2024
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol.
IEEE Internet Things J., December, 2024
Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures.
IEEE Consumer Electron. Mag., March, 2024
Learning a deep-feature clustering model for gait-based individual identification.
Comput. Secur., January, 2024
A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights.
Comput. Sci. Rev., 2024
Text Classification: A Review, Empirical, and Experimental Evaluation.
CoRR, 2024
A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning.
CoRR, 2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024
Advanced Machine Learning Based Malware Detection Systems.
IEEE Access, 2024
Multimodal Biometric Authentication Systems: Exploring Iris and EEG Data.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Examining the Security Landscape of Mobile Payment Systems.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024
2023
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments.
Comput. Secur., December, 2023
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023
Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0.
Int. J. Intell. Syst., 2023
Explainable Label-flipping Attacks on Human Emotion Assessment System.
CoRR, 2023
Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth.
Proceedings of the IEEE Global Communications Conference, 2023
2022
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System.
Sensors, 2022
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Sensors, 2022
Fog-based distributed trust and reputation management system for internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022
New data poison attacks on machine learning classifiers for mobile exfiltration.
CoRR, 2022
On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning.
CoRR, 2022
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey.
CoRR, 2022
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.
IEEE Access, 2022
Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices.
IEEE Access, 2022
Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues.
IEEE Access, 2022
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment.
Proceedings of the Information Security Practice and Experience, 2022
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
2021
Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach.
IEEE Trans. Sustain. Comput., 2021
Trusting Testcases Using Blockchain-Based Repository Approach.
Symmetry, 2021
Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues.
CoRR, 2021
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things.
Ad Hoc Networks, 2021
A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE.
IEEE Access, 2021
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
2020
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020
Correction to: Deep user identification model with multiple biometric data.
BMC Bioinform., 2020
Deep user identification model with multiple biometric data.
BMC Bioinform., 2020
IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction.
IEEE Access, 2020
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure.
IEEE Access, 2020
A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology.
IEEE Access, 2020
Digital Forensic Analysis of Files Using Deep Learning.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020
An Emerging Security Framework for Connected Autonomous Vehicles.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020
Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
2019
A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019
Deep User Identification Model with Multiple Biometrics.
CoRR, 2019
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
CoRR, 2019
An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms.
IEEE Access, 2019
A Machine Learning Framework for Biometric Authentication Using Electrocardiogram.
IEEE Access, 2019
An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning.
IEEE Access, 2019
New Two-Level µTESLA Protocol for IoT Environments.
Proceedings of the 2019 IEEE World Congress on Services, 2019
2018
A new adaptive trust and reputation model for Mobile Agent Systems.
J. Netw. Comput. Appl., 2018
IoT Applications: From Mobile Agents to Microservices Architecture.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Secure Autonomous Mobile Agents for Web Services.
Proceedings of the IEEE Global Communications Conference, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018
2017
Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems.
Wirel. Pers. Commun., 2017
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017
Pay-with-a-Selfie, a human-centred digital payment system.
CoRR, 2017
New secure healthcare system using cloud of things.
Clust. Comput., 2017
Secure lightweight ECC-based protocol for multi-agent IoT systems.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Security enhancements to TLS for improved national control.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Monitoring darknet activities by using network telescope.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Performance comparison between container-based and VM-based services.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
A novel secure conference communication in IoT devices based on memristors.
Proceedings of the 24th IEEE International Conference on Electronics, Circuits and Systems, 2017
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency.
Proceedings of the Emerging Technologies for Developing Countries, 2017
2016
Novel microscale memristor with uniqueness property for securing communications.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016
The evolution of distributed systems towards microservices architecture.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
Novel Performance Analysis of Multi-Access MIMO Relay Cooperative RM-DCSK over Nakagami-m Fading Subject to AWGGN.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Recent Advances in VANET Security: A Survey.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Emerging new trends of location based systems security.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Recent advances of smart glass application security and privacy.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Security and privacy framework for ubiquitous healthcare IoT devices.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
Lightweight secure storage model with fault-tolerance in cloud environment.
Electron. Commer. Res., 2014
2013
A Novel Security Scheme for the Smart Grid and SCADA Networks.
Wirel. Pers. Commun., 2013
Securing E-Seal real time tracking system for Internet of Things.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Secure Framework for the Return Routability Procedure in MIPv6.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput., 2012
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks.
Math. Comput. Model., 2012
A new lightweight hybrid cryptographic algorithm for the internet of things.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Data integration of electronic health records using artificial neural networks.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Smart authentication for real-time business process monitoring.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Security Framework for RFID-based Applications in Smart Home Environment.
J. Inf. Process. Syst., 2011
Ensuring Anonymity for LBSs in Smartphone Environment.
J. Inf. Process. Syst., 2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
The use of Boolean functions in stream ciphers.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
A unified countermeasure against side channel attacks on cryptographic RFID.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Survey on certificateless public key cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Study on Secret Sharing Schemes (SSS) and their applications.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Understanding the security challenges of virtualized environments.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Formal modeling and verification of DLK protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Survey on computationally hard problems and their applications to cryptography.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings.
Comput. Electr. Eng., 2010
Enhancement of anonymous authentication scheme in wireless sensor network.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Reconsidering Ryu-Takagi RFID authentication protocol.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
New authentication protocol for IP CAS of IPTV.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
Practical Implementations for Securing VoIP Enabled Mobile Devices.
Proceedings of the Third International Conference on Network and System Security, 2009
RFID lightweight mutual authentication using shrinking generator.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
Secure authenticated group key agreement protocol in the MANET environment.
Inf. Secur. Tech. Rep., 2008
New mutual agreement protocol to secure mobile RFID-enabled devices.
Inf. Secur. Tech. Rep., 2008
2005
Supporting User Privacy in Location Based Services.
IEICE Trans. Commun., 2005
2004
A secure and privacy enhanced protocol for location-based services in ubiquitous society.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Flexible Delegation Security for Improved Distribution in Ubiquitous Environments.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2000
Design, analysis and applications of cryptographic techniques.
PhD thesis, 2000
1999
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.
Proceedings of the Cryptography and Coding, 1999
1998
Fixing a Problem in the Helsinki Protocol.
ACM SIGOPS Oper. Syst. Rev., 1998