1 |
N. Zaman, A. B. Abdullah and L. T. Jung, "Optimization of energy usage in Wireless Sensor Network using Position Responsive Routing Protocol (PRRP)," 2011 IEEE Symposium on Computers & Informatics, 2011, pp. 51-55, doi: 10.1109/ISCI.2011.5958882.
DOI
|
2 |
Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., & Abdullah, A. (2018, October). Middleware Power Saving Scheme for Mobile Applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
|
3 |
S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi and L. T. Jung, "SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications," 2020 International Conference on Computational Intelligence (ICCI), 2020, pp. 305-310, doi: 10.1109/ICCI51257.2020.9247818.
DOI
|
4 |
M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5GAided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.
DOI
|
5 |
Soosahabi, R. (2021). SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond. arXiv preprint arXiv:2108.12161.
|
6 |
S. K. Mishra et al., "Energy-Aware Task Allocation for Multi-Cloud Networks," in IEEE Access, vol. 8, pp. 178825-178834, 2020, doi: 10.1109/ACCESS.2020.3026875.
DOI
|
7 |
A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPLRP. Sensors, 20(21), 5997.
DOI
|
8 |
A. P. Singh et al., "A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications," in IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5779-5789, Aug. 2021, doi: 10.1109/TII.2020.3037889.
DOI
|
9 |
Gopi, R., Sathiyamoorthi, V., Selvakumar, S. et al. Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-021-10640-6
DOI
|
10 |
Sharma, P., Johari, R., & Sarma, S. S. (2012). Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. International Journal of System Assurance Engineering and Management, 3(4), 343-351.
DOI
|
11 |
B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.
DOI
|
12 |
M. Lim, A. Abdullah, N. Jhanjhi and M. Khurram Khan, "Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks," in IEEE Access, vol. 8, pp. 16550-16559, 2020, doi: 10.1109/ACCESS.2019.2961805.
DOI
|
13 |
Dublin (Business Wire), Impact of COVID-19 on the Video Conferencing Market, 2020, https://www.businesswire.com/news/home/20200416005739/en/Impact-of-COVID-19-on-the-VideoConferencing-Market-2020---ResearchAndMarkets.com, Accessed on November 2021.
|
14 |
Abbasi, A., Dobolyi, D., Vance, A., & Zahedi, F. M. (2021). The phishing funnel model: A design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 410-436.
DOI
|
15 |
Guy Campos, Videoconferencing app usage 'hits 21 times pre-Covid levels', https://www.avinteractive.com/news/collaboration/usage-mobile-video-conferencing-apps-including-zoomgrew-150-first-half-2021-05-08-2021/, Accessed on November 2021.
|
16 |
Almusaylim, Z.A., Zaman, N. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25, 3193-3204 (2019). https://doi.org/10.1007/s11276-018-1712-5
DOI
|
17 |
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49.
DOI
|
18 |
Zaman, N., & Abdullah, A. B. (2012). Energy optimization through position responsiverouting protocol (prrp) in wireless sensor network. International Journal of Information and Electronics Engineering, 2(5), 748.
|
19 |
Jayakumar, P., Brohi, S. N., & Zaman, N. (2020). Top 7 lessons learned from COVID-19 pandemic.
|
20 |
S. M. Muzammal, R. K. Murugesan and N. Z. Jhanjhi, "A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4186-4210, 15 March15, 2021, doi: 10.1109/JIOT.2020.3031162.
DOI
|
21 |
Vivek Ganti, et.al, DDoS attack trends for 2021 Q2, https://blog.cloudflare.com/ddos-attack-trends-for2021-q2/, Accessed on November 2021
|
22 |
Almulhim, M., Islam, N., & Zaman, N. (2019). A lightweight and secure authentication scheme for IoT based e-health applications. International Journal of Computer Science and Network Security, 19(1), 107-120.
|
23 |
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV's: secure communication protocol issues and challenges. In Drones in Smart-Cities (pp. 37-55). Elsevier.
|
24 |
Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers, 8(4), 79.
DOI
|
25 |
A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT-A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.
DOI
|
26 |
Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., & Boutaba, R. (2021). Man in the Middle Attack Mitigation in Internet of Medical Things. IEEE Transactions on Industrial Informatics.
|
27 |
Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.
DOI
|
28 |
Noor Qureshi, How to make sure no man-in-the-middle attack can harm you, https://thehacktoday.com/how-to-make-sure-no-man-in-the-middle-attack-can-harmyou/, Accessed on November 2021.
|
29 |
Z. A. Almusaylim, N. Zaman and L. T. Jung, "Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment," 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 2018, pp. 1-5, doi: 10.1109/ICCOINS.2018.8510588.
DOI
|
30 |
Teoh, A. A., Ghani, N. B. A., Ahmad, M., Jhanjhi, N., Alzain, M. A., & Masud, M. (2022). Organizational Data Breach: Building Conscious Care Behavior in Incident Response. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 40(2), 505-515.
DOI
|
31 |
Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2019). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences.
|
32 |
D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah and M. A. Alzain, "A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications," in IEEE Access, vol. 9, pp. 41731-41744, 2021, doi: 10.1109/ACCESS.2021.3065308.
DOI
|
33 |
A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors, 20(21), 5997.
DOI
|
34 |
Kraticakal, SQL Injection Attack: A Major Application Security Threat, https://www.kratikal.com/blog/sql-injection-attack-a-major-application-security-threat/, Accessd on November 2021.
|
35 |
Alferidah, D. K., & Jhanjhi, N. Z. (2020, October). Cybersecurity Impact over Bigdata and IoT Growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103-108). IEEE
|
36 |
Lim, M., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers, 8(1), 8.
DOI
|
37 |
One Login, Six type of passwords attaks and how to stop them, https://www.onelogin.com/learn/6-types-password-attacks, Accessed on November 2021
|
38 |
C. Diwaker et al., "A New Model for Predicting Component-Based Software Reliability Using Soft Computing," in IEEE Access, vol. 7, pp. 147191-147203, 2019, doi: 10.1109/ACCESS.2019.2946862.
DOI
|
39 |
A. Ullah et al., "A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks," in IEEE Access, vol. 9, pp. 126324-126336, 2021, doi: 10.1109/ACCESS.2021.3110203.
DOI
|
40 |
Sensor tower blog, Usage of Mobile Video Conferencing Apps Including Zoom Grew 150% in the First Half of 2021, https://sensortower.com/blog/video-conferencingapps-mau-growth , Accessed on November 2021.
|
41 |
Karl KA, Peluchette JV, Aghakhani N. Virtual Work Meetings During the COVID-19 Pandemic: The Good, Bad, and Ugly. Small Group Research. May 2021. doi:10.1177/10464964211015286
DOI
|
42 |
Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV's applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.
|
43 |
Singh, J., & Singh, J. (2021). A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture, 112, 101861.
DOI
|
44 |
K. Hussain, S. J. Hussain, N. Jhanjhi and M. Humayun, "SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-4, doi: 10.1109/ICCISci.2019.8716416.
DOI
|
45 |
Ben Lutkevich, Types of Malware, Tech Target, https://searchsecurity.techtarget.com/definition/malware, Access on November 2021.
|
46 |
Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AIenabled phishing attacks detection techniques. Telecommunication Systems, 76(1), 139-154.
DOI
|
47 |
Zaman, N., & Ahmad, M. (2017). Towards the evaluation of authentication protocols for mobile command and control unit in healthcare. Journal of Medical Imaging and Health Informatics, 7(3), 739-742.
DOI
|
48 |
Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77(1), 47-62.
DOI
|
49 |
N. Zaman and F. A. Almusalli, "Review: Smartphones power consumption & energy saving techniques," 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-7, doi: 10.1109/ICIEECT.2017.7916593.
DOI
|
50 |
Norah Saud Al-Musib, Faeiz Mohammad Al-Serhani, Mamoona Humayun, N.Z. Jhanjhi, Business email compromise (BEC) attacks, Materials Today: Proceedings, 2021, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2021.03.647.(https://www.sciencedirect.com/science/article/pii/S2214785321027425)
DOI
|
51 |
M. J. Iqbal et al., "Smart Home Automation Using Intelligent Electricity Dispatch," in IEEE Access, vol. 9, pp. 118077-118086, 2021, doi: 10.1109/ACCESS.2021.3106541.
DOI
|
52 |
Atlam H.F., Wills G.B. (2020) IoT Security, Privacy, Safety and Ethics. In: Farsi M., Daneshkhah A., Hosseinian-Far A., Jahankhani H. (eds) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing). Springer, Cham. https://doi.org/10.1007/978-3-030-18732-3_8
DOI
|
53 |
Penta Security, Top 5 AI-powered Cyber Threats & How to Prevent Them, https://www.pentasecurity.com/blog/top-5-aipowered-cyber-threats-how-to-prevent-them/, Access on November 2021
|
54 |
Humayun, M., & Jhanjhi, N. Z. (2019). Exploring the relationship between GSD, knowledge management, trust and collaboration. Journal of Engineering Science and Technology (JESTEC), 14(2), 820-843.
|
55 |
M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, 2021, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.
DOI
|
56 |
Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., & Zanero, S. (2011, December). A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS) (pp. 320-325). IEEE.
|
57 |
V. Singhal et al., "Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings," in IEEE Access, vol. 8, pp. 113790-113806, 2020, doi: 10.1109/ACCESS.2020.3002416.
DOI
|
58 |
S. J. Hussain, U. Ahmed, H. Liaquat, S. Mir, N. Jhanjhi and M. Humayun, "IMIAD: Intelligent Malware Identification for Android Platform," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-6, doi: 10.1109/ICCISci.2019.8716471.
DOI
|
59 |
N. A. Khan, S. N. Brohi and N. Zaman, "Ten deadly cyber security threats amid COVID-19 pandemic", 2020.
|
60 |
Amer, E., Zelinka, I., & El-Sappagh, S. (2021). A Multi-Perspective malware detection approach through behavioral fusion of API call sequence. Computers & Security, 110, 102449.
DOI
|
61 |
Pan, Y., White, J., Schmidt, D., Elhabashy, A., Sturm, L., Camelio, J., & Williams, C. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems.
|
62 |
Humayun, M., Jhanjhi, N. Z., & Alamri, M. Z. (2020). Smart secure and energy efficient scheme for e-health applications using IoT: a review. International Journal of Computer Science and Network Security, 20(4), 55-74.
DOI
|
63 |
Ubing, A. A., Jasmi, S. K. B., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Phishing website detection: An improved accuracy through feature selection and ensemble learning. International Journal of Advanced Computer Science and Applications, 10(1), 252-257.
|
64 |
Elijah, A. V., Abdullah, A., Jhanjhi, N., Supramaniam, M., & Abdullateef, B. (2019). 'Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study. Int. J. Adv. Comput. Sci. Appl, 10(9), 520-528.
|
65 |
The new network, 2017: The year of widespread SDN adoption and DDoS attack mitigation, https://www.networkworld.com/article/3156344/2017-widespread-sdn-adoption-and-ddos-attackmitigation.html, Accessed on November 2021.
|
66 |
Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Valdes, J. F., & Luna-Valero, F. (2020). Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: An experimental approach. Sensors, 20(3), 816.
DOI
|
67 |
S. Ali et al., "Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based," in IEEE Access, vol. 8, pp. 148007-148020, 2020, doi: 10.1109/ACCESS.2020.3014671.
DOI
|
68 |
Nawaz, A. (2021). Feature Engineering based on Hybrid Features for Malware Detection over Android Framework. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2856-2864.
|
69 |
Seungjin, L., Abdullah, A., & Jhanjhi, N. Z. (2020). A review on honeypot-based botnet detection models for smart factory. International Journal of Advanced Computer Science and Applications, 11(6), 418-435.
|
70 |
N. Zaman, K. Ragab, A.B. Abdullah, Wireless Sensor Networks and Energy Efficiency: Protocols Routing and Management, IGI, Globa, Hershey, PA, USA (2012)
|
71 |
Ren, A. L. Y., Liang, C. T., Hyug, I. J., Broh, S. N., & Jhanjhi, N. Z. (2020). A Three-Level Ransomware Detection and Prevention Mechanism. EAI Endorsed Transactions on Energy Web, 7(27).
|
72 |
Jabeen, T., Jabeen, I., Ashraf, H., Jhanjhi, N., Mamoona, H., Mehedi, M., & Sultan, A. (2022). A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare. Computers, Materials, & Continua, 2365-2380.
|
73 |
Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). A review of intrusion detection system using machine learning approach. International Journal of Engineering Research and Technology, 12(1), 8-15.
|
74 |
Mamoona Humayun, NZ Jhanjhi, Ahmed Alsayat, Vasaki Ponnusamy, Internet of things and ransomware: Evolution, mitigation and prevention, Egyptian Informatics Journal, Volume 22, Issue 1, 2021, Pages 105-117, ISSN 1110-8665, https://doi.org/10.1016/j.eij.2020.05.003.
DOI
|
75 |
Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.
DOI
|
76 |
Brohi, S. N., Jhanjhi, N. Z., Brohi, N. N., & Brohi, M. N. (2020). Key applications of state-of-the-art technologies to mitigate and eliminate COVID-19.
|
77 |
Egele, M., Kirda, E., & Kruegel, C. (2009, April). Mitigating drive-by download attacks: Challenges and open problems. In International Workshop on Open Problems in Network Security (pp. 52-62). Springer, Berlin, Heidelberg.
|
78 |
Hussain, S. J., Irfan, M., Jhanjhi, N. Z., Hussain, K., & Humayun, M. (2021). Performance enhancement in wireless body area networks with secure communication. Wireless Personal Communications, 116(1), 1-22.
DOI
|