[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022 - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

[HTML][HTML] A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions

AR Javed, Z Jalil, W Zehra, TR Gadekallu… - … Applications of Artificial …, 2021 - Elsevier
With the explosive advancements in smartphone technology, video uploading/downloading
has become a routine part of digital social networking. Video contents contain valuable …

Feature engineering and deep learning-based intrusion detection framework for securing edge IoT

M Nasir, AR Javed, MA Tariq, M Asim… - The Journal of …, 2022 - Springer
Devices belonging to the realm of edge Internet of Things (IoT) are becoming highly
susceptible to intrusion attacks. The large-scale development in edge IoT, ease of …

A novel ensemble machine learning method to detect phishing attack

A Basit, M Zafar, AR Javed, Z Jalil - 2020 IEEE 23rd …, 2020 - ieeexplore.ieee.org
Currently and particularly with remote working scenarios during COVID-19, phishing attack
has become one of the most significant threats faced by internet users, organizations, and …

[HTML][HTML] A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection

MA Hossain, MS Islam - Scientific Reports, 2023 - nature.com
In the age of sophisticated cyber threats, botnet detection remains a crucial yet complex
security challenge. Existing detection systems are continually outmaneuvered by the …

Efficient detection of botnet traffic by features selection and decision trees

J Velasco-Mata, V González-Castro… - IEEE …, 2021 - ieeexplore.ieee.org
Botnets are one of the online threats with the most significant presence, causing billionaire
losses to global economies. Nowadays, the increasing number of devices connected to the …

[HTML][HTML] IoT empowered smart cybersecurity framework for intrusion detection in internet of drones

SN Ashraf, S Manickam, SS Zia, AA Abro, M Obaidat… - Scientific Reports, 2023 - nature.com
The emergence of drone-based innovative cyber security solutions integrated with the
Internet of Things (IoT) has revolutionized navigational technologies with robust data …