Share This Author
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
- M. Humayun, M. Niazi, Noor Zaman Jhanjhi, M. Alshayeb, S. Mahmood
- Computer ScienceArabian Journal for Science and Engineering
- 6 January 2020
A systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed, showing that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware.
Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm
- S. Kok, A. Abdullah, Noor Zaman Jhanjhi, Mahadevan Supramaniam
- Computer ScienceComput.
- 1 November 2019
It was proposed that machine learning is used to detect crypto-ransomware before it starts its encryption function, or at the pre-encryption stage, and low FPR indicates that LA has a low probability of predicting goodware wrongly.
Carbon Stores and Biogeochemical Properties of Soils under Black Spruce Forest, Alaska
Soil Sci. Soc. Am. J. 74:969–978Published online 17 Mar. 2010doi:10.2136/sssaj2009.0152SNRAS Publ. no. 2009-001. Received 22 Apr. 2009.*Corresponding author (firstname.lastname@example.org).© Soil Science…
Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic
In this research, the top ten cybersecurity threats that had and could take place during the pandemic are identified and the privacy concerns raised amid COVID-19 are discussed.
Key Applications of State-of-the-Art Technologies to Mitigate and Eliminate COVID-19
COVID-19 has stunned the global economy and threatened human life. Due to rapidly emerging fatalities and enormous cases appearing every day, researchers across the globe are producing significant…
A Review of Intrusion Detection System using Machine Learning Approach
This study found that soft computing techniques are getting considerable attention, as many have applied it here, and three most used metrices for performance evaluation for IDS are accuracy, True Positive Rate (TPR) and False positive Rate (FPR).
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
- A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, Noor Zaman Jhanjhi, Yunyoung Nam
- Computer ScienceIEEE Access
- 24 March 2020
The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes and incurs less overhead as compared to existing TLS-based security schemes.
Proposing secure and lightweight authentication scheme for IoT based E-health applications
- M. Almulhim, Noor Zaman Jhanjhi
- Computer Science20th International Conference on Advanced…
- 1 February 2018
This research proposed a secure group-based lightweight authentication scheme for IoT based E-health applications, the proposed model will provide mutual authentication and energy efficient, and computation for healthcare IoT based applications.
Enhancing Energy Efficiency of Wireless Sensor Network through the Design of Energy Efficient Routing Protocol
A cross layer design methodology was adopted to design an energy efficient routing protocol entitled “Position Responsive Routing Protocol” (PRRP), which shows a significant improvement in the WSN in terms of energy efficiency and the overall performance.
Energy efficient routing protocol for wireless sensor network
- Noor Zaman Jhanjhi, T. J. Low, T. Alghamdi
- Computer Science16th International Conference on Advanced…
- 27 March 2014
Energy efficient routing protocol known as Position Responsive Routing Protocol (PRRP) is introduced to enhance energy efficiency of WSN and shows significant improvement of 45% in energy efficiency by increasing battery life of individual nodes.