78 results

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning

Journal Article
Ghaleb, F. A., Alsaedi, M., Saeed, F., Ahmad, J., & Alasli, M. (2022)
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors, 22(9), Article 3373. https://doi.org/10.3390/s22093373
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications ...

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform

Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022)
Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/rs14091984
There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static...

Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques

Journal Article
Khurshid, A., Mughal, M. A., Othman, A., Al-Hadhrami, T., Kumar, H., Khurshid, I., …Ahmad, J. (2022)
Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques. Electronics, 11(8), Article 1290. https://doi.org/10.3390/electronics11081290
With the advent of high-speed and parallel computing, the applicability of computational optimization in engineering problems has increased, with greater validation than conve...

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022)
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/2022/7047282
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain...

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map

Journal Article
Masood, F., Boulila, W., Alsaeedi, A., Khan, J. S., Ahmad, J., Khan, M. A., & Rehman, S. U. (2022)
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimedia Tools and Applications, 81, 30931-30959. https://doi.org/10.1007/s11042-022-12844-w
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. Benefiting from inherent properties such as ergodicity and key-sensitivity;...

A federated learning framework for cyberattack detection in vehicular sensor networks

Journal Article
Driss, M., Almomani, I., e Huma, Z., & Ahmad, J. (2022)
A federated learning framework for cyberattack detection in vehicular sensor networks. Complex and Intelligent Systems, 8(5), 4221-4235. https://doi.org/10.1007/s40747-022-00705-w
Vehicular Sensor Networks (VSN) introduced a new paradigm for modern transportation systems by improving traffic management and comfort. However, the increasing adoption of sm...

A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique

Journal Article
Khan, M. A., Ahmed, F., Khan, M. D., Ahmad, J., Kumar, H., & Pitropakis, N. (2022)
A Smart and Robust Automatic Inspection of Printed Labels Using an Image Hashing Technique. Electronics, 11(6), Article 955. https://doi.org/10.3390/electronics11060955
This work is focused on the development of a smart and automatic inspection system for printed labels. This is a challenging problem to solve since the collected labels are ty...

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., …Al Dubai, A. (2022)
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking ...

Evolution towards Smart and Software-Defined Internet of Things

Journal Article
Abid, M. A., Afaqui, N., Khan, M. A., Akhtar, M. W., Malik, A. W., Munir, A., …Shabir, B. (2022)
Evolution towards Smart and Software-Defined Internet of Things. AI, 3(1), 100-123. https://doi.org/10.3390/ai3010007
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for h...

Detecting Alzheimer’s Disease Using Machine Learning Methods

Conference Proceeding
Dashtipour, K., Taylor, W., Ansari, S., Zahid, A., Gogate, M., Ahmad, J., …Abbasi, Q. (2022)
Detecting Alzheimer’s Disease Using Machine Learning Methods. In Body Area Networks. Smart IoT and Big Data for Intelligent Health Management 16th EAI International Conference, BODYNETS 2021, Virtual Event, October 25-26, 2021, Proceedings. https://doi.org/10.1007/978-3-030-95593-9_8
As the world is experiencing population growth, the portion of the older people, aged 65 and above, is also growing at a faster rate. As a result, the dementia with Alzheimer’...