Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey

AR Javed, MA Hassan, F Shahzad, W Ahmed, S Singh… - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) revitalizes the world with tremendous capabilities and potential
to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends …

CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment

ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu… - Sensors, 2023 - mdpi.com
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new
capabilities to different industries. The number of IoT solutions in areas such as …

Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022 - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

A comprehensive survey of AI-enabled phishing attacks detection techniques

A Basit, M Zafar, X Liu, AR Javed, Z Jalil… - Telecommunication …, 2021 - Springer
In recent times, a phishing attack has become one of the most prominent attacks faced by
internet users, governments, and service-providing organizations. In a phishing attack, the …

A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

Security and privacy of UAV data using blockchain technology

R Ch, G Srivastava, TR Gadekallu… - Journal of Information …, 2020 - Elsevier
The utility of virtual circuit (VC) based devices-UAVs, Drones, and similar other IoT based
devices have gained immense momentum in the present day and age. These devices are …

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

SI Imtiaz, S ur Rehman, AR Javed, Z Jalil, X Liu… - Future Generation …, 2021 - Elsevier
Android smartphones are being utilized by a vast majority of users for everyday planning,
data exchanges, correspondences, social interaction, business execution, bank …

Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects

M Sadaf, Z Iqbal, AR Javed, I Saba, M Krichen… - Technologies, 2023 - mdpi.com
Autonomous vehicles (AV) are game-changing innovations that promise a safer, more
convenient, and environmentally friendly mode of transportation than traditional vehicles …

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

S Ur Rehman, M Khaliq, SI Imtiaz, A Rasool… - Future Generation …, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …