FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm

MA Sarwar, M Hussain, MU Anwar… - Proceedings of the 3rd …, 2019 - dl.acm.org
Software-defined networks have introduced innovative changes in communication networks
by separating and centralizing control plane from the data forwarding plane, making the …

A conditioned reflex action embedded associative context learning‐based energy efficient paradigm in smart city milieu

M Hussain, A Bilal, M Faheem… - IET Wireless Sensor …, 2023 - Wiley Online Library
An intelligent video surveillance system is crucial to enhance public safety, crime prevention,
traffic, and crowd management in a smart city milieu. Situational awareness is an essential …

Increasing base-station anonymity through illusive void formation

M Boulaiche, M Younis - International Journal of …, 2020 - inderscienceonline.com
A wireless sensor network consists of a set of nodes connected by wireless links. These
nodes probe their surroundings and send their data over multi-hop routes to a base-station …

CMTN-SP: A novel coverage-control algorithm for moving-target nodes based on sensing probability model in sensor networks

Z Sun, X Xing, B Yan, Z Lv - Sensors, 2019 - mdpi.com
The non-consecutive coverage problem for the target nodes in Sensor Networks could lead
to the coverage blind area and a large amount of redundant data, which causes the …

Machine Learning Based Improved Customer Churn Prediction Model for Telecommunications Industry

A Shahid, M Hussain, A Iqbal - 2023 18th International …, 2023 - ieeexplore.ieee.org
The Prediction of customer churn plays significant importance within the telecommunications
sector because of its immediate impact on the company's income stream. Nevertheless, the …

A multi-illusive voids approach for increasing base station anonymity

M Boulaiche, M Younis - Cluster Computing, 2023 - Springer
In wireless sensor networks (WSNs), the base station plays a major role in processing and
transmitting collected data to the command centers. Given its critical role, it is considered as …

D3cyt: Deceptive camouflaging for cyber threat detection and deterrence

K Das, E Gethner, E Dincelli, JH Jafarian - Advances in Information and …, 2021 - Springer
Even the most secure cyber systems could be compromised, and their data could be stolen.
Once the data is stolen, even if it is encrypted or hashed, the attackers can conduct offline …

SDN-Enabled Context-Aware IoT Framework for Energy and Resource Management in Smart Buildings

A Fareed, M Hussain, H Zafar, A Iqbal… - … Conference on IT …, 2023 - ieeexplore.ieee.org
Smart buildings have been getting a lot of interest because of their potential to improve
energy efficiency and maximize resource usage. Incorporating software-defined networks …

Natural Language Processing for Diagnosis and Risk Assessment of Cardiovascular Disease

M Arqam, M Hussain, H Zafar, A Iqbal… - … Conference on IT and …, 2023 - ieeexplore.ieee.org
Even with better tools for diagnosis and prevention, heart disease continues to be a major
killer. Diagnosis and prevention of heart disease require detection and awareness of risk …

Blockchain-based Health Insurance Model Using IPFS: A Solution for Improved Optimization, Trustability, and User Control

S Zahid, M Hussain, RH Ahmed… - … Conference on IT …, 2023 - ieeexplore.ieee.org
Concerns about privacy and security of data have increased alongside the digitization of
healthcare services. Blockchain technology Due to its decentralized and unchangeable …