Farrukh Kamran

Learn More
Probes or network scans are designed to identify security vulnerabilities of a network and are precursor to most of the cyber attacks. Slow, random and distributed attacks are the most difficult to detect. Extensive training over longer packet traces or larger detection window size can give better results but requires larger memory. A model based on Time(More)
Pervasive Computing integrates numerous, casually accessible and inexpensive mobile devices with traditional distributed systems. The foremost issue of pervasive computing is Context-Awareness. Context-Aware Paradigm for Pervasive Computing Environments (CAPP) is a Service Oriented Architecture (SOA) that enhances smart service discovery in a pervasive(More)
Detecting low intensity denial of service (DoS) attacks in minimum time with less false positives is challenging for network based intrusion detection systems. In this paper we propose a new fuzzy logic based approach, which adapts fuzzy linguistic membership functions instead of modifying the fuzzy rules. The authors use the normal TCP profile, i.e. the(More)
This paper addresses the problem of deadbeat control in fully controlled high-power-factor rectifiers. Improved deadbeat control can be achieved through the use of neuralnetwork-based predictors for the input-current reference to the rectifier. In this application, on-line training is absolutely required. In order to achieve sufficiently fast on-line(More)
In ubiquitous computing traditional security mechanism is difficult to realize, as users do not have prior knowledge of each other and the availability of a trusted third party cannot be relied upon. Since trust is used as an elementary channel of interaction in a human society, a security model based on the real world characteristics of trust can provide(More)
Port scanning is used to identify vulnerable machines, and in most cases a precursor to more sophisticated attacks. Early detection of port scans results in reducing the impact and propagation of distributed attacks and worms. Many algorithmic, threshold and visual based solutions have been proposed each one boils down to testing X events across in Y size(More)
Predicting the power output of a Photovoltaic (PV) installation, whether small roof-top or utility scale, is important from resource planning perspective. For a home user, knowledge of solar power availability in the next 12 hours helps in optimal load scheduling. For a utility operator with a mix of power sources, this predicted PV output (along with a(More)
  • 1