Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles

A Rehman Javed, Z Jalil… - Transactions on …, 2022 - Wiley Online Library
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled
connected vehicles to work together to accomplish complex jobs that they are unable to …

SBAC: A secure blockchain-based access control framework for information-centric networking

Q Lyu, Y Qi, X Zhang, H Liu, Q Wang… - Journal of Network and …, 2020 - Elsevier
The information-centric networking (ICN) has been proposed to meet the increasing demand
for efficient content delivery. However, the in-network caching mechanism of ICN makes it …

{UCBlocker}: Unwanted call blocking using anonymous authentication

C Du, H Yu, Y Xiao, YT Hou, AD Keromytis… - 32nd USENIX Security …, 2023 - usenix.org
Telephone users are receiving more and more unwanted calls including spam and scam
calls because of the transfer-without-verification nature of global telephone networks, which …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

Reputable–a decentralized reputation system for blockchain-based ecosystems

J Arshad, MA Azad, A Prince, J Ali… - IEEE Access, 2022 - ieeexplore.ieee.org
Reputation systems are an important means to facilitate trustworthy interactions between on-
and off-chain services and users. However, contemporary reputation systems are typically …

Layer-based privacy and security architecture for cloud data sharing

I Gupta, N Singh, AK Singh - Journal of Communications Software and …, 2019 - hrcak.srce.hr
Sažetak The management of data while maintaining its utility and preservation of security
scheme is a matter of concern for the cloud owner. In order to minimize the overhead at …

TrustVote: Privacy-preserving node ranking in vehicular networks

MA Azad, S Bag, S Parkinson… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Vehicles is the network of connected vehicles and transport infrastructure
units [roadside units (RSUs)], which utilizes emerging wireless systems (4G, 5G, LTE) for the …

MQTT-Auth: A token-based solution to endow MQTT with authentication and authorization capabilities

M Calabretta, R Pecori, M Vecchio… - Journal of Communications …, 2018 - hrcak.srce.hr
Sažetak Security in the Internet of Things is a current hot topic and it may comprise different
aspects such as confidentiality and integrity of personal data, as well as the authentication …

PrivBox: Verifiable decentralized reputation system for online marketplaces

MA Azad, S Bag, F Hao - Future Generation Computer Systems, 2018 - Elsevier
In online marketplaces (e-commerce, cloud marketplaces), potential buyers/consumers do
not have direct access to inspect the quality of products and services offered by retailers and …

Systems and methods for SPIT detection in VoIP: Survey and future directions

MA Azad, R Morla, K Salah - Computers & Security, 2018 - Elsevier
Abstract In recent years, VoIP (Voice over IP) telephony has shown a tremendous increase
in the number of subscribers due to today's affordable telephony rates and flexible use of …