Skip to main content

Research Repository

Advanced Search

All Outputs (40)

Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT (2023)
Journal Article
Ahmad, W., Ullah, A., Sheharyar, Jhanjhi, N. Z., Ghoniem, R. M., & Brohi, S. N. (2024). Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT. ICT Express, 10(1), 111-117. https://doi.org/10.1016/j.icte.2023.07.006

Internet of Things (IoT) is getting growing interest to offer great opportunities in combination with Mobile Crowd Sensing for real-time applications. Existing approaches motivate mobile workers (MWs) for approaching the distant locations to receive... Read More about Bargaining based design mechanism for delay sensitive tasks of mobile crowdsensing in IoT.

Protocol-specific and sensor network-inherited attack detection in IoT using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Khan, N. A., Brohi, S. N., Masud, M., & Aljahdali, S. (2022). Protocol-specific and sensor network-inherited attack detection in IoT using machine learning. Applied Sciences, 12(22), https://doi.org/10.3390/app122211598

For networks with limited resources, such as IoT-enabled smart homes, smart industrial equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy Networks (RPL) was developed. Additionally, a number of optimizations have been... Read More about Protocol-specific and sensor network-inherited attack detection in IoT using machine learning.

Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning (2022)
Journal Article
Zahra, F., Jhanjhi, N. Z., Brohi, S. N., Khan, N., Masud, M., & AlZain, M. A. (2022). Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning. Sensors, 22(18), 1 - 17. https://doi.org/10.3390/s22186765

The proliferation of the internet of things (IoT) technology has led to numerous challenges in various life domains, such as healthcare, smart systems, and mission-critical applications. The most critical issue is the security of IoT nodes, networks,... Read More about Rank and wormhole attack detection model for RPL-based Internet of Things using machine learning.

E-government cybersecurity modeling in the context of software-defined networks (2022)
Book Chapter
Ujjan, R. M. A., Taj, I., & Brohi, S. N. (2022). E-government cybersecurity modeling in the context of software-defined networks. In Cybersecurity Measures for E-Government Frameworks (1-21). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch001

Currently, information and communication technologies are going in advance, allowing more information to be distributed globally via the internet superhighway. While being interconnected to the virtual world, people are becoming increasingly focused,... Read More about E-government cybersecurity modeling in the context of software-defined networks.

The impact of Blockchain technology on advanced security measures for E-Government (2022)
Book Chapter
Ujjan, R. M. A., Hussain, K., & Brohi, S. N. (2022). The impact of Blockchain technology on advanced security measures for E-Government. In Cyber Security Measures for E-Government Frameworks (157-174). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch010

Implementation of blockchain with e-government has raised several complexities. When an area has satisfied the requirements for e-government implementation, new challenges will appear. As a result of the information technology revolution, governments... Read More about The impact of Blockchain technology on advanced security measures for E-Government.

Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Almusaylim, Z. A. (2021). Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication. Lecture Notes in Networks and Systems, 248, 413-423. https://doi.org/10.1007/978-981-16-3153-5_44

Recently, the use of unmanned aerial vehicles has become increased rapidly in both civilian and military applications. With the increased popularity and wide range of applications, these systems’ global manufacturer market has also been improved. UAV... Read More about Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication.

A secure communication protocol for unmanned aerial vehicles (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Almazroi, A. A., & Almazroi, A. A. (2021). A secure communication protocol for unmanned aerial vehicles. Computers, Materials & Continua, 70(1), 601-618. https://doi.org/10.32604/cmc.2022.019419

Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Statio... Read More about A secure communication protocol for unmanned aerial vehicles.

UAV’s applications, architecture, security issues and attack scenarios: A survey (2020)
Book Chapter
Khan, N. A., Brohi, S., & Jhanjhi, N. (2020). UAV’s applications, architecture, security issues and attack scenarios: A survey. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Book cover Book cover Intelligent Computing and Innovation on Data Science (753-760). Online and in print.: Springer. https://doi.org/10.1007/978-981-15-3284-9_81

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue m... Read More about UAV’s applications, architecture, security issues and attack scenarios: A survey.

Performance of deep learning vs machine learning in plant leaf disease detection (2020)
Journal Article
Sujatha, R., Chatterjee, J. M., Jhanjhi, N. Z., & Brohi, S. (2020). Performance of deep learning vs machine learning in plant leaf disease detection. Microprocessors and Microsystems, 80, 103615. https://doi.org/10.1016/j.micpro.2020.103615

Plants are recognized as essential as they are the primary source of humanity's energy production since they are having nutritious, medicinal, etc. values. At any time between crop farming, plant diseases can affect the leaf, resulting in enormous cr... Read More about Performance of deep learning vs machine learning in plant leaf disease detection.

Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning (2020)
Conference Proceeding
Zahra, F., Jhanjhi, N. Z., Brohi, S., Malik, N. A., & Humayun, M. (2020). Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information Sciences (ICCIS). https://doi.org/10.1109/ICCIS49240.2020.9257607

Internet of Things have profoundly transformed the way technology is deployed today in different domains of life. However, its widescale implementation has also caused major security concerns in context of data communication because of escalating int... Read More about Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning.

Emerging use of UAV’s: secure communication protocol issues and challenges (2020)
Book Chapter
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV’s: secure communication protocol issues and challenges. In Drones in Smart-Cities: Security and Performance (37-55). Elsevier. https://doi.org/10.1016/B978-0-12-819972-5.00003-3

In recent years, unmanned aerial vehicles (UAVs)/drones have gained popularity in many areas due to their widely used applications. They are used extensively in military and civil applications such as search and rescue, reconnaissance, monitoring of... Read More about Emerging use of UAV’s: secure communication protocol issues and challenges.

Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs) (2020)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Usmani, R. S. A., & Nayyar, A. (2020). Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). Computer Communications, 157, 434-443. https://doi.org/10.1016/j.comcom.2020.04.049

Road traffic accidents are one of the leading causes of deaths and injuries in the word resulting in the not only loss of precious human lives but also affect the economic resources. According to the World Health Organization (WHO), over 1.35 million... Read More about Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs).

An experimental study to evaluate the performance of machine learning algorithms in ransomware detection (2020)
Journal Article
Dion, Y., & Brohi, S. N. (2020). An experimental study to evaluate the performance of machine learning algorithms in ransomware detection. Journal of Engineering Science and Technology, 15(2), 967-981

The research in the domain of ransomware is rapidly emerging, and the application of machine learning algorithms in ransomware detection is one of the recent breakthroughs. In this research, we constructed an experimental platform using ransomware da... Read More about An experimental study to evaluate the performance of machine learning algorithms in ransomware detection.

Proposing a rank and wormhole attack detection framework using machine learning (2020)
Conference Proceeding
Fatima-tuz-Zahra, Jhanjhi, N. Z., Brohi, S., & Malik, N. A. (2020). Proposing a rank and wormhole attack detection framework using machine learning. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). https://doi.org/10.1109/MACS48846.2019.9024821

Internet of Things (IoT) is a paradigm in digital technology which is prevalently revolutionizing various sectors like healthcare, military, business and more. However, the incremental deployment of this advanced technology has also caused critical s... Read More about Proposing a rank and wormhole attack detection framework using machine learning.

A three-level ransomware detection and prevention mechanism (2020)
Journal Article
Ren, A., Liang, C., Hyug, I. J., Brohi, S. N., & Jhanjhi, N. Z. (2020). A three-level ransomware detection and prevention mechanism. EAI Endorsed Transactions on Energy Web, 7(26), 162691. https://doi.org/10.4108/eai.13-7-2018.162691

Ransomware encrypts victim's files or locks users out of the system. Victims will have to pay the attacker a ransom to decrypt and regain access to the user files. Petya targets individuals and companies through email attachments and download links.... Read More about A three-level ransomware detection and prevention mechanism.

A data tracking and monitoring mechanism (2020)
Book Chapter
Lika, R. A., Ramasamy, D. A. V., Murugiah, D. A., & Brohi, S. N. (2020). A data tracking and monitoring mechanism. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Lecture Notes in Networks and Systems book series (LNNS,volume 118) (773-781). Springer. https://doi.org/10.1007/978-981-15-3284-9_89

There is a rising trend among companies to collect data including personally identifiable information (PII) from service users. An individual’s privacy can be violated when his/her PII is accumulated, utilized or divulged. Users of the technology are... Read More about A data tracking and monitoring mechanism.

Credit card fraud detection using deep learning technique (2019)
Conference Proceeding
Pillai, T. R., Hashem, I. A. T., Brohi, S., Kaur, S., & Marjani, M. (2019). Credit card fraud detection using deep learning technique. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776797

Credit card fraud detection is growing due to the increase and the popularity of online banking. The need to detect fraudulent within credit card has become as a serious problem among the online shoppers. The multi-layer perceptron (MLP) machine lear... Read More about Credit card fraud detection using deep learning technique.

Machine learning: An ethical, social & political perspective (2019)
Conference Proceeding
Mageswaran, G., Nagappan, S. D., Hamzah, N., & Brohi, S. (2019). Machine learning: An ethical, social & political perspective. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776702

Machine Learning is an emerging field which has created a significant positive and undesirable impact too many industries. This technology has been well received and widely used for precise decision making as its ability to process, analyze and visua... Read More about Machine learning: An ethical, social & political perspective.

Transparent workflow system to eliminate biasness in assessing final year projects (2019)
Conference Proceeding
Kaur, S., Angelina, N., Hon, S. S. K., Ntambo, M., Brohi, S., & Hashem, I. A. T. (2019). Transparent workflow system to eliminate biasness in assessing final year projects. In Proceedings - 2018 4th International Conference on Advances in Computing, Communication and Automation, ICACCA 2018. https://doi.org/10.1109/ICACCAF.2018.8776759

The purpose of this study is to understand the Final Year Project System existences and to find improvement in their workflow process. The observation made was based on a case-study workflow conducted by the final year student. In this paper the prop... Read More about Transparent workflow system to eliminate biasness in assessing final year projects.

Middleware power saving scheme for mobile applications (2019)
Conference Proceeding
Jhanjhi, N. Z., Almusalli, F. A., Brohi, S., & Abdullah, A. (2019). Middleware power saving scheme for mobile applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA). https://doi.org/10.1109/ICACCAF.2018.8776711

Smartphones popularity, usage and users dependency has been increased over the years. The popularity increase is linked with several factors such as smartphones size, ease in use, and several supported multipurpose apps. This all is enable due to the... Read More about Middleware power saving scheme for mobile applications.