[Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review

A Cheema, M Tariq, A Hafiz, MM Khan… - Security and …, 2022 - Wiley Online Library
The Distributed Denial of Service (DDoS) attack is one of the most critical issues in network
security. These sorts of attacks pose a noteworthy danger to the accessibility of network …

[HTML][HTML] Contention-based traffic priority MAC protocols in wireless body area networks: A thematic review

F Masud, G Abdul-Salaam, M Anwar… - Egyptian Informatics …, 2023 - Elsevier
Abstract Wireless Body Area Networks (WBANs) healthcare application is a group of
heterogeneous-natured Bio-Medical Sensor Nodes (BMSNs) used to sense and monitor a …

A hybrid convolutional neural network model for automatic diabetic retinopathy classification from fundus images

G Ali, A Dastgir, MW Iqbal, M Anwar… - IEEE Journal of …, 2023 - ieeexplore.ieee.org
Objective: Diabetic Retinopathy (DR) is a retinal disease that can cause damage to blood
vessels in the eye, that is the major cause of impaired vision or blindness, if not treated early …

Data mining techniques to analyze the impact of social media on academic performance of high school students

S Amjad, M Younas, M Anwar… - Wireless …, 2022 - Wiley Online Library
The main purpose of educational institutions is to provide quality education to their students.
However, it is difficult to analyze large data manually. Educational data mining is more …

Lyme rashes disease classification using deep feature fusion technique

G Ali, M Anwar, M Nauman, M Faheem… - Skin Research and …, 2023 - Wiley Online Library
Automatic classification of Lyme disease rashes on the skin helps clinicians and
dermatologists' probe and investigate Lyme skin rashes effectively. This paper proposes a …

[Retracted] Transfer Learning Auto‐Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices

U Shafiq, MK Shahzad, M Anwar… - Security and …, 2022 - Wiley Online Library
Machine Learning based anomaly detection ap‐proaches have long training and validation
cycles. With IoT devices rapidly proliferating, training anomaly models on a per device basis …

Smart urban planning: Intelligent cognitive analysis of healthcare data in cloud-based IoT

Z Gong, J Ji, P Tong, ASM Metwally, AK Dutta… - Computers and …, 2023 - Elsevier
In recent years, there has been a growing recognition among competent city developers and
researchers regarding the critical importance of integrating healthcare data analysis into …

[PDF][PDF] Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain.

N Pathak, ST Siddiqui, AK Singha… - … Automation & Soft …, 2023 - academia.edu
The coronavirus, formerly known as COVID-19, has caused massive global disasters. As a
precaution, most governments imposed quarantine periods ranging from months to years …

Web simplification prototype for cognitive disabled users

M Kamran, M Malik, MW Iqbal, M Anwar… - Human Behavior …, 2022 - Wiley Online Library
Information and communication technology (ICT) and World Wide Web (WWW) are
increasingly being used in daily life and becoming important in community, business …

Deepfake tweets detection using deep learning algorithms

H Kirn, M Anwar, A Sadiq, HM Zeeshan… - Engineering …, 2022 - mdpi.com
The simplicity of contact and the significant improvement in records that are easily
accessible through the use of web-based broadcasting methods have made it complicated …