Zobrazeno 1 - 10
of 71
pro vyhledávání: '"Asif Masood"'
Publikováno v:
IEEE Access, Vol 12, Pp 110992-111006 (2024)
The Internet of Vehicles (IoV) is an incipient topic within the wider domain of the Internet of Things (IoT). Using this technology intelligent transportation systems (ITS) can be developed, whose main purpose is to ensure more safety, faster travel,
Externí odkaz:
https://doaj.org/article/a638095147354f9a864cb357f110c3af
Autor:
Muhammad Qasim, Muhammad Waleed, Tai-Won Um, Peyman Pahlevani, Jens Myrup Pedersen, Asif Masood
Publikováno v:
IEEE Access, Vol 12, Pp 28898-28910 (2024)
Cyberspace faces unparalleled threats due to the rapid rise in botnet attacks and their profound repercussions. Utilizing AI-assisted systems emerges as a potent solution for detecting and neutralizing such attacks. Existing research on botnet attack
Externí odkaz:
https://doaj.org/article/9c460e1e102442bbb72a6965b61caf10
Autor:
Asif Masood
Publikováno v:
NUST Journal of Engineering Sciences, Vol 1, Iss 1 (2008)
A curve approximation technique, based on growing quadratic and cubic Bezier, is presented in this paper. The approximating curve starts growing along the given curve till it reaches to the end. It determines the suitable location of control points i
Externí odkaz:
https://doaj.org/article/de7e1c39ed674471ae403ab6610c9da2
Publikováno v:
Cluster Computing. 26:237-254
Publikováno v:
Future Generation Computer Systems. 125:652-660
Insider threats are one of the most challenging and growing security threats which the government agencies, organizations, and institutions face. In such scenarios, malicious (red) activities are performed by the authorized individuals within the com
Publikováno v:
2022 Australian & New Zealand Control Conference (ANZCC).
Publikováno v:
IEEE Network. 35:220-225
Public Key Infrastructure (PKI) has been considered to be an enabler of secure communication, while, due to its complex and centralized design, there have been instances in the past for Certification Authority's (CA) misbehaving and publishing rogue
Publikováno v:
2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
Publikováno v:
Cluster Computing. 24:3551-3571
In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access
Publikováno v:
Future Generation Computer Systems. 117:245-258
Role Engineering creates a model for enforcing security among organizations and reduces the risk of entities having unauthorized access privileges. In this paper, we realize the role engineering for the organizations where services are associated wit