Search Results - "Khan, Farrukh"
-
1
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research
Published in Computer (Long Beach, Calif.) (01-02-2019)“…Many consider the KDD Cup 99 data sets to be outdated and inadequate. Therefore, the extensive use of these data sets in recent studies to evaluate network…”
Get full text
Journal Article -
2
The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2021)“…High availability in network services is a crucial requirement for quality of experience. Denial of Service (DoS) and Distribute Denial of Service (DDoS)…”
Get full text
Journal Article -
3
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
Published in EURASIP journal on wireless communications and networking (27-08-2013)“…Wireless body area networks (WBANs) are formed by using tiny health monitoring sensors on the human body in order to collect and communicate the human personal…”
Get full text
Journal Article -
4
Optimal Path Routing Protocol for Warning Messages Dissemination for Highway VANET
Published in Sensors (Basel, Switzerland) (01-09-2022)“…In vehicular ad hoc networks (VANETs), helpful information dissemination establishes the foundation of communication. One of the significant difficulties in…”
Get full text
Journal Article -
5
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
Published in IEEE access (2019)“…The network intrusion detection system is an important tool for protecting computer networks against threats and malicious attacks. Many techniques have…”
Get full text
Journal Article -
6
Development and internal validation of a nomogram predicting significant prostate cancer: Is it clinically applicable in low prevalent prostate cancer countries? A multicenter study
Published in The Prostate (01-01-2024)“…Background Accurately identifying aggressive prostate tumors and studying them as a separate outcome are urgently needed. Nomogram is a predictive tool using…”
Get full text
Journal Article -
7
Smart occupancy detection for road traffic parking using deep extreme learning machine
Published in Journal of King Saud University. Computer and information sciences (01-03-2022)“…Predicting the location of parking is a long-lasting problem that has ultimate importance in our daily life. In this paper, artificial neural networks are used…”
Get full text
Journal Article -
8
A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
Published in IEEE access (01-01-2019)“…The network intrusion detection system is an important tool for protecting computer networks against threats and malicious attacks. Many techniques have…”
Get full text
Journal Article -
9
Design of normalized fractional SGD computing paradigm for recommender systems
Published in Neural computing & applications (01-07-2020)“…Fast and effective recommender systems are fundamental to fulfill the growing requirements of the e-commerce industry. The strength of matrix factorization…”
Get full text
Journal Article -
10
Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids
Published in Energies (Basel) (01-01-2023)“…Nowadays, electric load forecasting through a data analytic approach has become one of the most active and emerging research areas. It provides future…”
Get full text
Journal Article -
11
Prostate-specific Antigen Density as a Proxy for Predicting Prostate Cancer Severity: Is There Any Difference between Systematic and Targeted Biopsy?
Published in Saudi journal of medicine and medical sciences (01-10-2023)“…Background: Prostate cancer screening with prostate-specific antigen (PSA) can result in unnecessary biopsies and overdiagnosis. Alternately, PSA density…”
Get full text
Journal Article -
12
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security
Published in Sensors (Basel, Switzerland) (15-07-2019)“…The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their…”
Get full text
Journal Article -
13
An ANN based bidding strategy for resource allocation in cloud computing using IoT double auction algorithm
Published in Sustainable energy technologies and assessments (01-08-2022)“…In the cloud computing, a double auction is extensively used for resource trading. Different clients and cloud service providers offer multiple bids for…”
Get full text
Journal Article -
14
Cost-based Energy Efficient Scheduling Technique for Dynamic Voltage and Frequency Scaling System in cloud computing
Published in Sustainable energy technologies and assessments (01-06-2021)“…•A green cloud computing algorithm named “Cost-based Energy Efficient Scheduling Technique for DVFS Systems (CEEST)” is proposed.•The goal of algorithm is…”
Get full text
Journal Article -
15
Toward an optimal solution against Denial of Service attacks in Software Defined Networks
Published in Future generation computer systems (01-03-2019)“…Software Defined Networking (SDN) separates the control logic from data forwarding and shifts the whole decision power to the controller, making the switch a…”
Get full text
Journal Article -
16
The integration of heterogeneous resources in the CMS Submission Infrastructure for the LHC Run 3 and beyond
Published in EPJ Web of conferences (01-01-2024)“…While the computing landscape supporting LHC experiments is currently dominated by x86 processors at WLCG sites, this configuration will evolve in the coming…”
Get full text
Journal Article Conference Proceeding -
17
Adoption of a token-based authentication model for the CMS Submission Infrastructure
Published in EPJ Web of conferences (01-01-2024)“…The CMS Submission Infrastructure (SI) is the main computing resource provisioning system for CMS workloads. A number of HTCondor pools are employed to manage…”
Get full text
Journal Article Conference Proceeding -
18
Repurposing of the Run 2 CMS High Level Trigger Infrastructure as a Cloud Resource for Offline Computing
Published in EPJ Web of conferences (2024)“…The former CMS Run 2 High Level Trigger (HLT) farm is one of the largest contributors to CMS compute resources, providing about 25k job slots for offline…”
Get full text
Journal Article Conference Proceeding -
19
HPC resources for CMS offline computing: An integration and scalability challenge for the Submission Infrastructure
Published in EPJ Web of conferences (01-01-2024)“…The computing resource needs of LHC experiments are expected to continue growing significantly during the Run 3 and into the HL-LHC era. The landscape of…”
Get full text
Journal Article Conference Proceeding -
20
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things
Published in Sensors (Basel, Switzerland) (22-12-2020)“…A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life…”
Get full text
Journal Article