Utilizing the collective wisdom of fintech in the gcc region: A systematic mapping approach

S Khan, HU Khan, S Nazir - Measurement and Control, 2023 - journals.sagepub.com
Globally, with the maturity of information technology, society is now in the information age,
magnifying the significance of integrating innovative applications in different financial and …

Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

SS Mahadik, PM Pawar, R Muthalagu - Multimedia Tools and Applications, 2024 - Springer
The HetIoT is a new emergent technology widely used to offer QoS to applications such as
health monitoring systems, agriculture 4.0, traffic monitoring, industry 4.0, and civil defense …

Highly accurate and reliable wireless network slicing in 5th generation networks: a hybrid deep learning approach

S Khan, S Khan, Y Ali, M Khalid, Z Ullah… - Journal of Network and …, 2022 - Springer
In current era, the next generation networks like 5th generation (5G) and 6th generation (6G)
networks requires high security, low latency with a high reliable standards and capacity. In …

Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks

S Khan, A Hussain, S Nazir, F Khan, A Oad… - Computer …, 2022 - Elsevier
Future generation networks such as millimeter-wave LAN, broadband wireless access
systems, and 5th or 6th generation (5G/6G) networks demand more security, low latency …

Efficient resource management in 6G communication networks using hybrid quantum deep learning model

M Ashwin, AS Alqahtani, A Mubarakali… - Computers and Electrical …, 2023 - Elsevier
The sixth generation (6G) wireless communication network is expected to provide wide-
ranging coverage, short latency, cost effectiveness, lower power consumption, and a high …

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

OBJ Rabie, S Selvarajan, T Hasanin, AM Alshareef… - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …

Deep learning‐based efficient model development for phishing detection using random forest and BLSTM classifiers

S Wang, S Khan, C Xu, S Nazir, A Hafeez - Complexity, 2020 - Wiley Online Library
With the increase in the number of electronic devices and developments in the
communication system, security becomes one of the challenging issues. Users are …

[PDF][PDF] Human emotion recognize using convolutional neural network (CNN) and Mel frequency cepstral coefficient (MFCC)

J Mannar Mannan, L Srinivasan… - Seybold Report …, 2023 - seyboldpublications.com
Developing an application for definitive human emotion state recognition is yet to optimize to
resolve problems in mental health diagnosis. Facial expression together with voice …

Smart object detection and home appliances control system in smart cities

S Khan, S Nazir, HU Khan - 2021 - qspace.qu.edu.qa
During the last decade the emergence of Internet of Things (IoT) based applications inspired
the world by providing state of the art solutions to many common problems. From traffic …

An efficient boosting-based windows malware family classification system using multi-features fusion

Z Chen, X Ren - Applied Sciences, 2023 - mdpi.com
In previous years, cybercriminals have utilized various strategies to evade identification,
including obfuscation, confusion, and polymorphism technology, resulting in an exponential …