Mohd Anwar

Learn More
IP-spoofing attacks remain one of the most damaging attacks in which an attacker replaces the original source IP address with a new one. Using the existing attacking tools to launch IP spoofing attacks, an attacker can now easily compromise access routers and not only the end-hosts. In this paper, we propose a trust-based approach using a Bayesian inference(More)
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical towards achieving the system's goals, such as routing reliability. In this paper, we seek to provide an understanding of the process of reputation-based trust approaches and related issues as they apply to routing in ad-hoc networks. We discuss the concept(More)
Recently, we have seen a rapid growth of social networking systems (SNSs). In most SNSs, a user can configure his privacy settings to indicate who can or cannot see his friend list. Usually, SNSs, such as LinkedIn and Google Plus, also include a feature that allows a user to query mutual friends between him and any other user he can reach using the(More)
Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradicting answers, causing an ambiguity with(More)
Location-Based Social Network Systems (LBSNSs) are becoming increasingly popular. In LBSNSs, users can check in at various places, connect with their friends and share their check-ins (including users' locations and timestamps) with their friends and even the public. However, most LBSNSs pay on more attention to attracting users to join and actively use(More)
While sharing information is the main purpose of online social networks (OSN), privacy is a major concern. It has been argued that the lack of privacy protection caused the massive departure of users from MySpace in 2008 [1] - specially, due to mass media coverage on dangers of teenagers' public profiles and the appearance of Facebook, which provided a more(More)
One of the ways a malicious router can launch a Denial of Service (DoS) attack is by rerouting IP-packets of other destinations to the victim node. In this paper, based on the observed traffic anomalies, we propose using a Markov chain model to calculate trustworthiness of routers in order to isolate the malicious ones. Furthermore, our approach reduces the(More)
Observations of daily living (ODLs) are important information for empowering users to understand their health and well-being, and while shared with clinicians, ODLs can be used to improve diagnosis and treatment. On the other hand, clinicians and researchers are interested in performing ecological momentary assessment (EMA) to better understand(More)
The Unani System of Medicine also known as Greeko-Arab medicine, founded by Hippocrates is based on the concept of equilibrium and balance of natural body humours (blood, bile, black bile and phlegm). The imbalance in the quality and quantity of these humours leads to diseases whereas restoration of this balance maintains health of a person. The treatment(More)