Advantages of using fog in IoT applications

AAA Sen, M Yamin - International Journal of Information Technology, 2021 - Springer
Edge computing (EC) has emerged as an attractive and interesting topic for research. It is an
extension of cloud computing, used for non-centralized computing with various new features …

An innovative method for preserving privacy in Internet of Things

M Yamin, Y Alsaawy, A B. Alkhodre, AA Abi Sen - Sensors, 2019 - mdpi.com
Preservation of privacy of users' personal data has always been a critical issue to deal with.
This issue in the Internet of Things (IoT), which facilitates millions of applications, has …

Detection and tracking contagion using IoT-edge technologies: Confronting COVID-19 pandemic

MU Ashraf, A Hannan, SM Cheema… - 2020 international …, 2020 - ieeexplore.ieee.org
The ongoing pandemic of Corona-Virus (COVID-19) induced by the coming forth category of
SARS-CoV-2, has terrified the worldwide human health. Primarily, COVID-19 challenges …

A comparative study between security and privacy

AA Abi Sen, AM Basahel - 2019 6th International Conference …, 2019 - ieeexplore.ieee.org
New technologies like the Internet of Things (IoT), Smart City (SC), and Big data have
changed the way we look towards life. These technologies created integration between the …

Preserving privacy of smart cities based on the fog computing

AA Abi Sen, FA Eassa, K Jambi - … , Jeddah, Saudi Arabia, November 27–29 …, 2018 - Springer
The Smart city is a modern day technological concept which uses sensors, advanced
communication technologies and data analysis for maximizing operational efficiency of …

PrivyTo: A privacy‐preserving location‐sharing platform

G McKenzie, D Romm, H Zhang… - Transactions in …, 2022 - Wiley Online Library
Concern over the privacy of our personal location is at an all‐time high, yet the desire to
share our lives with friends, family, and the public persists. Current methods and …

Double cache approach with wireless technology for preserving user privacy

AAA Sen, FB Eassa, M Yamin… - … and Mobile Computing, 2018 - Wiley Online Library
Several methods use cache for decreasing the number of connections to protect privacy of
user data and improve performance in Location Based Services (LBS). Many of these …

[PDF][PDF] A survey: agent-based software technology under the eyes of cyber security, security controls, attacks and challenges

B Alluhaybi, MS Alrahhal, A Alzhrani… - … Journal of Advanced …, 2019 - researchgate.net
Recently, agent-based software technology has received wide attention by the research
community due to its valuable benefits, such as reducing the load on networks and providing …

Enhanced artificial intelligence system for diagnosing and predicting breast cancer using deep learning

M Alfifi, MS Alrahhal, S Bataineh, M Mezher - 2020 - philpapers.org
Breast cancer is the leading cause of death among women with cancer. Computer-aided
diagnosis is an efficient method for assisting medical experts in early diagnosis, improving …

Enhanced-blind approach for privacy protection of IoT

AA Abi Sen, FA Eassa, K Jambi… - … on Computing for …, 2020 - ieeexplore.ieee.org
The Internet of Thing (IoT) refers to a vast number of things (eg, sensors) that are connected
to the internet to share data such as in smart cities, intelligent transportation, and healthcare …