A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations

MK Hasan, A Alkhalifah, S Islam… - Wireless …, 2022 - Wiley Online Library
The smart grid idea was implemented as a modern interpretation of the traditional power
grid to find out the most efficient way to combine renewable energy and storage …

The effect of urban innovation performance of smart city construction policies: evaluate by using a multiple period difference-in-differences model

Q Guo, J Zhong - Technological Forecasting and Social Change, 2022 - Elsevier
In the setting of Digital China, the smart city pilot strategy has become a fundamental part of
the intelligent upgrading of the urban development model. Exploring the influence of smart …

Cyber security threats on digital banking

HM Alzoubi, TM Ghazal, MK Hasan… - … Conference on AI in …, 2022 - ieeexplore.ieee.org
Digital banking is the new form of banking that involves using the internet and mobile
applications and excludes the use of pen and paper. One of the main issues that are …

Securing smart cities using blockchain technology

TM Ghazal, MK Hasan, HM Alzoubi… - … Conference on AI in …, 2022 - ieeexplore.ieee.org
Recent years have witnessed substantial advancement in the subject of smart cities. The
purpose of smart city development is to enhance the quality of life for citizens. This was …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

[HTML][HTML] Fischer linear discrimination and quadratic discrimination analysis–based data mining technique for internet of things framework for Healthcare

MK Hasan, TM Ghazal, A Alkhalifah… - Frontiers in Public …, 2021 - frontiersin.org
The internet of reality or augmented reality has been considered a breakthrough and an
outstanding critical mutation with an emphasis on data mining leading to dismantling of …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0

MK Hasan, M Akhtaruzzaman, SR Kabir… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The price gouging or price hike is a worldwide issue, and it is related to inflation. Because of
rising prices, people in various countries cannot afford nutritious food or proper treatment …

COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach

C Dhasarathan, MK Hasan, S Islam, S Abdullah… - Computer …, 2023 - Elsevier
COVID-19 data analysis and prediction from patient data repository collected from hospitals
and health organizations. Users' credentials and personal information are at risk; it could be …