A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations

MK Hasan, A Alkhalifah, S Islam… - Wireless …, 2022 - Wiley Online Library
The smart grid idea was implemented as a modern interpretation of the traditional power
grid to find out the most efficient way to combine renewable energy and storage …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Internet of vehicle's resource management in 5G networks using AI technologies: Current status and trends

NM Elfatih, MK Hasan, Z Kamal, D Gupta… - IET …, 2022 - Wiley Online Library
Abstract The Internet of Vehicles (IoV) and Vehicle‐to‐Everything (V2X) concept have
emerged from IoT technology, which refers to connecting many vehicles with various …

Collaborative learning assessment via information and communication technology

A Khan, MK Hasana, TM Ghazal, S Islam… - … on Computing and …, 2022 - ieeexplore.ieee.org
In technological revolution, Information technology has changed the face on how Education
is experienced and perceived. Learning is quickly becoming an imperative. ICT have great …

Secured mobile IOT ecosystem using enhanced multi-level intelligent trust scheme

R Sharma, R Arya - Computers and Electrical Engineering, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a collection of heterogeneous, interconnected mobile
ad-hoc networks (MANETs) devices. High-level security is always required to protect …

An energy-efficient data aggregation clustering algorithm for wireless sensor Networks using hybrid PSO

S Sharmin, I Ahmedy, R Md Noor - Energies, 2023 - mdpi.com
Extending the lifetime of wireless sensor networks (WSNs) and minimizing energy costs are
the two most significant concerns for data transmission. Sensor nodes are powered by their …

Predicting the future popularity of academic publications using deep learning by considering it as temporal citation networks

K Abbas, MK Hasan, A Abbasi, UA Mokhtar… - IEEE …, 2023 - ieeexplore.ieee.org
One of the key goals of Informetrics is to identify citation-based popular articles among so
many other aspects, such as determining popular research topics, identifying influential …

Adaptive secure malware efficient machine learning algorithm for healthcare data

MA Mohammed, A Lakhan, DA Zebari… - CAAI Transactions …, 2023 - Wiley Online Library
Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes,
preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom …

[HTML][HTML] MQTT based secure transport layer communication for mutual authentication in IoT network

V Shilpa, A Vidya, S Pattar - Global Transitions Proceedings, 2022 - Elsevier
Recent advancements in the communication protocols and the networking technologies
have enabled connectivity of a wide range of objects, resulting in the Internet of Things (IoT) …