Search Results - "Zaman, Marzia"

Refine Results
  1. 1

    Distributed Ledger Technologies and Their Applications: A Review by Soltani, Reza, Zaman, Marzia, Joshi, Rohit, Sampalli, Srinivas

    Published in Applied sciences (01-08-2022)
    “…With the success of Bitcoin and the introduction of different uses of Blockchain, such as smart contracts in Ethereum, many researchers and industries have…”
    Get full text
    Journal Article
  2. 2

    Towards Developing a Robust Intrusion Detection Model Using Hadoop–Spark and Data Augmentation for IoT Networks by Manzano Sanchez, Ricardo Alejandro, Zaman, Marzia, Goel, Nishith, Naik, Kshirasagar, Joshi, Rohit

    Published in Sensors (Basel, Switzerland) (01-10-2022)
    “…In recent years, anomaly detection and machine learning for intrusion detection systems have been used to detect anomalies on Internet of Things networks…”
    Get full text
    Journal Article
  3. 3

    Investigating the Avalanche effect of Various Cryptographically Secure Hash Functions and Hash-based Applications by Upadhyay, Darshana, Gaikwad, Nupur, Zaman, Marzia, Sampalli, Srinivas

    Published in IEEE access (2022)
    “…In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of…”
    Get full text
    Journal Article
  4. 4

    Markov Prediction Model for Host Load Detection and VM Placement in Live Migration by Melhem, Suhib Bani, Agarwal, Anjali, Goel, Nishith, Zaman, Marzia

    Published in IEEE access (01-01-2018)
    “…The design of good host overload/underload detection and virtual machine (VM) placement algorithms plays a vital role in assuring the smoothness of VM live…”
    Get full text
    Journal Article
  5. 5

    A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks by Ghosh, Sagarika, Zaman, Marzia, Plourde, Bernard, Sampalli, Srinivas

    Published in Symmetry (Basel) (01-08-2022)
    “…Supervisory Control and Data Acquisition (SCADA) systems are ubiquitous in industrial control processes, such as power grids, water supply systems, traffic…”
    Get full text
    Journal Article
  6. 6

    Using IOTA Tangle and Machine Learning for a Defensive Model-Based Approach Against Replication Attacks on Wireless Sensor Networks by Soltani, Reza, Zaman, Marzia, Upadhyay, Darshana, Jain, Achin, Sampalli, Srinivas

    Published in IEEE access (2024)
    “…Wireless Sensor Networks (WSNs) are essential for data collection across various domains but face growing risks from replication attacks, which introduce new…”
    Get full text
    Journal Article
  7. 7

    Validation of a Machine Learning-based IDS Design Framework using ORNL Datasets for Power System with SCADA by Zaman, Marzia, Upadhyay, Darshana, Lung, Chung-Horng

    Published in IEEE access (01-01-2023)
    “…Supervisory Control and Data Acquisition (SCADA) systems are widely used for remote monitoring and control of industrial processes, such as oil and gas…”
    Get full text
    Journal Article
  8. 8

    Knowledge Graph Generation and Application for Unstructured Data Using Data Processing Pipeline by Thushara Sukumar, Sushmi, Lung, Chung-Horng, Zaman, Marzia, Panday, Ritesh

    Published in IEEE access (2024)
    “…With the rapid advancement of technology and the vast volume of unstructured data available on the Internet, there is a pressing need to extract information…”
    Get full text
    Journal Article
  9. 9

    An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme by Ghosh, Sagarika, Zaman, Marzia, Sakauye, Gary, Sampalli, Srinivas

    Published in Applied sciences (01-01-2021)
    “…The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas…”
    Get full text
    Journal Article
  10. 10

    Dynamic K-Means Clustering of Workload and Cloud Resource Configuration for Cloud Elastic Model by Daradkeh, Tariq, Agarwal, Anjali, Zaman, Marzia, Goel, Nishith

    Published in IEEE access (2020)
    “…Cloud elasticity involves timely provisioning and de-provisioning of computing resources and adjusting resources size to meet the dynamic workload demand. This…”
    Get full text
    Journal Article
  11. 11

    Undergraduate Student’s Stress, Anxiety, Depression, and their Coping styles during COVID-19 by Kabir, Rubayat, Sultana, Marzia Zaman, Sanaul Haque Mondal, Md, Kabir, Ishrak

    Published in Mental health (Ciampino) (01-01-2023)
    “…: COVID-19 was responsible for widespread disturbance throughout the educational system and was harmful in a variety of ways. In particular with regard to the…”
    Get full text
    Journal Article
  12. 12

    Characterization and Detection of Tail Energy Bugs in Smartphones by Abbasi, Abdul Muqtadir, Al-Tekreeti, Mustafa, Naik, Kshirasagar, Nayak, Amiya, Srivastava, Pradeep, Zaman, Marzia

    Published in IEEE access (2018)
    “…Smartphones are the most ubiquitous and popular hand-held devices because of their rich set of features and wide variety of services that require frequent…”
    Get full text
    Journal Article
  13. 13

    Applications of clustering techniques to software partitioning, recovery and restructuring by Lung, Chung-Horng, Zaman, Marzia, Nandi, Amit

    Published in The Journal of systems and software (01-10-2004)
    “…The artifacts constituting a software system are sometimes unnecessarily coupled with one another or may drift over time. As a result, support of software…”
    Get full text
    Journal Article
  14. 14

    Characterizing Nanoparticle Size by Dynamic Light Scattering Technique (DLS) by Zaman, Marzia

    Published 01-01-2014
    “…The Dynamic Light Scattering Technique was used to determine the size, shape and diffusion coefficient of nanoparticle. The intensity auto correlation…”
    Get full text
    Dissertation
  15. 15

    Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids by Upadhyay, Darshana, Manero, Jaume, Zaman, Marzia, Sampalli, Srinivas

    “…Smart grids rely on SCADA (Supervisory Control and Data Acquisition) systems to monitor and control complex electrical networks in order to provide reliable…”
    Get full text
    Journal Article
  16. 16

    Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm by Upadhyay, Darshana, Manero, Jaume, Zaman, Marzia, Sampalli, Srinivas

    “…We propose an integrated framework for an intrusion detection system for SCADA (Supervisory Control and Data Acquisition)-based power grids. Our scheme…”
    Get full text
    Journal Article
  17. 17

    Multi-Phase Quantum Resistant Framework for Secure Communication in SCADA Systems by Ghosh, Sagarika, Zaman, Marzia, Joshi, Rohit, Sampalli, Srinivas

    “…Supervisory Control and Data Acquisition (SCADA) systems are vulnerable to traditional cyber-attacks, such as man-in-the-middle, denial of service,…”
    Get full text
    Journal Article
  18. 18

    An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems by Upadhyay, Darshana, Zaman, Marzia, Joshi, Rohit, Sampalli, Srinivas

    “…Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial control systems. Industrial organizations perform operations remotely…”
    Get full text
    Journal Article
  19. 19

    Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator by Upadhyay, Darshana, Ghosh, Sagarika, Ohno, Hiroyuki, Zaman, Marzia, Sampalli, Srinivas

    “…This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems…”
    Get full text
    Journal Article
  20. 20

    Evaluation of machine learning techniques for network intrusion detection by Zaman, Marzia, Lung, Chung-Horng

    “…Network traffic anomaly may indicate a possible intrusion in the network and therefore anomaly detection is important to detect and prevent the security…”
    Get full text
    Conference Proceeding