An overview of safety and security analysis frameworks for the internet of things

A Abdulhamid, S Kabir, I Ghafir, C Lei - Electronics, 2023 - mdpi.com
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …

Dependability of the internet of things: Current status and challenges

A Abdulhamid, S Kabir, I Ghafir… - … Conference on Electrical …, 2022 - ieeexplore.ieee.org
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …

Unsupervised learning for feature selection: A proposed solution for botnet detection in 5g networks

M Lefoane, I Ghafir, S Kabir… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The world has seen exponential growth in deploying Internet of Things (IoT) devices. In
recent years, connected IoT devices have surpassed the number of connected non-IoT …

Machine learning for botnet detection: An optimized feature selection approach

M Lefoane, I Ghafir, S Kabir, IU Awan - Proceedings of the 5th …, 2021 - dl.acm.org
Technological advancements have been evolving for so long, particularly Internet of Things
(IoT) technology that has seen an increase in the number of connected devices surpass non …

Electric vehicle energy consumption prediction for unknown route types using deep neural networks by combining static and dynamic data

H Yılmaz, B Yagmahan - Applied Soft Computing, 2024 - Elsevier
Accurate energy consumption prediction of electric vehicles (EVs) is crucial for drivers
considering long trips. All the data should be provided beforehand to determine the energy …

[HTML][HTML] Internet of Things botnets: A survey on Artificial Intelligence based detection techniques

M Lefoane, I Ghafir, S Kabir, IU Awan - Journal of Network and Computer …, 2025 - Elsevier
Abstract The Internet of Things (IoT) is a game changer when it comes to digitization across
industries. The Fourth Industrial Revolution (4IR), brought about a paradigm shift indeed …

A DTW Approach for Complex Data A Case Study with Network Data Streams

PR Silva, J Vinagre, J Gama - Proceedings of the 38th ACM/SIGAPP …, 2023 - dl.acm.org
Dynamic Time War** (DTW) is a robust method to measure the similarity between two
sequences. This paper proposes a method based on DTW to analyse high-speed data …

Sequential Pattern Mining: A Proposed Approach for Intrusion Detection Systems

M Lefoane, I Ghafir, S Kabir, IU Awan - Proceedings of the 7th …, 2023 - dl.acm.org
Technological advancements have played a pivotal role in the rapid proliferation of the
fourth industrial revolution (4IR) through the deployment of Internet of Things (IoT) devices in …

Machine Learning for Malware Detection in Network Traffic

AH Omopintemi, I Ghafir, S Eltanani, S Kabir… - Proceedings of the 7th …, 2023 - dl.acm.org
Develo** advanced and efficient malware detection systems is becoming significant in
light of the growing threat landscape in cybersecurity. This work aims to tackle the enduring …

Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time War**

S Machmeier, V Heuveline - 2024 8th Cyber Security in …, 2024 - ieeexplore.ieee.org
Browsing the web relies on the Domain Name System (DNS) protocol. In short, it resolves
domain names to addresses and manages zones of domain spaces in subtrees. With the …