The rise of blockchain internet of things (biot): Secured, device-to-device architecture and simulation scenarios

A Rana, S Sharma, K Nisar, AAA Ibrahim, S Dhawan… - Applied Sciences, 2022 - mdpi.com
Most Internet of Things (IoT) resources are exposed to security risks due to their essential
functionality. IoT devices, such as smartphones and tablets, have a limited network …

Anomaly detection using deep neural network for IoT architecture

Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan… - Applied Sciences, 2021 - mdpi.com
The revolutionary idea of the internet of things (IoT) architecture has gained enormous
popularity over the last decade, resulting in an exponential growth in the IoT networks …

[PDF][PDF] Comparative research directions of population initialization techniques using PSO algorithm

S Pervaiz, WH Bangyal, A Ashraf, K Nisar… - … Automation & Soft …, 2022 - academia.edu
In existing meta-heuristic algorithms, population initialization forms a huge part towards
problem optimization. These calculations can impact variety and combination to locate a …

[PDF][PDF] New Modified Controlled Bat Algorithm for Numerical Optimization Problem.

WH Bangyal, A Hameed, J Ahmad, K Nisar… - … , Materials & Continua, 2022 - academia.edu
Bat algorithm (BA) is an eminent meta-heuristic algorithm that has been widely used to solve
diverse kinds of optimization problems. BA leverages the echolocation feature of bats …

IoT technology enabled heuristic model with Morlet wavelet neural network for numerical treatment of heterogeneous mosquito release ecosystem

Z Sabir, K Nisar, MAZ Raja, MR Haque, M Umar… - IEEE …, 2021 - ieeexplore.ieee.org
The utmost advancements of artificial neural networks (ANNs), software-defined networks
(SDNs) and internet of things (IoT) technologies find beneficial in different applications of the …

[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.

RM Saqib, AS Khan, Y Javed, S Ahmad… - … Automation & Soft …, 2022 - academia.edu
This study presents the current state of research on multi-factor authentication.
Authentication is one of the important traits in the security domain as it ensures that …

Automated controller placement for software-defined networks to resist DDoS attacks

MR Haque, SC Tan, Z Yusoff, K Nisar… - … , Materials & Continua, 2021 - dr.ntu.edu.sg
In software-defined networks (SDNs), controller placement is a critical factor in the design
and planning for the future Internet of Things (IoT), telecommunication, and satellite …

[PDF][PDF] PSO Based Multi-Objective Approach for Controlling PID Controller.

H Goud, PC Sharma, K Nisar… - … Materials & Continua, 2022 - cdn.techscience.cn
CSTR (Continuous stirred tank reactor) is employed in process control and chemical
industries to improve response characteristics and system efficiency. It has a highly …

A novel DDoS attack-aware smart backup controller placement in SDN design

MR Haque, SC Tan, Z Yusoff, K Nisar… - Annals of Emerging …, 2020 - papers.ssrn.com
Abstract Security issues like Distributed Denial of Service (DDoS) attacks are becoming the
main threat for Software-Defined Networking (SDN). Controller placement is a fundamental …

[PDF][PDF] Metaheuristics algorithm for tuning of PID controller of mobile robot system

H Goud, PC Sharma, K Nisar, MR Haque… - … Materials & Continua, 2022 - cdn.techscience.cn
Robots in the medical industry are becoming more common in daily life because of various
advantages such as quick response, less human interference, high dependability, improved …