IoT smart health security threats

SA Butt, JL Diaz-Martinez, T Jamal, A Ali… - … science and its …, 2019 - ieeexplore.ieee.org
The Internet of things (IoT) is an active area in the current research community due to the
improvement in mobile computing and wireless networks. Currently, the IoT is involved in …

[PDF][PDF] Challenges in wireless body area network

M Asam, T Jamal, M Adeel, A Hassan… - … Journal of Advanced …, 2019 - researchgate.net
Wireless Body Area Network (WBAN) refers to a short-range, wireless communications in
the vicinity of, or inside a human body. WBAN is emerging solution to cater the needs of …

A multivariant secure framework for smart mobile health application

SA Butt, T Jamal, MA Azad, A Ali… - Transactions on …, 2022 - Wiley Online Library
Wireless sensor network enables remote connectivity of technological devices such as smart
mobile with the internet. Due to its low cost as well as easy availability of data sharing and …

Federated learning for online resource allocation in mobile edge computing: A deep reinforcement learning approach

J Zheng, K Li, N Mhaisen, W Ni… - 2023 IEEE Wireless …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is increasingly considered to circumvent the disclosure of private
data in mobile edge computing (MEC) systems. Training with large data can enhance FL …

Denial of service attack in cooperative networks

T Jamal, Z Haider, SA Butt, A Chohan - arXiv preprint arXiv:1810.11070, 2018 - arxiv.org
In Denial of Service (DoS) attack the network resources are either delayed or refused to be
assigned to the requested user [1]. This may occurs due to verity of reasons, could be …

[HTML][HTML] Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains

P Zanna, P Radcliffe, D Kumar - Sensors, 2022 - mdpi.com
Impersonation-based attacks on wireless networks are easy to perform and can significantly
impact network security. Their detection is problematic due to the attacks utilizing legitimate …

Киберзащита автоматизированных систем воинских формирований

АА Бойко - 2021 - elibrary.ru
Монография посвящена защите автоматизированных систем разведки, связи и
управления войсками (силами) и оружием (боевыми средствами), применяемых в …

Analysis of interference in wireless networks

Z Haider, M Saleem, T Jamal - arXiv preprint arXiv:1810.13164, 2018 - arxiv.org
As wireless systems grow rapidly worldwide, one of the most important things, wireless
systems designers and service providers faces is interference. Interference decreases …

Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication

A Amoordon - 2022 - theses.hal.science
Les réseaux sans-fil sont de plus en plus utilisés. La popularité de ces réseaux est due au
fait que ces réseaux permettent de créer, modifier et étendre facilement un réseau …

Distributed Denial of Service Attack in Networks

A Silva - 2020 - eprints.rclis.org
In communications the area of coverage is very important, such that personal space or long
range to send information. The distance refers to class of networks such as per-sonal range …