Smart Home Energy Management Systems in Internet of Things networks for green cities demands and services

MS Aliero, KN Qureshi, MF Pasha, G Jeon - Environmental Technology & …, 2021 - Elsevier
Today, 44% of global energy has been derived from fossil fuel, which currently poses a
threat to inhabitants and well-being of the environment. In a recent investigation of the global …

A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEe Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …

IOT based energy management in smart grid under price based demand response based on hybrid FHO-RERNN approach

C Balasubramanian, RLR Singh - Applied Energy, 2024 - Elsevier
This manuscript presents a hybrid technique for IOT Based Energy Management (EM) in
smart grid (SG) under-price based demand response (DR). The proposed method integrates …

Systematic review analysis on smart building: Challenges and opportunities

MS Aliero, M Asif, I Ghani, MF Pasha, SR Jeong - Sustainability, 2022 - mdpi.com
Smart building technology incorporates efficient and automated controls and applications
that use smart energy products, networked sensors, and data analytics software to monitor …

A novel and secure attacks detection framework for smart cities industrial internet of things

KN Qureshi, SS Rana, A Ahmed, G Jeon - Sustainable Cities and Society, 2020 - Elsevier
New trend of smart cities has changed the life with more equipped and integrated systems.
Various new technologies have adopted for sustainable and improved smart cities …

A systematic review of detection and prevention techniques of SQL injection attacks

M Nasereddin, A ALKhamaiseh… - … Security Journal: A …, 2023 - Taylor & Francis
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications.
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …

Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shop** …

Anomaly detection and trust authority in artificial intelligence and cloud computing

KN Qureshi, G Jeon, F Piccialli - Computer Networks, 2021 - Elsevier
The rapid development of smart Internet of Things (IoT) and its multimedia applications with
conventional cloud and edge computing platforms are driving a new trend that shifts the …

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

R Qazi, KN Qureshi, F Bashir, NU Islam, S Iqbal… - Journal of Ambient …, 2021 - Springer
Abstract Information security broadly refers to the state of protection against unsanctioned
access to information or data, principally electronic or digital data. In today's world of modern …

Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …

S Hussain, M Nadeem, J Baber, M Hamdi, A Rajab… - Scientific Reports, 2024 - nature.com
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …