Ren, A., Liang, C., Hyug, I. J., Brohi, S. N., & Jhanjhi, N. Z. (2020). A three-level ransomware detection and prevention mechanism. EAI Endorsed Transactions on Energy Web, 7(26), 162691. https://doi.org/10.4108/eai.13-7-2018.162691

Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links.... Read More about A three-level ransomware detection and prevention mechanism.

Accuracy comparison of machine learning algorithms for predictive analytics in higher education (2019)
Journal Article
Brohi, S. N., Pillai, T. R., Kaur, S., Kaur, H., Sukumaran, S., & Asirvatham, D. (2019). Accuracy comparison of machine learning algorithms for predictive analytics in higher education. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 254-261. https://doi.org/10.1007/978-3-030-23943-5_19

In this research, we compared the accuracy of machine learning algorithms that could be used for predictive analytics in higher education. The proposed experiment is based on a combination of classic machine learning algorithms such as Naive Bayes an... Read More about Accuracy comparison of machine learning algorithms for predictive analytics in higher education.

A review and survey on smartphones: The closest enemy to privacy (2019)
Journal Article
Jayakumar, P., Lawrence, L., Chean, R. L. W., & Brohi, S. N. (2019). A review and survey on smartphones: The closest enemy to privacy. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 106-118. https://doi.org/10.1007/978-3-030-23943-5_8

Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distr... Read More about A review and survey on smartphones: The closest enemy to privacy.

Big data in smart cities: A systematic mapping review (2018)
Journal Article
Brohi, S. N., Bamiah, M., & Brohi, M. N. (2018). Big data in smart cities: A systematic mapping review. Journal of Engineering Science and Technology, 13(7), 2246-2270

Big data is an emerging area of research and its prospective applications in smart cities are extensively recognized. In this study, we provide a breadth-first review of the domain “Big Data in Smart Cities” by applying the formal research method of... Read More about Big data in smart cities: A systematic mapping review.

Big data technology in education: Advantages, implementations, and challenges (2018)
Journal Article
Brohi, S. N., Bamiah, M. A., & Brohi, M. N. (2018). Big data technology in education: Advantages, implementations, and challenges. Journal of Engineering Science and Technology, 13(7 Special Issue on ICCSIT 2018), 229-241

This study provides an in-depth review of Big Data Technology (BDT) advantages, implementations, and challenges in the education sector. BDT plays an essential role in optimizing education intelligence by facilitating institutions, management, educat... Read More about Big data technology in education: Advantages, implementations, and challenges.

Identifying and analyzing the transient and permanent barriers for big data (2016)
Journal Article
Brohi, S. N., Bamiah, M., & Nawaz Brohi, M. N. (2016). Identifying and analyzing the transient and permanent barriers for big data. Journal of Engineering Science and Technology, 11(12), 1793-1807

Auspiciously, big data analytics had made it possible to generate value from immense amounts of raw data. Organizations are able to seek incredible insights which assist them in effective decision making and providing quality of service by establishi... Read More about Identifying and analyzing the transient and permanent barriers for big data.

Trusted cloud computing framework for healthcare sector (2013)
Journal Article
Bamiah, M., Brohi, S., Chuprat, S., & Manan, J. (2014). Trusted cloud computing framework for healthcare sector. Journal of Computer Science, 10(2), 240-250. https://doi.org/10.3844/jcssp.2014.240.250

Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to... Read More about Trusted cloud computing framework for healthcare sector.

Design and implementation of a privacy preserved off-premises cloud storage (2013)
Journal Article
Chuprat, S., Ab, J. L., Bamiah, M. A., & Brohi, S. N. (2014). Design and implementation of a privacy preserved off-premises cloud storage. Journal of Computer Science, 10(2), 210-223. https://doi.org/10.3844/jcssp.2014.210.223

Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as Healthcare and Payment Card Industry where confident... Read More about Design and implementation of a privacy preserved off-premises cloud storage.