Browsing Research publications by Author "Cybersecurity and Computing Systems"
Now showing items 1-15 of 15
-
6G secure quantum communication: a success probability prediction model
Akbar, Muhammad Azeem; Khan, Arif Ali; Hyrynsalmi, Sami; Khan, Javed Ali (2024-05)The emergence of 6G networks initiates significant transformations in the communication technology landscape. Yet, the melding of quantum computing (QC) with 6G networks although promising an array of benefits, particularly ... -
Behind the Bait: Delving into PhishTank's hidden data
Yasin, Affan; Fatima, Rubia; Khan, Javed Ali; Afzal, Wasif (2024-02-28)Phishing constitutes a form of social engineering that aims to deceive individuals through email communication. Extensive prior research has underscored phishing as one of the most commonly employed attack vectors for ... -
CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms
Saini, Anish; Tsokanos, Athanasios; Kirner, Raimund (2023-07-30)In a cryptosystem, a cipher's security is directly dependent on a key-schedule or key-scheduling algorithm (KSA) or that is used for both encryption and decryption. The random-number-based KSA adds another layer of security ... -
Emotion detection from handwriting and drawing samples using an attention-based transformer model
Khan, Zohaib Ahmad; Xia, Yuanqing; Aurangzeb, Khursheed; Khaliq, Fiza; Alam, Mahmood; Khan, Javed Ali; Anwar, Muhammad Shahid (2024-03-29)Emotion detection (ED) involves the identification and understanding of an individual’s emotional state through various cues such as facial expressions, voice tones, physiological changes, and behavioral patterns. In this ... -
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
Ghani, Muhammad Ahmad Nawaz Ul; She, Kun; Rauf, Muhammad Arslan; Khan, Shumaila; Khan, Javed Ali; Aldakheel, Eman Abdullah; Khafaga, Doaa Sami (2024-05-15)The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a ... -
GPU-based Parallel Technique for Solving the N-Similarity Problem in Textual Data Mining
Fazlali, Mahmood; Mirhosseini, Mina; Shahsavari, Mahyar; Shafarenko, Alex; Mashinchi, Mashaallah (Institute of Electrical and Electronics Engineers (IEEE), 2024-03-04)An important issue in data mining and information retrieval is the problem of multiple similarity or n-similarity. This problem entails finding a group of n data points with the highest similarity within a large dataset. ... -
Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
Haq, Qazi Mazhar ul; Arif, Fahim; Aurangzeb, Khursheed; Ain, Noor ul; Khan, Javed Ali; Rubab, Saddaf; Anwar, Muhammad Shahid (2024-03-26)Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning ... -
Insights into software development approaches: mining Q &A repositories
Khan, Arif Ali; Khan, Javed Ali; Akbar, Muhammad Azeem; Zhou, Peng; Fahmideh, Mahdi (2024-01)Context: Software practitioners adopt approaches like DevOps, Scrum, and Waterfall for high-quality software development. However, limited research has been conducted on exploring software development approaches concerning ... -
LCADNet: A Novel Light CNN Architecture for EEG-based Alzheimer Disease Detection
Kachare, Pramod; Puri, Digambar; Sangle, Sandeep B.; Al-Shourbaji, Ibrahim; Jabbari, Abdoh; Kirner, Raimund; Alameen, Abdalla; Migdady, Hazem; Abualigah, Laith (2024-06-11)Alzheimer’s disease (AD) is a progressive and incurable neurologi- cal disorder with a rising mortality rate, worsened by error-prone, time-intensive, and expensive clinical diagnosis methods. Automatic AD detection methods ... -
Machine Learning Based Diagnostic Paradigm in Viral and Non-Viral Hepatocellular Carcinoma
Asif, Arun; Ahmed, Faheem; Zeeshan; Khan, Javed Ali; Allogmani, Eman; Rashidy, Nora El; Manzoor, Sobia; Anwar, Muhammad Shahid (2024-02-23)Viral and non-viral hepatocellular carcinoma (HCC) is becoming predominant in developing countries. A major issue linked to HCC-related mortality rate is the late diagnosis of cancer development. Although traditional ... -
Mobile-UI-Repair: a deep learning based UI smell detection technique for mobile user interface
Ali, Asif; Xia, Yuanqing; Navid, Qamar; Khan, Zohaib Ahmad; Khan, Javed Ali; Aldakheel, Eman Abdullah; Khafaga, Doaa (2024-05-16)The graphical user interface (GUI) in mobile applications plays a crucial role in connecting users with mobile applications. GUIs often receive many UI design smells, bugs, or feature enhancement requests. The design smells ... -
Network intrusion detection leveraging multimodal features
Kiflay, Aklil Zenebe; Tsokanos, Athanasios; Fazlali, Mahmood; Kirner, Raimund (2024-07-30)Network Intrusion Detection Systems (NIDSes) are essential for safeguarding critical information systems. However, the lack of adaptability of Machine Learning (ML) based NIDSes to different environments could cause slow ... -
A Q-learning-based smart clustering routing method in flying Ad Hoc networks
Hosseinzadeh, Mehdi; Tanveer, Jawad; Rahmani, Amir Masoud; Yousefpoor, Efat; Aurangzeb, Khursheed; Yousefpoor, Mohammad Sadegh; Darwesh, Aso; Lee , Sang-Woong; Fazlali, Mahmood (2024-01)Flying ad hoc networks (FANETs) have particular importance in various military and civilian applications due to their specific features, including frequent topological changes, the movement of drones in a three-dimensional ... -
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks
Allen, Ashley; Mylonas, Alexios; Vidalis, Stilianos; Gritzalis, Dimitris (2024-04)Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike ... -
Winternitz stack protocols for embedded systems and IoT
Shafarenko, Alex (2024-12)This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle. Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a ...