AUTHOREA
Log in Sign Up Browse Preprints
LOG IN SIGN UP
Noman Mazher
Noman Mazher
Associated Researcher
pakistan

Public Documents 8
Artificial Intelligence Based Architecture to Enhance Cloud Computing Security
Noman Mazher

Noman Mazher

and 2 more

January 23, 2023
Cloud computing (CC) provides users with online access to network services, including enhanced, transparent user management and the capacity to gather and process data. A shared Internet gateway is offered by CC, which is evolving into a private and public data center set. The integration of AI technologies into a substantial amount of computer resources, especially integrated systems, presents a number of resource problems that require careful adjustment. The IoT paradigm recently evolved in an application for smart environments. Security and privacy are seen as being of the utmost importance in any smart IoT environment in the real world. Digital environments face security threats as a result of security flaws in IoT-based networks. Because AI has excellent learning capabilities, it is more dependable and effective at spotting harmful threats. The current architecture presented in this article will support several applications of AI in digital homes detailed study of security concerns and issues.
Malware Analysis Framework Using Graph Theory
Noman Mazher

Pronaya Bhattacharya1

and 1 more

July 27, 2022
Introduction:Malware detection is one of the leading security issues in Network Security paradigm. There exist different malware families. All of the families of malware are even not completely discovered[1]. In case of an unknown malware family of attack detection is various challenging tasks. In the current trend of malware detection used some data mining technique such as classification and clustering. The process of classification improves the process of detection of malware.The chains are cryptographically auditable as they rely on Merkle root value and order-execute architecture in which blockchain network orders the transactions first using a consensus protocol and then executes them in the listed order in allPeer nodes in a sequential manner. The hash in any i th block is computed as Hi =f(inputi, IDi,Timestamp, Hi-1)whereinputi istheinputdocument,IDi is the digital identifier associated with the document, Timestamp is the current timestamp value, and Hi and Hi-1 are the hashes of current and previous blocks, respectively.Section 3 provides the technological aspects of integration of blockchain in MEC and designing of mining as a service (MaaS) in MEC architecture.
Cybersecurity Attacks in Celluler-V2X Communicaiton Networks
Noman Mazher

Noman Mazher

and 2 more

July 20, 2022
Vehicles in the current era can communicate with other vehicles, roadside units, and networks. This communication is collaboratively called Vehicle to Everything(V2X) communication. V2X network leverages modern communication technologies such as DSRC, LTE, and 5G communication. Along with the leverages of these technologies, potential security threat has also increased. Cybersecurity attacks are the most common attacks that damage the V2X communication network. In this paper, we will reveal poetnetial cybersecurity attacks in V2X communication
Vehicular Platooning to be Secure against Cybersecurity Attacks
Noman Mazher

Noman Mazher

and 2 more

July 20, 2022
Vehicular platooning is although not a new concept yet reshaping its core idea with invovlment of autonomous driging in it. vehicle platoon is group of vehicle traveling with small space but no physical connection and negligible relative velocity with each other. Platoon can be formed from different type of vehicles such as truck, bus car etc. In platoon each vehicle has a particular role either it is a leader or follower. All of vehicle participating in platoon have to send message to their predecessor vehicle about their present location, and speed velocity. Along with other different challenges such as its trajectory , string stability , maneuvers, platoon communication suffer from security risks. Security is an essential aspects of wireless communication systems Due to the inherent transmission nature of wireless channels.There is a risk of various types of network attacks,Cyberseurity attacks are most common of them. In this research we will reveal the core idea of cybersecurity attacks in autonomous vehicle platooning.
SMS Based Gas Leakage and Fire Detection Alert System to attempt as Firewall against...
Noman Mazher

Noman Mazher

and 3 more

July 20, 2022
Safety is the foremost aspect in today"s world. In this world of technology, people need technology to help them in danger conditions. Gas leakage becomes a severe issue that results in many accidents which lead to mortal and monetary harm. It is need of hour to install the gas leakage detection systems on public places. This paper presents a system design that identifies the leakage of gas and warns the user about the situation by sending SMS on user"s phone with the help of GSM. Smart kitchen by means of IOT is aimed, created and verified. Our system has more features than existing systems because those were manual while our system is automatic and provides rapid reply and correct identification that can save many lives and prevents humans from many hazardous cases. _____________________________________________
Smart Home With CyberSecurity Features Without Sensors and web-camera Technology
Noman Mazher

Noman Mazher

and 3 more

July 20, 2022
Nowadays, security threats are becoming important problem in the world. Everyone in this world want to keep an aye on his house due to threats and risk of theft and robbery, danger of leaking raw gas, and also requires safety from fire, at the same time they want to save energy, and also want to keep an eye on their house if there are elders or disabled person in the house. This system sends the images and the threat messages to warn the people about the danger in SMS or MMS form. This system monitors the irregular activities and functions with the help of sensors and most importantly with the web camera and then performs necessary actions to save assets and warn the authorized person to take serious steps. Introduction:
SMS Based Gas Leakage and Fire Detection Alert System
Noman Mazher

Noman Mazher

and 3 more

July 14, 2022
Safety is the foremost aspect in today"s world. In this world of technology, people need technology to help them in danger conditions. Gas leakage becomes a severe issue that results in many accidents which lead to mortal and monetary harm. It is need of hour to install the gas leakage detection systems on public places. This paper presents a system design that identifies the leakage of gas and warns the user about the situation by sending SMS on user"s phone with the help of GSM. Smart kitchen by means of IOT is aimed, created and verified. Our system has more features than existing systems because those were manual while our system is automatic and provides rapid reply and correct identification that can save many lives and prevents humans from many hazardous cases. _____________________________________________
Byzantine Failure against Colluding Attacks in Cloud Data
Noman Mazher

Noman Mazher

and 1 more

July 11, 2022
Cloud computing is the next stage in evolution of the internet, which provides large amounts of computing and storage to customers provisioned as a service over the internet. However, cloud computing faces so many security challenges due to the possible compromise or byzantine failures. In this paper, we focus on Ensuring data storage security in cloud computing, which is an important aspect of Quality of Service (QoS). We propose an effective and flexible distribution verification protocol to address data storage security in cloud computing. In this protocol, we rely on erasure code for the availability, reliability of data and utilize token precomputation using Sobol Sequence to verify the integrity of erasure coded data rather than Pseudorandom Data in existing systems. Unlike prior works, our scheme provides more security to user data stored in cloud computing. The performance analysis shows that our scheme is more secure than existing systems against Byzantine failure, unauthorized data modification attacks, and even cloud server colluding attacks.

| Powered by Authorea.com

  • Home