Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing

Z A. Almusaylim, NZ Jhanjhi - Wireless Personal Communications, 2020 - Springer
One of the recent trends of networking and mobile technology is mobile cloud computing
(MCC) that provides rich computational, storage resources and services in clouds to mobile …

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z Jin - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

A load balancing algorithm for the data centres to optimize cloud computing applications

DA Shafiq, NZ Jhanjhi, A Abdullah, MA Alzain - IEEE Access, 2021 - ieeexplore.ieee.org
Despite the many past research conducted in the Cloud Computing field, some challenges
still exist related to workload balancing in cloud-based applications and specifically in the …

Privacy protection and energy optimization for 5G-aided industrial Internet of Things

M Humayun, NZ Jhanjhi, M Alruwaili… - IEEE …, 2020 - ieeexplore.ieee.org
The 5G is expected to revolutionize every sector of life by providing interconnectivity of
everything everywhere at high speed. However, massively interconnected devices and fast …

Towards pattern-based change verification framework for cloud-enabled healthcare component-based

S Ali, Y Hafeez, NZ Jhanjhi, M Humayun, M Imran… - Ieee …, 2020 - ieeexplore.ieee.org
To survive in the competitive environment, most organizations have adopted component-
based software development strategies in the rapid technology advancement era and the …

Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP

Z A. Almusaylim, NZ Jhanjhi, A Alhumam - Sensors, 2020 - mdpi.com
The rapid growth of the Internet of Things (IoT) and the massive propagation of wireless
technologies has revealed recent opportunities for development in various domains of real …

IoT with multimedia investigation: A secure process of digital forensics chain-of-custody using blockchain hyperledger sawtooth

AA Khan, AA Shaikh, AA Laghari - Arabian Journal for Science and …, 2023 - Springer
Abstract Internet of Things (IoT)-enabled wireless surveillance systems are gaining more
attention because of the robust development in information technology. It is due to the …

Real-time security health and privacy monitoring for Saudi highways using cutting-edge technologies

M Humayun, NZ Jhanjhi, A Almotilag - Applied Sciences, 2022 - mdpi.com
Featured Application This work will help the Saudi ministry of transportation in improving
highway security by providing timely help to the passengers in case of an accident. Abstract …

Metaverse: Virtual Meditation

SR Sindiramutty, NZ Jhanjhi, SK Ray… - Metaverse …, 2024 - igi-global.com
The rise of the metaverse as a digital domain for diverse activities has birthed an innovative
application known as 'metaverse virtual meditation.'This concept seamlessly merges …

Metaverse: Virtual Gyms and Sports

SR Sindiramutty, NZ Jhanjhi, SK Ray… - Metaverse …, 2024 - igi-global.com
In recent years, the concept of the metaverse has garnered substantial attention as an
emerging digital realm that combines virtual reality, augmented reality, and various …