Firdous Kausar
YOU?
Author Swipe
View article: A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments
A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments Open
The metaverse represents a transformative integration of virtual and physical worlds, offering unprecedented opportunities for social interaction, commerce, education, healthcare, and entertainment. Establishing trust in these expansive an…
View article: A Review on Blockchain-Based Trust & Reputation Schemes in Metaverse Environments
A Review on Blockchain-Based Trust & Reputation Schemes in Metaverse Environments Open
The metaverse represents a transformative integration of virtual and physical worlds, bring- 2 ing unprecedented opportunities for social interaction, commerce, education, healthcare, 3 and entertainment. Establishing trust in these expans…
View article: A Secure and Privacy-Preserving Approach to Healthcare Data Collaboration
A Secure and Privacy-Preserving Approach to Healthcare Data Collaboration Open
Combining a large collection of patient data and advanced technology, healthcare organizations can excel in medical research and increase the quality of patient care. At the same time, health records present serious privacy and security ch…
View article: Blockchain-Integrated Federated Learning Framework for Detecting False Data Injection Attacks in Power Systems With Homomorphic Encryption
Blockchain-Integrated Federated Learning Framework for Detecting False Data Injection Attacks in Power Systems With Homomorphic Encryption Open
False Data Injection Attacks (FDIAs) pose a substantial risk to the reliability and stability of Cyber-Physical Power Systems (CPPS). While federated learning (FL) has emerged as a promising approach to detect such attacks without exposing…
View article: Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems Open
Cyber-physical power systems (CPPS) integrate information and communication technology into conventional electric power systems to facilitate bidirectional communication of information and electric power between users and power grids. Desp…
View article: NDNOTA: NDN One-Time Authentication
NDNOTA: NDN One-Time Authentication Open
Named Data Networking (NDN) stands out as a prominent architectural framework for the future Internet, aiming to address deficiencies present in IP networks, specifically in the domain of security. Although NDN packets containing requested…
View article: Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking Open
Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) re…
View article: Energy Demand Forecasting for Electric Vehicles Using Blockchain-Based Federated Learning
Energy Demand Forecasting for Electric Vehicles Using Blockchain-Based Federated Learning Open
The widespread adoption of electric cars (EVs) can be attributed to their many advantages over conventional gas-powered automobiles. However, there may be difficulties in incorporating EVs into the grid due to increased energy demand and p…
View article: Leveraging ICN and SDN for Future Internet Architecture: A Survey
Leveraging ICN and SDN for Future Internet Architecture: A Survey Open
Information-Centric Networking (ICN) and Software-Defined Networking (SDN) are both new evolving network architectures that are receiving a lot of attention from researchers. ICN is a Future Internet architecture which tries to transform t…
View article: Automated Machine Learning based Elderly Fall Detection Classification
Automated Machine Learning based Elderly Fall Detection Classification Open
As we grow older, one of the most concerning aspects of our lives becomes increasingly challenging to manage our health. Fall is a leading cause of health problems or death in the elderly population. Using a wearable sensors device, this r…
View article: Federated Learning and its Applications for Security and Communication
Federated Learning and its Applications for Security and Communication Open
The not so long ago, Artificial Intelligence (AI) has revolutionized our life by giving rise to the idea of self-learning in different environments. Amongst its different variants, Federated Learning (FL) is a novel approach that relies on…
View article: 6G technology and taxonomy of attacks on blockchain technology
6G technology and taxonomy of attacks on blockchain technology Open
View article: Iris based cancelable biometric cryptosystem for secure healthcare smart card
Iris based cancelable biometric cryptosystem for secure healthcare smart card Open
View article: Developing an IoT Platform for the Elderly Health Care
Developing an IoT Platform for the Elderly Health Care Open
The health care of elderly people addresses the necessity for services that utilize recent technologies and devices. Now-a-days, both loneliness and psychological depressions are typical problems which elderly people face because of living…
View article: Cancelable Face Template Protection using Transform Features for Cyberworld Security
Cancelable Face Template Protection using Transform Features for Cyberworld Security Open
Cyber world becomes a fundamental and vital component of the physical world with the increase of dependence on internet-connected devices in industry and government organizations. Provision of privacy and security of users during online co…
View article: Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems
Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-based eHealth Systems Open
IoT-based systems have considerable dynamic behavior and heterogeneous technology participants. The corresponding threats and security operations are also complex to handle. Traditional security solutions may not be appropriate and effecti…
View article: Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone
Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone Open
Smartphones play an important role in our lives. With the advent of applications for smartphones, the more functionalities and services are offered to users. Online social networks (OSN) applications are the most popular applications world…
View article: A Comparative Analysis of Privacy Preserving Techniques in Online Social Networks
A Comparative Analysis of Privacy Preserving Techniques in Online Social Networks Open
The world became a global village due to the great revolution in communication and network fields. The internet eases the communication process all over the world. The social network services, for example; Facebook, that occurred recently …