[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

[HTML][HTML] Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey

AR Javed, MA Hassan, F Shahzad, W Ahmed, S Singh… - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) revitalizes the world with tremendous capabilities and potential
to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends …

Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022 - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

[HTML][HTML] Investigating the effect of perceived security, perceived trust, and information quality on mobile payment usage through near-field communication (NFC) in …

MA Almaiah, A Al-Rahmi, F Alturise, L Hassan, A Lutfi… - Electronics, 2022 - mdpi.com
This study aims to investigate the perceptions of near-field communication (NFC) usage for
mobile payments in Saudi Arabia. In order to develop a mathematical framework for the …

Ghostfacenets: Lightweight face recognition model from cheap operations

M Alansari, OA Hay, S Javed, A Shoufan, Y Zweiri… - IEEE …, 2023 - ieeexplore.ieee.org
The development of deep learning-based biometric models that can be deployed on devices
with constrained memory and computational resources has proven to be a significant …

Review of strategic alignment: Accounting and cybersecurity for data confidentiality and financial security

TO Abrahams, SK Ewuga, S Kaggwa… - World Journal of …, 2023 - wjarr.com
In the contemporary landscape of rapidly evolving technological advancements and the
increasing prevalence of cyber threats, organizations face a critical imperative to align their …

Feature engineering and deep learning-based intrusion detection framework for securing edge IoT

M Nasir, AR Javed, MA Tariq, M Asim… - The Journal of …, 2022 - Springer
Devices belonging to the realm of edge Internet of Things (IoT) are becoming highly
susceptible to intrusion attacks. The large-scale development in edge IoT, ease of …

[HTML][HTML] Investigating the role of perceived risk, perceived security and perceived trust on smart m-banking application using SEM

MA Almaiah, S Al-Otaibi, R Shishakly, L Hassan, A Lutfi… - Sustainability, 2023 - mdpi.com
Effective security support remains a challenge, even for mobile banking applications; this is
leading to the loss of many customers due to limited protection of customer data and privacy …

Circumventing Google Play vetting policies: A stealthy cyberattack that uses incremental updates to breach privacy

Z Muhammad, F Amjad, Z Iqbal, AR Javed… - Journal of Ambient …, 2023 - Springer
Today digital technologies are evolving to accommodate small businesses and young
entrepreneurs by reducing their time-to-market while encouraging rapid innovation in …