A Comprehensive Review on DDoS Attack in Software-Defined Network (SDN): Problems and Possible Solutions

F Ahmed, IA Sumra, U Jamil - Journal of Computing & Biomedical …, 2024 - jcbi.org
This paper provides key insights into the classification of distributed denial of service (DDoS)
attacks and defensive techniques to protect software-defined net-works (SDN) in these …

Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks

A Munir, IA Sumra, R Naveed, MA Javed - Journal of Computing & …, 2024 - jcbi.org
Abstract Internet of Things (IoT) has rapidly evolved into a transformative technology,
impacting various facts of daily life and industry. However, its widespread adoption has been …

Use of Big Data in IoT-Enabled Robotics Manufacturing for Process Optimization

F Abbas, A Iftikhar, A Riaz, M Humayon… - Journal of Computing & …, 2024 - jcbi.org
Integrating big data analytics into IoT-based robotic manufacturing is essential to optimize
processes and improve the efficiency of manufacturing environments. This study work …

Exploring coverage and security challenges in wireless sensor networks: A survey

MM Moslehi - Computer Networks, 2025 - Elsevier
This survey paper addresses critical issues related to area coverage and security in wireless
sensor networks (WSNs). It highlights the essential challenges and corresponding solutions …

A Machine Learning Sentiment Analysis Approach on News Headlines to Evaluate the Performance of the Pakistani Government

H Noor, J Ahmad, A Haider, F Nasim, A Jaffar - Journal of Computing & …, 2024 - jcbi.org
The growing amount of unstructured online data presents challenges in efficiently
organizing and summarizing relevant information, hindering knowledge development and …

CNN and Gaussian Pyramid-Based Approach For Enhance Multi-Focus Image Fusion

K Ayub, M Ahmad, F Nasim, S Noor, K Pervaiz - Journal of Computing & …, 2024 - jcbi.org
Achieving sharp focus in both foreground and background areas simultaneously in digital
photography is challenging due to the limited depth of field (DOF) in DSLR cameras. This …

Evaluating CNN Effectiveness in SQL Injection Attack Detection

M Shahbaz, G Mumtaz, S Zubair, M Rehman - Journal of Computing & …, 2024 - jcbi.org
SQL injection attacks are among the most prominent threats against Web application
security, intended to illegitimately access sensitive information by exploiting related …

A comprehensive survey on security threats and challenges in cloud computing models (SaaS, PaaS and IaaS)

E Fatima, IA Sumra, R Naveed - Journal of Computing & Biomedical …, 2024 - jcbi.org
Cloud computing has fundamentally transformed data access, storage, and processing for
individuals and businesses alike, offering unparalleled scalability, flexibility, and cost …

Deep Learning based Smart Healthcare Monitoring System using Sensory Network

S Shafi, S Ramzan, H Sattar, S Khalid… - Journal of Computing & …, 2024 - jcbi.org
The smart healthcare monitering systems are becoming popular day by day due to failure of
traditional healthcare monitoring systems to provide real-time, accurate, and consistent …

A rule-based approach for automatic generation of class diagram from functional requirements using natural language processing and machine learning

M Ramzan, GS Sadiqi, MS Bashir, S Raza… - Journal of Computing & …, 2024 - jcbi.org
Requirement analysis is the initial and most crucial phase of the software development life
cycle (SDLC). In this phase, the requirements after gathering from the user and different …