Search Results - "Jamal, Tauseef"
-
1
IoT malware detection architecture using a novel channel boosted and squeezed CNN
Published in Scientific reports (15-09-2022)“…Interaction between devices, people, and the Internet has given birth to a new digital communication model, the internet of things (IoT). The integration of…”
Get full text
Journal Article -
2
Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier
Published in Scientific reports (19-09-2022)“…Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is…”
Get full text
Journal Article -
3
Malicious node analysis in MANETS
Published in International journal of information technology (Singapore. Online) (01-12-2019)“…The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the intermediate nodes play an role of routers to pass data packets to…”
Get full text
Journal Article -
4
A Novel Cooperative Relaying-Based Vertical Handover Technique for Unmanned Aerial Vehicles
Published in Security and communication networks (21-09-2022)“…The real-time monitoring and autonomous decision making through unmanned aerial vehicles (UAVs) are the potential applications of future networks. Vertical…”
Get full text
Journal Article -
5
Detection of Exceptional Malware Variants Using Deep Boosted Feature Spaces and Machine Learning
Published in Applied sciences (01-11-2021)“…Malware is a key component of cyber-crime, and its analysis is the first line of defence against cyber-attack. This study proposes two new malware…”
Get full text
Journal Article -
6
Predictive Variables for Agile Development Merging Cloud Computing Services
Published in IEEE access (2019)“…Cloud Technology is a most challenging modern area in the field of modern technologies in which assets (e.g., CPU and capacity) can be rented and discharged by…”
Get full text
Journal Article -
7
Proton, UV, and X-ray Induced Luminescence in Tb3+ Doped LuGd2Ga2Al3O12 Phosphors
Published in Crystals (Basel) (22-09-2020)“…The well-known solid-state reaction method is used for the synthesis of Tb doped LuGd2Ga2Al3O12 phosphor. XRD and SEM techniques are used for the phase and…”
Get full text
Journal Article -
8
Optimization of moderator assembly for neutron flux measurement: experimental and theoretical approaches
Published in Nuclear science and techniques (01-05-2017)“…A moderator of paraffin wax assembly has been demonstrated where its thickness can be optimized to thermalize fast neutrons. The assembly is used for measuring…”
Get full text
Journal Article -
9
Remote mobile health monitoring frameworks and mobile applications: Taxonomy, open challenges, motivation, and recommendations
Published in Engineering applications of artificial intelligence (01-07-2024)“…Advancements in mobile technology have propelled the rapid progress of remote health monitoring, particularly in the domain of mobile health (mHealth). This…”
Get full text
Journal Article -
10
A multivariant secure framework for smart mobile health application
Published in Transactions on emerging telecommunications technologies (01-08-2022)“…Wireless sensor network enables remote connectivity of technological devices such as smart mobile with the internet. Due to its low cost as well as easy…”
Get full text
Journal Article -
11
Design and performance of wireless cooperative relaying
Published 01-01-2013“…In recent years, a new paradigm for communication called cooperative communications has been proposed for which initial information theoretic studies have…”
Get full text
Dissertation -
12
Design and performance of wireless cooperative relaying
Published 2013“…In recent years, a new paradigm for communication called cooperative communications has been proposed for which initial information theoretic studies have…”
Get full text
Dissertation -
13
IoT Smart Health Security Threats
Published in 2019 19th International Conference on Computational Science and Its Applications (ICCSA) (01-07-2019)“…The Internet of things (IoT) is an active area in the current research community due to the improvement in mobile computing and wireless networks. Currently,…”
Get full text
Conference Proceeding -
14
IoT Malware Detection Architecture using a Novel Channel Boosted and Squeezed CNN
Published 08-02-2022“…Interaction between devices, people, and the Internet has given birth to a new digital communication model, the Internet of Things (IoT). The seamless network…”
Get full text
Journal Article -
15
Small Object Detection using Deep Learning
Published 10-01-2022“…Now a days, UAVs such as drones are greatly used for various purposes like that of capturing and target detection from ariel imagery etc. Easy access of these…”
Get full text
Journal Article -
16
DoS Attacks at Cooperative MAC
Published 30-11-2018“…Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to…”
Get full text
Journal Article -
17
Detection and Prevention Against RTS Attacks in Wireless LAN
Published 13-11-2018“…Widely deployed wireless network devices use a shared medium to communicate among mobile nodes. WLAN uses virtual carrier sensing mechanism to solve issues…”
Get full text
Journal Article -
18
Novel Relay Selection Protocol for Cooperative Networks
Published 15-11-2019“…Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems…”
Get full text
Journal Article -
19
Malware Classification Using Deep Boosted Learning
Published 08-07-2021“…Malicious activities in cyberspace have gone further than simply hacking machines and spreading viruses. It has become a challenge for a nations survival and…”
Get full text
Journal Article -
20
Denial of Service Attack in Cooperative Networks
Published 15-10-2018“…In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity…”
Get full text
Journal Article