Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
Cluster Computing (KLU-CLUS), Volume 27, Issue 9Pages 12267–12282https://doi.org/10.1007/s10586-024-04566-5AbstractThis article highlights the importance of Air Traffic Control in ensuring the security and efficiency of international aviation operations. Traditional RADAR systems face limitations in power consumption, coverage, and accuracy, leading to the ...
- research-articleMarch 2024
Reliability through an optimal SDS controller’s placement in a SDDC and smart city
Cluster Computing (KLU-CLUS), Volume 27, Issue 6Pages 7219–7240https://doi.org/10.1007/s10586-024-04325-6AbstractData center storage systems have different workloads and characteristics. In a centralized managed storage paradigm (software defined data center), providing a fault-tolerant system requires the best possible placement, and the least possible ...
- research-articleMarch 2024
VADSEC: A Lightweight Protection Scheme for Secure Topology Discovery in SDN
ICNCC '23: Proceedings of the 2023 12th International Conference on Networks, Communication and ComputingPages 46–51https://doi.org/10.1145/3638837.3638844Over the past decade, Software-Defined Networking (SDN) has been a highly researched and popular field. One crucial aspect of any network, including SDNs, is the network discovery phase, also known as topology discovery. The security of the network is ...
- research-articleAugust 2023JUST ACCEPTED
Demographical Based Sentiment Analysis for Detection of Hate Speech Tweets for Low Resource Language
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Just Accepted https://doi.org/10.1145/3616867Advancement in IT and communication technology provides the opportunity for social media users to communicate their ideas and thoughts across the globe within no time as well big data promulgated in a result of the communication process itself has immense ...
- research-articleJanuary 2022
Detection and prediction of traffic accidents using deep learning techniques
- Anique Azhar,
- Saddaf Rubab,
- Malik M. Khan,
- Yawar Abbas Bangash,
- Mohammad Dahman Alshehri,
- Fizza Illahi,
- Ali Kashif Bashir
Cluster Computing (KLU-CLUS), Volume 26, Issue 1Pages 477–493https://doi.org/10.1007/s10586-021-03502-1AbstractRoad transportation is a statutory organ in a modern society; however it costs the global economy over a million lives and billions of dollars each year due to increase in road accidents. Researchers make use of machine learning to detect and ...
- research-articleNovember 2019
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
- Muhammad Yaseen,
- Waseem Iqbal,
- Imran Rashid,
- Haider Abbas,
- Mujahid Mohsin,
- Kashif Saleem,
- Yawar Abbas Bangash
Journal of Medical Systems (JMSY), Volume 43, Issue 11Pages 1–18https://doi.org/10.1007/s10916-019-1440-0AbstractReal-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely ...