Reliable resource allocation and management for IoT transportation using fog computing

HU Atiq, Z Ahmad, SK Uz Zaman, MA Khan, AA Shaikh… - Electronics, 2023 - mdpi.com
Resource allocation in smart settings, more specifically in Internet of Things (IoT)
transportation, is challenging due to the complexity and dynamic nature of fog computing …

Optimal feature selection for heart disease prediction using modified Artificial Bee colony (M-ABC) and K-nearest neighbors (KNN)

MA Khan, T Mazhar, M Mateen Yaqoob… - Scientific Reports, 2024 - nature.com
Heart disease is a complex and widespread illness that affects a significant number of
people worldwide. Machine learning provides a way forward for early heart disease …

An adaptive enhanced technique for locked target detection and data transmission over internet of healthcare things

MA Khan, J Khan, N Sehito, K Mahmood, H Ali, I Bari… - Electronics, 2022 - mdpi.com
The incredible advancements in data transmission technology have opened up more
potentials for data security than ever before. Numerous methods for data protection have …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - ar** and mobile sensor nodes
MA Khan, J Khan, K Mahmood, I Bari, H Ali, N Jan… - Electronics, 2022 - mdpi.com
Sensor networks' network connectivity must be restored as part of any solution. This
strategy's goal was to come up with a concept. Many approaches to restoring connections …

ML-assisted Security for Anomaly Detection in Industrial IoT (IIoT) Applications

BR Konatham, T Simra, A Ghimire… - … For Smart Nation …, 2023 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) uses intelligent sensors and actuators, etc., to facilitate
the application of IoT in different industries. This paper presents a comparative analysis …

A Hybrid Security Model for the Protection of Diagnostic Text Data in Medical Images over Internet of Things

R Pavaiyarkarasi, R Ramu, G Sahaana… - … Conference on I …, 2022 - ieeexplore.ieee.org
As innovation for transmitting data has advanced exponentially, new avenues for protecting
sensitive information have emerged up. Over the last several decades, many different …

Future Trends and Emerging Threats in Drone Cybersecurity

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Issues and Challenges …, 2024 - igi-global.com
The rapid proliferation of drone technology has ushered in a new era of innovation and
convenience across various industries. However, this technological advancement has also …

Data Security and Privacy Concerns in Drone Operations

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Issues and Challenges …, 2024 - igi-global.com
The widespread use of drones across various industries is leading to significant
transformations. However, the resulting concerns about data security and privacy are quite …

Ethical Considerations in Drone Cybersecurity

SR Sindiramutty, CE Tan, B Shah, NA Khan… - … Issues and Challenges …, 2024 - igi-global.com
The rapid proliferation of drones, coupled with their increasing integration into various
aspects of our lives, has brought to the forefront a myriad of ethical considerations in the …