
Muhammad Ashraf- Faculty Member at Air University
Muhammad Ashraf
- Faculty Member at Air University
About
19
Publications
1,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
146
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (19)
Any attempt that may result in a compromise of information, hence affecting the availability, integrity, or confidentiality of information are considered an intrusion. Intrusion detection systems (IDSs) not only detect such threats; they also effectuate a wide range of response techniques that are implemented in a methodical way relating to the typ...
In recent years, the Internet has facilitated the emergence of social media platforms as significant channels for individuals to express their thoughts and engage in instantaneous interactions. However, the reliance on online reviews has also given rise to deceptive practices, where anonymous spammers generate fake reviews to manipulate the percept...
The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. The development of the IoT has led to the emergence of several solutions in various sectors. However, rapid popularization also has its challenges, and one of the most serious challenges is the security of the IoT. Secu...
The rapid development in quantum computers brings huge risks to traditional cryptographic systems. This paper talks about the integration of PQC-based digital signature schemes to solve challenges posed on Transport Layer Security certificates. In this paper, we give an analysis of the efficacy, security, and performance implications of various sch...
The emergence of quantum computing poses a substantial risk to the security of block chain technology, requiring a transition to post-quantum cryptography (PQC) to protect the future integrity and security of block chain systems. This study provides a comprehensive assessment of integrating post-quantum digital signatures into block chain framework...
Healthcare Cyber Physical Systems (CPS) are vulnerable to cyber risks due to their dependency on wireless communication. Due to its centralized safety features and limited security capabilities, CPS networks need help maintaining network and storage security. This paper suggests a jamming attack detection system for healthcare CPS based on trust an...
The use of drones, also known as unmanned aerial vehicles (UAVs), has significantly transformed multiple industries by providing innovative solutions. The capability of drones to operate above restricted areas and potentially perform malicious activities has generated apprehension regarding the potential risks they may pose. It is essential for gov...
Cybersecurity challenges pose a significant threat to Healthcare Cyber Physical Systems (CPS) because they heavily rely on wireless communication. Particularly, jamming attacks can severely disrupt the integrity of these CPS networks. This research introduces a decentralized system to address this issue. Therefore, this paper suggested a system tha...
Network intrusions through jamming and spoofing attacks have become increasingly prevalent. The ability to detect such threats at early stages is necessary for preventing a successful attack from occurring. This survey chapter thoroughly overviews the demand for sophisticated intrusion detection systems (IDS) and how cutting-edge techniques, like f...
The internet of things (IoT) refers to the network of connected devices embedded in everyday objects that enable digital transformation. The rapid proliferation of IoT devices has led to significant advancements in technology and data exchange capabilities. However, the security of user data and IoT systems has become a paramount concern. This chap...
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current...
In the recent years, alternate models of elliptic curves have been studied. Such well-known models are Edwards curves, Jacobi intersections and Jacobi quartics, Hessian curves, Huff curves, and their variants to the more common Weierstrass curve. These models sometimes allow for more efficient computation on elliptic curves or provide other feature...
During the COVID-19 pandemic, the urgency of effective testing strategies had never been more apparent. The fusion of Artificial Intelligence (AI) and Machine Learning (ML) models, particularly within medical imaging (e.g., chest X-rays), holds promise in smart healthcare systems. Deep Learning (DL), a subset of AI, has exhibited prowess in enhanci...
Numerous sensitive applications, such as healthcare and medical services, need reliable transmission as a prerequisite for the success of the new age of communications technology. Unfortunately, these systems are highly vulnerable to attacks like Sybil, where many false nodes are created and spread with deceitful intentions. Therefore, these false...
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. A high failure rate, low information, and instability in correspondence links recognize them. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and Lossy...
This paper proposes an efficient implementation of multistage, multiple-level DSP algorithms suitable for parallel and distributed processing. To describe our method we selected Mallat's algorithm for two dimensional wavelet transforms (2D-DWT) coefficient computation which has multistage and multilevel processing requirements. We have selected fie...