-
Chapter
Bitcoin Blockchain System: An Overview of Security and Privacy Aspects
Apart from creating a billion-dollar worth of cryptocurrency ecosystem, Bitcoin revolutionized the whole domain of cryptocurrencies, and it largely influenced many other application areas (e.g., healthcare, su...
-
Chapter
Blockchain-Based Distributed and Secure Digital Forensic Investigation Systems
Lawful evidence management by law enforcement agencies during the Digital Forensics (DF) investigation is of supreme importance since it convicts suspects of crimes. Therefore, a secure and efficient evidence ...
-
Article
Investigation of ultrafast carrier dynamics in curcumin dye for environment friendly dye-sensitized solar cell
Natural dyes have been widely employed in the fabrication of dye-sensitized solar cells (DSSCs). DSSCs are favored for their cost-effective, and simple fabrication process relies on metal-based and organic dye...
-
Article
EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT
Internet of Medical Thing (IoMT) is an emerging technology in healthcare that can be used to realize a wide variety of medical applications. It improves people’s quality of life and makes it easier to care for...
-
Article
Advanced materials for sustainable energy and applications
-
Article
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing
The Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular applications. However, still there exists latency related issu...
-
Article
HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
Nowadays, the number of Distributed Denial of Service (DDoS) attacks is growing rapidly. The aim of these type of attacks is to make the prominent and critical services unavailable for legitimate users. HTTP f...
-
Chapter and Conference Paper
Anomaly-Based DNN Model for Intrusion Detection in IoT and Model Explanation: Explainable Artificial Intelligence
IoT has gained immense popularity recently with advancements in technologies and big data. IoT network is dynamically increasing with the addition of devices, and the big data is generated within the network, ...
-
Chapter and Conference Paper
Feature Selection and Deep Learning Technique for Intrusion Detection System in IoT
The Internet of Things (IoT) is gaining popularity nowadays as widely used in many fields including health care, home automation and industry. Large number of devices are connected in IoT networks, and the dev...
-
Chapter and Conference Paper
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbuc...
-
Article
Hydrogenation properties and kinetic study of MgH2 - x wt% AC nanocomposites prepared by ball milling
The high de-/hydrogenation temperature of magnesium hydride is still a challenge in solid-state hydrogen storage system for automobiles applications. To improve the hydrogenation properties of MgH2, we select act...
-
Article
Catalytic effect on hydrogen de/absorption properties of MgH2 − x wt% MM (x = 0, 10, 20, 30) nanomaterials
Reversible hydrogen storage in MgH2 under specified conditions is a possible way for the positive reception of hydrogen economy, in which the developments of cheap and highly efficient catalysts are the major cha...
-
Chapter and Conference Paper
Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services
Ride-Hailing Service (RHS) has motivated the rise of innovative transportation services. It enables riders to hail a cab or private vehicle at the roadside by sending a ride request to the Ride-Hailing Service...
-
Article
Reliable and secure data transfer in IoT networks
With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, Io...
-
Article
TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
Internet of Things (IoT) employs a large number of sensors and actuators to collect and act upon data for its smart functionalities. These devices are considered as a part of the Low-power and Lossy Networks d...
-
Article
Mobility-Aware and Radio Characteristics Enabled Routing for Video Streaming over MANETs
Providing an adequate level of quality-of-experience (QoE) for multimedia applications in mobile ad-hoc networks (MANETs) is a challenging task due to its environmental characteristics, such as dynamic network...
-
Chapter and Conference Paper
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud
Location-based services (LBSs) are widely deployed in commercial services. These services always depend on a service provider, e.g., a cloud server, to store the enormous amounts of geospatial data and to proc...
-
Article
Lightweight solutions to counter DDoS attacks in software defined networking
A distributed denial of service (DDoS) attack on any of the major components (e.g., controller, switches, and southbound channel) of software defined networking (SDN) architecture is a critical security threat...
-
Chapter
Secure Machine to Machine Communication in Industrial Internet of Things
In todays world, Internet of Things (IoT), is an emerging technology, where many smart devices are connected with each other. The rapidly growing deployment of IoT in real-world applications and the advancement i...
-
Chapter and Conference Paper
Enhancing QoS for Multimedia Services Using Mobility-Aware Bandwidth Estimation Algorithm in MANETs
Over the years, a large array of multimedia services started using mobile ad hoc networks (MANETs) due to its attractive features such as low-cost quick deployment, node mobility, and distributed networking. H...