Skip to main content

Research Repository

Advanced Search

All Outputs (9)

UAV’s applications, architecture, security issues and attack scenarios: A survey (2020)
Book Chapter
Khan, N. A., Brohi, S., & Jhanjhi, N. (2020). UAV’s applications, architecture, security issues and attack scenarios: A survey. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Book cover Book cover Intelligent Computing and Innovation on Data Science (753-760). Online and in print.: Springer. https://doi.org/10.1007/978-981-15-3284-9_81

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue m... Read More about UAV’s applications, architecture, security issues and attack scenarios: A survey.

Performance of deep learning vs machine learning in plant leaf disease detection (2020)
Journal Article
Sujatha, R., Chatterjee, J. M., Jhanjhi, N. Z., & Brohi, S. (2020). Performance of deep learning vs machine learning in plant leaf disease detection. Microprocessors and Microsystems, 80, 103615. https://doi.org/10.1016/j.micpro.2020.103615

Plants are recognized as essential as they are the primary source of humanity's energy production since they are having nutritious, medicinal, etc. values. At any time between crop farming, plant diseases can affect the leaf, resulting in enormous cr... Read More about Performance of deep learning vs machine learning in plant leaf disease detection.

Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning (2020)
Conference Proceeding
Zahra, F., Jhanjhi, N. Z., Brohi, S., Malik, N. A., & Humayun, M. (2020). Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). https://doi.org/10.1109/ICCIS49240.2020.9257607

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating int... Read More about Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning.

Emerging use of UAV’s: secure communication protocol issues and challenges (2020)
Book Chapter
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV’s: secure communication protocol issues and challenges. In Drones in Smart-Cities: Security and Performance (37-55). Elsevier. https://doi.org/10.1016/B978-0-12-819972-5.00003-3

In recent years, unmanned aerial vehicles (UAVs)/drones have gained popularity in many areas due to their widely used applications. They are used extensively in military and civil applications such as search and rescue, reconnaissance, monitoring of... Read More about Emerging use of UAV’s: secure communication protocol issues and challenges.

Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs) (2020)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Usmani, R. S. A., & Nayyar, A. (2020). Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). Computer Communications, 157, 434-443. https://doi.org/10.1016/j.comcom.2020.04.049

Road traffic accidents are one of the leading causes of deaths and injuries in the word resulting in the not only loss of precious human lives but also affect the economic resources. According to the World Health Organization (WHO), over 1.35 million... Read More about Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs).

An experimental study to evaluate the performance of machine learning algorithms in ransomware detection (2020)
Journal Article
Dion, Y., & Brohi, S. N. (2020). An experimental study to evaluate the performance of machine learning algorithms in ransomware detection. Journal of Engineering Science and Technology, 15(2), 967-981

The research in the domain of ransomware is rapidly emerging, and the application of machine learning algorithms in ransomware detection is one of the recent breakthroughs. In this research, we constructed an experimental platform using ransomware da... Read More about An experimental study to evaluate the performance of machine learning algorithms in ransomware detection.

Proposing a rank and wormhole attack detection framework using machine learning (2020)
Conference Proceeding
Fatima-tuz-Zahra, Jhanjhi, N. Z., Brohi, S., & Malik, N. A. (2020). Proposing a rank and wormhole attack detection framework using machine learning. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). https://doi.org/10.1109/MACS48846.2019.9024821

Internet of Things (IoT) is a paradigm in digital technology which is prevalently revolutionizing various sectors like healthcare, military, business and more. However, the incremental deployment of this advanced technology has also caused critical s... Read More about Proposing a rank and wormhole attack detection framework using machine learning.

A three-level ransomware detection and prevention mechanism (2020)
Journal Article
Ren, A., Liang, C., Hyug, I. J., Brohi, S. N., & Jhanjhi, N. Z. (2020). A three-level ransomware detection and prevention mechanism. EAI Endorsed Transactions on Energy Web, 7(26), 162691. https://doi.org/10.4108/eai.13-7-2018.162691

Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links.... Read More about A three-level ransomware detection and prevention mechanism.

A data tracking and monitoring mechanism (2020)
Book Chapter
Lika, R. A., Ramasamy, D. A. V., Murugiah, D. A., & Brohi, S. N. (2020). A data tracking and monitoring mechanism. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Lecture Notes in Networks and Systems book series (LNNS,volume 118) (773-781). Springer. https://doi.org/10.1007/978-981-15-3284-9_89

There is a rising trend among companies to collect data including personally identifiable information (PII) from service users. An individual’s privacy can be violated when his/her PII is accumulated, utilized or divulged. Users of the technology are... Read More about A data tracking and monitoring mechanism.