Nasir Ghani
YOU?
Author Swipe
View article: Pulse-resolved real-time dosimetry in FLASH radiotherapy using Ge-doped silica fiber scintillators
Pulse-resolved real-time dosimetry in FLASH radiotherapy using Ge-doped silica fiber scintillators Open
We present a time-resolved evaluation of a Ge-doped silica fiber scintillator under ultra-high dose-rate (FLASH) radiotherapy conditions delivered by a 6 MeV clinical linear accelerator capable of achieving instantaneous dose rates up to 5…
View article: Overtopping risk of high-hazard embankment dam under climate change condition
Overtopping risk of high-hazard embankment dam under climate change condition Open
Climate change poses an escalating threat to the safety of high-hazard embankment dams, increases flood discharge impacting dam overtopping risk by altering the hydrological load of the original dam designed capacity. This paper’s primary …
View article: Enabling Trustworthy Federated Learning in Industrial IoT: Bridging the Gap Between Interpretability and Robustness
Enabling Trustworthy Federated Learning in Industrial IoT: Bridging the Gap Between Interpretability and Robustness Open
Federated Learning (FL) represents a paradigm shift in machine learning,\nallowing collaborative model training while keeping data localized. This\napproach is particularly pertinent in the Industrial Internet of Things (IIoT)\ncontext, wh…
View article: Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach Open
Distributed Denial of Service (DDoS) attacks pose an increasingly substantial cybersecurity threat to organizations across the globe. In this paper, we introduce a new deep learning-based technique for detecting DDoS attacks, a paramount c…
View article: E-Voting Mobile Application System
E-Voting Mobile Application System Open
Any democracy must have an open voting process that satisfies the demands of the populace in order to assign power to the most qualified candidate. A fair and transparent election system is essential to the freedom that the majority of peo…
View article: Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach Open
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide …
View article: Ransomware Detection Using Federated Learning with Imbalanced Datasets
Ransomware Detection Using Federated Learning with Imbalanced Datasets Open
Ransomware is a type of malware which encrypts user data and extorts payments in return for the decryption keys. This cyberthreat is one of the most serious challenges facing organizations today and has already caused immense financial dam…
View article: Federated Learning Approach for Distributed Ransomware Analysis
Federated Learning Approach for Distributed Ransomware Analysis Open
Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions…
View article: Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution Open
Researchers have proposed a wide range of ransomware detection and analysis schemes. However, most of these efforts have focused on older families targeting Windows 7/8 systems. Hence there is a critical need to develop efficient solutions…
View article: Ransomware Detection and Classification Strategies
Ransomware Detection and Classification Strategies Open
Ransomware uses encryption methods to make data inaccessible to legitimate users. To date a wide range of ransomware families have been developed and deployed, causing immense damage to governments, corporations, and private users. As thes…
View article: Ransomware Detection and Classification Strategies
Ransomware Detection and Classification Strategies Open
Ransomware uses encryption methods to make data inaccessible to legitimate users. To date a wide range of ransomware families have been developed and deployed, causing immense damage to governments, corporations, and private users. As thes…
View article: IoT Threat Detection Testbed Using Generative Adversarial Networks
IoT Threat Detection Testbed Using Generative Adversarial Networks Open
The Internet of Things(IoT) paradigm provides persistent sensing and data\ncollection capabilities and is becoming increasingly prevalent across many\nmarket sectors. However, most IoT devices emphasize usability and function over\nsecurit…
View article: SYNGuard: Dynamic threshold‐based SYN flood attack detection and mitigation in software‐defined networks
SYNGuard: Dynamic threshold‐based SYN flood attack detection and mitigation in software‐defined networks Open
SYN flood attacks (half‐open attacks) have been proven a serious threat to software‐defined networking (SDN)‐enabled infrastructures. A variety of intrusion detection and prevention systems (IDPS) have been introduced for identifying and p…
View article: Remotely Accessible Laboratory For Rapid Prototyping
Remotely Accessible Laboratory For Rapid Prototyping Open
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract Remotely Accessible Laboratory for Rapid Prototyping Abstract The Rapid Prototyping (RP) Laboratory1 was established in Fall 2003 and f…
View article: Delay-Aware SFC Provisioning in Hybrid Fog-Cloud Computing Architectures
Delay-Aware SFC Provisioning in Hybrid Fog-Cloud Computing Architectures Open
Network function virtualization (NFV) technology enables service providers to implement software-based network processing functionalities on standard computing servers (nodes). As such, this approach mandates the need for mapping virtual n…
View article: Deep Learning for Service Function Chain Provisioning in Fog Computing
Deep Learning for Service Function Chain Provisioning in Fog Computing Open
Cloud and fog computing along with network function virtualization technology have significantly shifted the development of network architectures. They yield in reduced capital and operating expenditures, while achieving network flexibilit…
View article: A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems Open
The continuing increase in air traffic, along with airline operators gradually adopting IP-based network technologies, has led to the transformational concept of e-Enabled or “connected” aircraft. This new framework envisions a single aero…
View article: Bitcoin Concepts, Threats, and Machine-Learning Security Solutions
Bitcoin Concepts, Threats, and Machine-Learning Security Solutions Open
The concept of Bitcoin was first introduced by an unknown individual (or a group of people) named Satoshi Nakamoto before it was released as open-source software in 2009. Bitcoin is a peer-to-peer cryptocurrency and a decentralized worldwi…
View article: On the Development of Machine Learning – Based Application Framework for Enhancing Performance of Livestock Mobile Application Systems in Poor Internet Service Areas
On the Development of Machine Learning – Based Application Framework for Enhancing Performance of Livestock Mobile Application Systems in Poor Internet Service Areas Open
In this paper, authors developed an intelligent subsystem which manages training set, finds high accuracy models, selects best model to be used, computes prediction, stores in the database, and sends to the user interface through internet …
View article: Optimal Traffic Scheduling for Intrusion Prevention Systems
Optimal Traffic Scheduling for Intrusion Prevention Systems Open
A major challenge for intrusion prevention system (IPS) sensors in today’s Internet is the amount of traffic these devices have to inspect. Hence this paper presents a linear program (LP) for traffic scheduling in multi-sensor environments…
View article: QoS Performance Evaluation of Disjoint Queue Scheduler for Video-Applications over LTE-A HetNets
QoS Performance Evaluation of Disjoint Queue Scheduler for Video-Applications over LTE-A HetNets Open
Long Term Evolution-Advanced (LTE-Advanced) supports both the use of Carrier Aggregation (CA) and the use of Heterogeneous Networks (HetNets). The main contribution of this paper was in modifying the LTE-Sim simulator to support the use of…
View article: A Network Planning and Management Tool for Mitigating the Impact of Spatially Correlated Failures in Infrastructure Networks
A Network Planning and Management Tool for Mitigating the Impact of Spatially Correlated Failures in Infrastructure Networks Open
International audience