
Muhammad Azhar Mushtaq- Master of Science
- Professor (Assistant) at University of Sargodha
Muhammad Azhar Mushtaq
- Master of Science
- Professor (Assistant) at University of Sargodha
About
35
Publications
22,344
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
167
Citations
Introduction
Muhammad Azhar Mushtaq currently works at the Department of Computer Science and IT, University of Sargodha. Muhammad does research in Computer and Network Security. Their current project is 'Security Challenges in IOT'.
Current institution
Publications
Publications (35)
A centralized data transaction mechanism for Internet of Things-enabled MANETs is presented in this dissertation. Through the use of Deep Neural Networks (DNN) for intrusion detection and the Moth Flame Optimization Algorithm (MFOA) for effective routing, the model improves network security, lowers energy consumption, and increases throughput while...
In this article, the author describes a new approach for automatic test case generation realized based on Residual Neural Networks (ResNet) and DBSCAN clustering. We successfully improve test case accuracy and reduce user engagement while not impacting testing performance by combining ResNet for pattern recognition with DBSCAN for managing noisy da...
Despite the many benefits of lifestyles and automation, through the Internet of Things, there are risks involved as most of the devices interconnect because of insecurity, compromised devices, and weak encryption. The protectors of cyber security are Intrusion Detection Systems, which are similar to detecting insurgencies by carefully assessing the...
In today's fast-paced digital economy, businesses increasingly rely on Cloud Transformation, Cyber Security Integration, and 5G Adoption to enhance Business Network Performance and maintain competitive advantage. This study examines how these three factors contribute to business efficiency, security, and digital scalability across enterprises in No...
The most significant part of the human body is the brain. It regulates and plans how we act and communicate. The complexity of the brain's architecture is a significant hurdle in necessitating prompt and correct diagnosis. Early diagnosis improves survival prospects and
Side-channel attacks have become increasingly important in the dynamic field of cybersecurity, posing a challenge to the security paradigms of cryptographic systems and implementations. The goal of this thorough review paper is to give a thorough understanding of side-channel assaults by examining the various kinds, subtypes, and difficulties that...
Thalassemia is a hereditary condition where the body is unable to manufacture enough hemoglobin. Made up of alpha and beta globin proteins, hemoglobin is the most important component of red blood cells (RCB) that delivers oxygen throughout the body. Alpha and beta-globin genes are either rare or nonexistent, which results in alpha and beta-thalasse...
The exponential expansion of Cloud computing has resulted in a solution revolution within data storage and employ, but it has also increased security concerns. Typically, traditional cryptographic methods fail to find the right balance between security strength and performance efficiency in resource-poor cloud environment. This study, therefore, fo...
________________________________________________________________________________________________________ Abstract: This research paper explains the structural design, implementation and working process of an IoT-based Energy Meter for solar energy measurement with the ESP32 microcontroller and using the Blynk 2.0 application. The project makes the...
Analyzing the specificity of the cybersecurity domain, the problem of ensuring the security and integrity of smart networks is multifaceted. This research explores the complexity of smart network forensics and seeks to meet theses challenges through different approaches. First, to establish the subject of the investigation, the context is described...
This study proposes a novel methodology for classifying ocular diseases using convolutional neural networks (CNNs) and specialized loss functions. The proposed model architecture incorporates a convolutional layer, global average pooling, ReLU activation, and novel loss functions (FL and CILF) to improve classification performance. The CNN architec...
Content-Centric Networking (CCN) is an innovative approach that emphasizes content. A key strategy in CCN for spreading data across the network is in-network caching. Effective caching methods, including content placement and removal tactics, enhance the use of network resources. Cache replacement, also known as content eviction policies, is essent...
Threats based on social engineering in social networks are becoming a more common problem. Social engineering is a type of attack that relies on trickery and exploiting human psychology to gain access to confidential information or resources. It involves deceptive techniques like phishing, pretexting, and baiting, tricking individuals into revealin...
Abnormality identification is essential in brilliant home frameworks for upgraded well-being, security, and effectiveness. This study looks at the presentation of three AI calculations-arbitrary woods, support vector machines, and strategic helping-utilizing shrewd home sensor information. Strategic supporting beat different techniques in exactness...
Skin disease is a common medical condition that affects the outer layer of our body and requires early intervention to prevent it from becoming life-threatening. The techniques of deep learning have been developed as a necessary tool for identifying skin diseases, attracting the attention of researchers. In this review, we examine the efforts of re...
The skin serves as the primary line of protection against oxidative damage by UV rays on the outside of the body. Skin cancer is now the most often reported malignancy in the world, having a great effect on the economy as well as public health. The most frequent kind of cancer in Caucasians, encompassing both melanoma and non-melanoma, is skin canc...
A major cause of death around the globe is liver cancer. Liver cancer is the fourth most prevalent cause of cancer-related deaths worldwide and the sixth most often diagnosed malignancy, by the World Health Organization. Recently, it was estimated that there were about 830,180 liver cancer deaths and 905,677 new instances of the disease globally. S...
________________________________________________________________________________________________________ Abstract: A tumor is a bloating or irregular growth caused by uncontrolled and unorganized cell division. Brain tumors are a hazardous type of tumor. Tumors in the brain are categorized into a few grades based on their severity. The grade, type,...
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That's why there is a need for such a method at which we can rely on secure co...
In current situation of COVID 19 (Corona Virus Disease 19) governmental institutes throughout the world try to develop a monitoring system that inform about confirmed cases around. Many researcher proposed a Blockchain based applications for this purpose. The major idea behind Blockchain based system for monitoring is quality services, data handlin...
With the advancement in internet technologies, data
communication via the internet has been increasing day by day.
Everybody, who is on the global network, may anguish about the
safety of there sensitive data, information security, and privacy.
Therefore, security threat has become the global complication in the
world and this complication is...
In today's era with the fast adaption of internet communication, the exchange of data among individuals, government sectors and corporate levels have increased. Unauthorized users are always on the outlook to steal the conversations that take place on the internet Therefore; protecting data during transmission from unauthorized users is the most im...
In the modern era of Information and communication network security becomes a major concern for researchers. Unauthorized users may interrupt the communication; therefore, researchers are trying to protect data during information exchange using various cryptographic techniques. Cryptography is the science of encrypting data which keeps the message...
In the past few years block chain has gained lot of popularity because blockchain is the core technology of bitcoin. Its utilization cases are growing in number of fields such as security of Internet of Things (IoT), banking sector, industries and medical centres. Moreover, IoT has expanded its acceptance because of its deployment in smart homes an...
Today human and information processing system both need rapid access to anything they want on the internet. To fulfill these needs more and more internet service providers with a large amount of bandwidth are introducing themselves in the market. For these providers, a lot of bandwidth is free during off-peak hours while during peak hours the total...
Since the beginning of crypto currency in 2008, blockchain
technology rise as progressive technology. Despite the fact
that blockchain began off as a core technology of Bitcoin, its
utilization cases are growing to numerous fields such as,
security of Internet of Things (IoT), banking sector,
industries and medical etc. In recent years IoT has gain...
Traffic on highways are on rapid growth from past few years; it is proposed to deploy enhanced firebase Wireless Sensor Network (EFBWSN) with appropriate Media Access Control (MAC) protocol that should be capable of handling energy conservation along with high rate of data delivery. Proposed firebase MAC protocol (FBMH) can conserve energy and also...
Computer and network attacks have become highly sophisticated and complex with different names and multiple characteristics. In order to understand and find solutions against new and old attacks, different types of computer and network taxonomies are utilized. However, such taxonomies are being actively developed for expert users; research efforts...
IEEE 802.15.4 is a new standard for wireless networking which reduced the problem of high cost and high energy consumption communication. We design a Wireless Sensor Network (WSN) at railway crossing gate by using zigbee technology which is based on IEEE 802.15.4 standard. This technology posse's characteristic such as low data rate, low cost and l...