[HTML][HTML] Anomaly detection using deep neural network for IoT architecture

Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan… - Applied Sciences, 2021 - mdpi.com
The revolutionary idea of the internet of things (IoT) architecture has gained enormous
popularity over the last decade, resulting in an exponential growth in the IoT networks …

[HTML][HTML] Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

[HTML][HTML] Enhancing the performance of SQL injection attack detection through probabilistic neural networks

FK Alarfaj, NA Khan - Applied Sciences, 2023 - mdpi.com
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to
leak sensitive information, gain unauthorized access, and cause financial loss to individuals …

[PDF][PDF] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.

RM Saqib, AS Khan, Y Javed, S Ahmad… - … Automation & Soft …, 2022 - academia.edu
This study presents the current state of research on multi-factor authentication.
Authentication is one of the important traits in the security domain as it ensures that …

Majority vote-based ensemble approach for distributed denial of service attack detection in cloud computing

AA Alqarni - Journal of Cyber Security and Mobility, 2022 - journals.riverpublishers.com
Cloud computing is considered as technical advancement in information technology. Many
organizations have been motivated by this advancement to outsource their data and …

MNN-XSS: Modular neural network based approach for XSS attack detection

AA Alqarni, N Alsharif, NA Khan, L Georgieva… - 2022 - opal.latrobe.edu.au
The rapid growth and uptake of network-based communication technologies have made
cybersecurity a significant challenge as the number of cyber-attacks is also increasing. A …

[HTML][HTML] Towards a deep learning-based outlier detection approach in the context of streaming data

AF Hassan, S Barakat, A Rezk - Journal of Big Data, 2022 - Springer
Uncommon observations that significantly vary from the norm are referred to as outliers.
Outlier detection, which aims to detect unexpected behavior, is a critical topic that has …

[HTML][HTML] 5G Network: Techniques to Increase Quality of Service and Quality of Experience

NA Khan - International Journal of Computer Networks and …, 2022 - ischolar.sscldl.in
The rapid growth of interconnected networks and devices inevitably causes the rise of traffic
demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and …

[PDF][PDF] Hybrid feature classification approach for malicious javaScript attack detection using deep learning

NA Khan, MY Alzaharani, HA Kar - International Journal of …, 2020 - researchgate.net
With the development and rapid growth in IT infrastructure, malicious code attacks are
considered as the main threat to cybersecurity. Malicious JavaScript's which are intentionally …

[PDF][PDF] NO TEARS 算法在XSS 攻击检测中的应用研究

孙宝丹, 王培超, 周鋆 - 小型微型计算机系统, 2020 - c2-group.github.io
近年来, 利用机器学习技术对跨站脚本攻击(XSS 攻击) 进行检测成为网络安全研究的热点.
由于检测特征多, 样本标注有限, 机器学习模型的精准训练问题一直是一个难题 …