A comprehensive review on the users' identity privacy for 5G networks

MM Saeed, MK Hasan, AJ Obaid, RA Saeed… - IET …, 2022 - Wiley Online Library
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …

Internet of Things‐Based Smart Electricity Monitoring and Control System Using Usage Data

MK Hasan, MM Ahmed, B Pandey… - Wireless …, 2021 - Wiley Online Library
In everyday life, electricity is necessary, and proper use is critical. To strengthen home
electricity control, the existing systems have been examined over the years. However, the …

Composite reliability impacts of synchrophasor-based DTR and SIPS cyber–physical systems

B Jimada-Ojuolape, J Teh - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The integration of smart infrastructures that facilitate two-way communication via information
and communication technology (ICT) has enhanced the efficiency and sustainability of the …

A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges

AHA AL-Jumaili, YIA Mashhadany, R Sulaiman… - Applied Sciences, 2021 - mdpi.com
This review describes a cloud-based intelligent power management system that uses
analytics as a control signal and processes balance achievement pointer, and describes …

[HTML][HTML] An optimized link state routing protocol for real-time application over vehicular ad-hoc network

MEM Dafalla, RA Mokhtar, RA Saeed… - Alexandria Engineering …, 2022 - Elsevier
Abstract Voice over Internet Protocol (VoIP) provides good services through Vehicular Ad-
hoc Networks (VANET) platform. These networks encounter various challenges to support …

Detect phishing website by fuzzy multi-criteria decision making

RK Shah, MK Hasan, S Islam, A Khan… - … Conference on AI in …, 2022 - ieeexplore.ieee.org
Phishing activity is undertaken by the hackers to compromise the computer networks and
financial system. A compromised computer system or network provides data and or …

Fischer linear discrimination and quadratic discrimination analysis–based data mining technique for internet of things framework for healthcare

TM Ghazal - Frontiers in Public Health, 2021 - research.skylineuniversity.ac.ae
The internet of reality or augmented reality has been considered a breakthrough and an
outstanding critical mutation with an emphasis on data mining leading to dismantling of …

Securing Internet of Things devices against code tampering attacks using Return Oriented Programming

RK Shrivastava, SP Singh, MK Hasan, S Islam… - Computer …, 2022 - Elsevier
Code tampering is serious issue in Internet of Things (IOT). IoT devices are used to collect
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …

Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks

I Memon, MK Hasan, RA Shaikh, J Nebhen, KAA Bakar… - Electronics, 2021 - mdpi.com
Many algorithms use clustering to improve vehicular ad hoc network performance. The
expected points of many of these approaches support multiple rounds of data to the …

The rise of ransomware: A review of attacks, detection techniques, and future challenges

S Kamil, HSAS Norul, A Firdaus… - … on Business Analytics …, 2022 - ieeexplore.ieee.org
Cybersecurity is important in the field of information technology. One most recent pressing
issue is information security. When we think of cybersecurity, the first thing that comes to …