
Muhammad Zulkifl Hasan- PhD
- Principal Lecturer at University of Central Punjab
Muhammad Zulkifl Hasan
- PhD
- Principal Lecturer at University of Central Punjab
About
112
Publications
32,613
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
184
Citations
Introduction
Muhammad Zulkifl Hasan is an eminent scholar and PhD candidate at Universiti Putra Malaysia, specializing in the forefront domain of IoT Security. With over 14 years of extensive experience, he has carved a niche in the academic and research landscapes, underscoring his profound expertise in cyber security, data communication, and machine learning.
Current institution
Additional affiliations
October 2020 - present
Education
October 2020 - August 2024
Publications
Publications (112)
With the growing adoption of cryptocurrencies, Bitcoin has emerged as a prominent player in the global financial landscape. However, its decentralized and pseudonymous nature has made it an attractive target for fraudulent activities. This paper presents acomprehensive exploration of fraud detection techniques specifically tailored to Bitcoin trans...
Intrusion detection forms an important element to security in the realm of Internet of Things since it aids early identification of any incidence to compromise with the system. In the case of IoT contexts, intrusion detection processes are often futile due to the sheer volume of data produced by these gadgets. Hence, deep learning and several state...
In the digital era, the proliferation of hate speech on social media platforms has necessitated the development of effective detection systems. This paper presents a comprehensive comparative analysis of machine learning and deep learning approaches for hate speech classification across diverse datasets, including a thorough comparison with existin...
Prior studies on behaviour-based threat detection on Internet of Things (IoT) device networks have generated machine-learning models with a limited and frequently unproven capacity to learn from unseen data. In this study, we provide a generalizability-focused modelling technique for IoT network assaults that also improves detection and performance...
This study investigates parallel and distributed computing by concentrating on well-known algorithms: MapReduce, Bulk Synchronous Parallel (BSP), and Message Passing Interface (MPI). Their applications, strengths, and approaches are highlighted in the study. It examines related research that shows the successful application of parallel and distribu...
The modern digital age has seen an exponential growth in internet
penetration, which in turn has increased the probability of a denial-of-service
attack. When an evil user launches a Denial of Service (DoS) attack, it’s with
the goal of flooding computing and network resources and blocking access to
them for normal users. These kind of assaults may...
The 21st century has placed demands on higher-order thinking skills (HOTS) in the education sector. Reading provides learners with plenty of information in many different fields, and the readers can gain different and up-to-date knowledge. However, reading is regarded as one of the most complex skills to be learned and taught, and EFL learners face...
Attackers are constantly developing new strategies to fool users into disclosing critical information, making phishing attacks one of cybersecurity’s most prevalent and severe dangers. Researchers have suggested various techniques for identifying and avoiding phishing attempts, including machine learning-based strategies. This article uses machine...
Cloud computing has become an integral part of our lives, allowing us to store and access data quickly and easily. Unfortunately, cybercriminals have developed increasingly sophisticated techniques to exploit network vulnerabilities and bring them down. This paper proposes using two pre-trained deep learning models, VGG16 and ResNet50, to classify...
The examination covers multiple facets of sustainable energy, such as renewable energy sources, energy consumption trends, and advancements in sustainable energy technologies. The data demonstrates significant patterns and changes in the worldwide energy situation during this timeframe, emphasizing the growing significance of renewable energy sourc...
Recently, there has been a notable use of deep learning methodologies, namely convolutional neural networks (CNNs), in computer vision, specifically about the significant matter of object recognition. The "You Only Look Once" (YOLO) technique is a strategy that offers a rapid and dependable approach for detecting objects in both static and dynamic...
In the realm of Wireless Sensor Networks (WSNs), the detection and mitigation of sinkhole attacks remain pivotal for ensuring network integrity and efficiency. This paper introduces SFlexCrypt, an innovative approach tailored to address these security challenges while optimizing energy consumption in WSNs. SFlexCrypt stands out by seamlessly integr...
The security of the Web is a significant issue for personal, corporate, and state users in the context of digitalisation. With all kinds of activities related to the Internet growing, different types of threats also emerge, including phishing, malware, ransomware, and others which threaten personal information, funds, and critical system structures...
Breast cancer today continues to be a worthy global health concern because its early diagnosis has effective treatment means that make it come with efficient diagnostic techniques. In this paper, a new procedure is proposed to deal with breast ultrasound image segmentation with an intention of improving the identification of breast cancer lesions....
With the continuous growth of the Internet of Things (IoT), LPWAN becomes more meaningful in order to have sustainable and extremely distributed connectivity while being energy efficient. In this review article, the security challenges that create serious risks in LPWAN deployments are examined, which are important in different IoT applications lik...
Distributed Denial of Service (DDoS) attacks are the major issues that introduce disruption of accessibility and reliability of the network services. The purpose of this paper is to demonstrate an overall recognized machine learning based system that can efficiently identify and classify DDoS attacks using a rich dataset allowing us to work with va...
One of the key areas where Artificial Intelligence (AI) can counteract the forces of destruction and promote sustainability is intelligent decision-making, resource allocation, and minimizing environmental impact. This paper focuses on how AI aids environmental surveillance, energy management, waste management, and sustainable agriculture. AI-power...
The heart plays a pivotal role in the functioning of living organisms, making its diagnosis and prediction of related diseases a matter of utmost importance. Approximately 17.9 million individuals succumb to cardiovascular disease, accounting for 32% of worldwide fatalities. This global concern highlights the importance of early detection, as timel...
The research paper evaluates the limitations of the Analysis of Host-Based and Network-Based Intrusion Detection System article regarding open-source host-based intrusion detection systems OSSEC and Snort while developing and presenting an AI-based intrusion detection system that improves detection accuracy, reduces false positives, and supports sc...
This paper thoroughly analyzes an airline passenger satisfaction survey dataset by employing Exploratory Data Analysis (EDA) and machine learning modeling by leveraging Python-based libraries including Pandas, NumPy, Seaborn, Matplotlib and a few others. Through EDA, we examine diverse aspects of the dataset, encompassing flight attributes, delays,...
The separation and categorization of marine species are of great significance for determining which interact differently among themselves and whether such interaction influences the maintenance of biodiversity in the marine ecosystem. In this study, we present a comparative analysis of various artificial intelligence (AI) models applied to the clas...
Online retailers should study customer behavior to strengthen their digital presence and sales techniques. This research uses data to analyze online purchase customer behavior dynamics. This study uses sophisticated analytics to find patterns and trends in a huge dataset from several e-commerce platforms that affect consumer interactions and purcha...
The recent development of AI technology has created a discussion on how the new powerful tool affects the art world and traditional artists adversely. Yet some people insist that AI art generation is a threat to artists because it can replace them. Some people will consider it as an improved tool, which can complement the traditional methods of cre...
The emergence of Internet of Things (IoT) technologies has led to the development of smart cities, potentially improving urban life through efficient and effective use of resources. The success of IoT-based applications in smart cities is contingent on several factors, including network power challenges. Deploying IoT-based applications in smart ci...
This study is a comprehensive crosscountry survey of Netflix content production to identify the dominant countries developing the global catalog of the streaming platform. Rich dataset with show and movie descriptions, release year, production channel, observation, and original condition. Data collection, cleaning, and analysis of content levels, m...
Encrypting viruses are computer viruses that, if not identified, can cause serious problems. For routine activities, the whole world depends on computer frameworks. Encoding viruses are thought to be among the most dangerous viruses because, once infected, they may begin scrambling the basic and secret records in general and documents saved on your...
This paper presents an overview of the Intrusion Detection system for In-Vehicle Networks which is a competition designed to provide security professionals with an opportunity to enhance their knowledge and experience in the field of car hacking and defense. The competition involves teams of professionals who compete in a simulated environment to d...
The dangers that Internet of Things (IoT) devices pose to large corporate
corporations and smart districts have been dissected by several academics. Given the
ubiquitous use of IoT and its unique characteristics, such as mobility and
normalization restrictions, intelligent frameworks that can independently detect
suspicious activity in privately li...
This paper compares the efficiency of five supervised learning algorithms, Namely Naïve Bayes, Decision Tree, Random Forest, K-Neighbors (KNN), and Long Short-Term Memory (LSTM) on intrusion detection using the UNR-IDD dataset. We analysed the results of the models considering the accuracy, precision, and F1-score. The Decision Tree, Random Forest,...
In the modern fast-developing business environment, logistics efficiency of supply chains is crucial. This study investigates human capital as an essential aspect of improving supply chain management. Recent research shows increasing awareness of the critical role skilled workers play in developing a successful supply chain. This entails the coordi...
The introduction of artificial intelligence (AI) in supply chain management signals a new revolution that brings massive improvement to operational efficiencies and opens novel ways for solving complicated issues. AI applications for demand forecasting, warehouse and inventory management, logistics, transportation optimization, and supplier relatio...
Cryptocurrencies have gained a lot of attention in the last 12 years after the launch of Bitcoin's decentralized system which allows direct online payments, Bitcoin opens up the way for many other digital currencies and coins like BNB, Ethereum, ETC (Ethereum Classic), XRP (Ripple), and many others. Many developed countries like America, Germany, F...
The fact that cloud storage is increasingly becoming part of our lives today, underscores the imperative of safeguarding data integrity as part of the cloud computing security. Moreover, in spite of the obvious benefits of cloud computing allowing to optimize resource usage and downscale infrastructure cost, the fact that the number of cyber-attack...
This research focuses on enhancing the efficiency of
Atmospheric Water Generation (AWG) systems through the
development of an accurate weather prediction model. Leveraging
solar energy data, the project aims to forecast key weather
parameters such as solar radiation, temperature, and humidity.
The objective is to optimize the performance of the AWG...
Software systems are installed and configured by
default; there are security loopholes that could be exploited
even though the vast majority of internet users do not yet have
a strong sense of security even though more. As the number of
nodes with Internet access increases, more and more data is
being generated on the Internet itself and among thos...
Skin diseases present a complex challenge for mechanical analysis due to the inherent irregularities in skin texture, varying complexions, and the presence of hair and other surface features. The need for an accurate and automated system for skin disease detection is paramount. However, the task is compounded by issues such as dataset imbalance and...
Passive Optical Networks (PONs) serve as the cornerstone of Fiber-to-the-Home (FTTH) connectivity, promising enhanced broadband capabilities for users worldwide. In our research, we embark on a thorough examination of an array of PON types, notably EPON, GPON, 10G-PON, 10GEPON, NG-PON1, NG-PON2, and NG-PON3. Our methodology integrates both quantita...
This paper analyzes the CIC-MalMem-2022 dataset focusing on obfuscated malware detection through memory analysis. The dataset comprises a balanced collection of benign and malicious memory dumps, encapsulating prevalent real-world malware families such as Trojan Horse, Spyware, and Ransomware. Our methodology involves data preprocessing, feature ex...
This book presents an overview of the blockchain-based internet of things systems, along with the opportunities, challenges, and solutions in diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network.
· Elaborates...
The Internet of Things (IoT) is transforming everyday objects. However, the limited memory, processing power, and network capabilities of its devices make them susceptible to security breaches. The Routing Protocol for Low-Power and Lossy Networks (RPL) is a promising IoT protocol but faces significant security challenges. Existing research often f...
Data mining has been used to enhance the health care area identifies the use of efficient survival prediction models in health care. This work also reviews modern approaches to machine learning; the deep learning straightforward, ensemble, and explainable models applicable in improving the survival estimate regardless of medical illnesses. This exa...
As it arises above the horizon, the fifth generation will make a huge impression in this world. The 5G network, a cutting-edge technology, connects and transforms the entire world through secure communication. This paper provides an overview of 5G networks which focuses on how it will specifically address the issues related to giving up cellular st...
In the recent years, cloud computing has stepped into the shoes of the conventional IT, featuring scalability, flexibility, and cost-effectiveness among others. Despite the distributed nature of cloud infrastructure and the dynamic allocation of virtual resources though, these present unique challenges to the investigators looking to collect and pr...
The main purpose of edge computing is to provide real-time services, such as cloud gaming and virtual collaboration, which are closer to users thereby reducing latency. However, dynamically pairing users with appropriate edge servers becomes an increasing problem due to a changing and adaptable network environment and different latency requirements...
This study tries to offer a complete review of database concepts, semantics, and query languages. A data model is a theoretical data representation that specifies the structure, connections, and restrictions of data in a certain area. It allows you to organise and categorise data for easier organisation, access, and management. A query language is...
This paper focuses on the implementation of machine learning algorithms to improve security in the Internet of Things (IoT) environment. IoT is becoming an essential part of our daily lives, and security is a significant concern in this domain. Traditional security measures are not enough to protect IoT systems from the increasing number of cyber-a...
Cloud computing has also provided significant benefits to companies and individuals. With cost-effective services accessible anywhere on the earth with just the Internet, the cloud has been a great source of computing power, with thousands of servers connected to provide users with a better experience and speed. Security in the cloud is a big conce...
Cloud computing is the collection of excellent services (storage, databases, etc.) provided to customers and organizations over the internet to fulfill their requirements efficiently. Everything depends on the internet, and you can access your data anywhere. On the other hand, cloud service clients must ensure that the outsourced backup is secure e...
To examine the impact of drinking and driving-related motor vehicle crash on fatalities in the US. The paper used cross-sectional data of the US covering 50 states, District of Columbia and Puerto Rico of 2020. The paper used linear regression to estimate the likelihood of death from drinking and driving-related motor vehicle crashes. Some age grou...
Cloud computing security refers to data protection, while data integrity refers to the reliability of the data. Integrity and security of data are not the same things. Therefore, both of them are very important in the field of cloud computing. A primary concern of users related to Cloud Computing is data security and integrity. The purpose of this...
A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats...
Parkinson’s disease is a progressive and debilitating neurodegenerative disorder affecting millions of people worldwide. The disease is characterized by motor symptoms such as tremors, rigidity and postural instability, as well as non-motor symptoms such as depression and cognitive impairment. While there is no cure for Parkinson’s disease, there a...
The DDoS (Distributed Denial of Service) attack is a type of Cyberattack in which multiple attackers aim to attack different network resources like a server or a website. Although many statistical methods have already been designed for DDoS attack detection, designing a real-time detector with low computational overhead is still one of the main con...
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and tremendously developing recently as computing technologies have brought about a significant revolution. Their applications and implementations can be found all around us, either individually or collaboratively. WSN plays a leading role in developing the general f...
Blockchain is a system recording data that makes it difficult or impossible to alter, hack, or defraud the system. A blockchain is a digital ledger of transactions replicated and distributed over computer servers. Blockchain technology is a significant new financial innovation radically reshaping corporate transactions. It is a decentralized networ...
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known
as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes.
A person or corporation that does ethical hacking and receives incentives from a network or system owner fo...
Recommendation services become an essential and hot research topic for researchers nowadays. Social data such as Reviews play an important role in the recommendation of the products. Improvement was achieved by deep learning approaches for capturing user and product information from a short text. However, such previously used approaches do not fair...
Nowadays, individuals are getting steadily dynamic in achieving the possible ways to clean their environment. The
concerned teams have initiated other developments to build tidiness. Previously, prior data on filling the trash container was
required, which cautions and sends cautioning messages to the city workers for cleaning the trash receptacle...
In recent years, research has combined the connection of agricultural equipment to increase crop growth rates and lower planting costs by refining the entire planting process. IT-enabled agriculture has beneficial effects on this industry and is yet a source of debate in academic circles. Trending network technologies like WSN and IoT have never be...
Digital Image Processing (DIP) is a rich field which provides us information of objects that are not easy to understand or about which a human does not know. Digital Image Processing has algorithms, machine learning, computer graphics and pattern recognition which are used to identify objects. Digital Image Processing helps in trace vehicles their...
Technology is becoming a major part of each individual’s life. The modern society is saturated with technology and cannot be separated from technology. Now a days, every person is using many number of devices and systems. Code Vision is a mobile application which is created for e-learning purposes. So we are emerging entertainment and education tog...
“Computing for Use” is a reality in the form of a private, public, or mixed Cloud. The raincloud ontology, its contributions, and their importance will be examined in depth as a result of our study. This new study is based on previously conducted studies, including the research questions and methods for insertion and deletion that have been used. I...
Cloud computing is a malleable, reliable and low coast platform for commercial and IT applications and their services over the Internet. Its powers many technologies like service-oriented architecture, virtualization. Cloud Computing Security (CCS), consists of a variety of policies, procedures, controls and technologies that combine to provide sec...
Mobile Ad Hoc Networks (MANETs) is a class of wireless networks that do not need any infrastructural support. MANETs can adapt and reconfigure its structure while running in response to the changing network topologies. This makes MANETs attractive to the military because of its random nature which could be beneficial in the tactical environment lik...
with the fast growth of the Internet, computer threats and viruses have become a very serious issue for us, which attract public attention. Therefore, the distribution of computer viruses and worms were discussed in this study. This paper focuses on the effects of computer viruses. The main area of this paperis a brief discussion on computer viruse...
Solid free fabrication (SFF) are produced to enhance the printing instrument utilizing distinctive strategies like Piezo spout control, multi-spout injet printers or STL arrange utilizing cutting information. The procedure is utilized to diminish the cost and enhance the speed of printing. A few techniques take long at last because of extra process...
As of late, remote sensor organize (WSN) is utilized in numerous application zones, for example, checking, following, and controlling. For some utilizations of WSN, security is an essential necessity. In any case, security arrangements in WSN vary from conventional systems because of asset confinement and computational requirements. This paper inve...
DNA is a hard drive, the memory in every cell of every living organism that has the instructions on how to make that cell. With the exponential growth of our media, the growth of data storage is also increasing. DNA is incredible compact due to its molecular structure and can be used to achieve data attractively through genome sequencing. A raw lim...
Software requirements elicitation is the base of the software development process and involves multiple stakeholders from the same organization, each having its own requirements and priorities, which may be conflicting with the requirements and priorities of the other stakeholders for the same system. Resolving these conflicts in requirements is ne...
In the software system development, requirement engineering plays a great role because system successfulness depends on it. If the requirements are clear and unambiguous in every aspect then the system will be developed error free. A number of clients that are not educated and illiterate, then in this scenario, the given requirements are not clear...
Ambient intelligence is electronic environment which are sensitive to the presence of people. It is the light of future technologies. All AMI subsystems are interact with each other to accomplish their goal. AMI applications which are directly interact to define the environment. It shows that human environment which are not produced this process. T...
The advance cloud computing has provided an opportunity to resolve the challenges which effects by increasing transportation issues. Two methods of cloud services are available these are parking and mining. Mobile cloud computing has improved the storage capacity, stand by time of mobile terminals by migrating data processing to the remote cloud. T...
The study is about how modern education games are effecting the society. The authors have discussed different point of views published and working in the same domain after critically evaluating previous work in the same domain. The authors have covered how games are changing the way of learning new education trends.