Nadeem Abbas

Nadeem Abbas
  • BSCS
  • Professor at Government College University, Faisalabad

About

26
Publications
573
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
0
Citations
Current institution
Government College University, Faisalabad
Current position
  • Professor

Publications

Publications (26)
Research
Full-text available
The rapid evolution of artificial intelligence (AI) and quantum computing presents both unprecedented opportunities and significant security challenges for satellite communications and smart city infrastructures. As these critical systems increasingly rely on interconnected networks and AI-driven technologies, they become vulnerable to sophisticate...
Research
Full-text available
The rapid advancement of smart cities and autonomous vehicle technologies has transformed urban living and transportation, yet it has also introduced new cybersecurity challenges that demand innovative solutions. This paper explores the intersection of quantum computing, adversarial machine learning (ML), and deepfake detection as critical componen...
Research
Full-text available
The increasing reliance on satellite communications and space systems for critical applications such as navigation, defense, weather monitoring, and global connectivity underscores the urgent need for advanced cybersecurity measures. Among emerging threats, AI-generated manipulation and deepfake technologies pose significant risks by enabling the c...
Research
Full-text available
The increasing integration of self-driving technologies into transportation systems has introduced unprecedented efficiencies and convenience but also brought significant cybersecurity risks. These autonomous systems, reliant on complex sensor networks, artificial intelligence (AI), and communication infrastructures, are vulnerable to sophisticated...
Research
Full-text available
The rapid advancement of quantum computing poses a transformative challenge to existing cybersecurity infrastructures, particularly in Security Operations Centers (SOCs) that protect critical digital assets. Traditional cryptographic methods are vulnerable to quantum attacks, with Shor's algorithm threatening to break widely used encryption schemes...
Research
Full-text available
Artificial Intelligence (AI) is revolutionizing the financial industry, particularly in the domains of risk management, fraud detection, and cybersecurity. As financial institutions increasingly rely on digital technologies, the need for more advanced, real-time solutions to manage risks and secure transactions has become more critical. AI plays a...
Research
Full-text available
The transformation of the financial sector through digital technologies has brought about significant changes in how financial institutions operate, engage with customers, and comply with regulations. Among the most transformative technologies is Artificial Intelligence (AI), which is being used to automate processes, enhance decision-making, and i...
Research
Full-text available
Artificial Intelligence (AI) is playing an increasingly vital role in financial fraud prevention, offering innovative solutions to detect and prevent fraudulent activities within the financial industry. As financial transactions become more complex and digital, the need for advanced technologies to address emerging risks and challenges has never be...
Research
Full-text available
The evolution of electronic voting (e-voting) systems is increasingly shaped by the need for security, scalability, and personalization. This paper proposes a blockchain and graph theory-driven framework for personalized e-voting on Internet of Things (IoT) social platforms, integrated with distributed cloud and fog microservices architecture. The...
Research
Full-text available
The evolution of electronic voting (e-voting) systems has raised critical concerns regarding security, personalization, scalability, and efficiency. Traditional systems often face challenges such as data manipulation, voter fraud, and centralized control risks. This paper proposes a novel framework that combines blockchain technology, IoT, microser...
Research
Full-text available
As digital democracy becomes increasingly prevalent, ensuring the security, scalability, and personalization of e-voting systems is critical. This paper proposes a novel framework that integrates graph theory with Internet of Things (IoT) devices and blockchain technology to create a secure and personalized e-voting experience. Leveraging cloud-fog...
Research
Full-text available
The growing adoption of electronic voting (e-voting) systems has highlighted the need for secure, scalable, and personalized platforms that can ensure voter trust and participation. This paper presents a distributed microservices framework for personalized Internet of Things (IoT)-enabled e-voting on social networks, supported by blockchain technol...
Research
Full-text available
As urban mobility systems increasingly rely on data from mobile devices to optimize transportation, improve services, and facilitate smart city initiatives, user privacy becomes a critical concern. Local privacy models, such as local differential privacy (LDP), have emerged as a promising solution, providing user privacy by ensuring that data is ra...
Research
Full-text available
The increasing reliance on location-based services and mobile applications has led to the widespread collection of sensitive geospatial data, raising significant privacy concerns. While location data plays a critical role in optimizing services such as navigation, traffic management, and personalized recommendations, it also exposes individuals to...
Research
Full-text available
In an era of increasing digital connectivity, cybersecurity governance has become a critical priority for safeguarding national security, economic stability, and public trust. Cybercrime and data breaches targeting critical infrastructure pose significant threats, necessitating the development of robust policy frameworks. This paper explores the ro...
Research
Full-text available
The rapid proliferation of Internet of Things (IoT) devices and process control systems has significantly expanded the cybersecurity threat landscape, making traditional security measures inadequate against sophisticated cyber threats. Artificial Intelligence (AI) has emerged as a transformative tool in cybersecurity, offering advanced threat detec...
Research
Full-text available
The rapid growth of cloud-based video and media services has brought about significant opportunities for content delivery and distribution. However, the increasing reliance on cloud environments also raises critical security concerns, particularly around data breaches, content piracy, and cyberattacks targeting sensitive video and media assets. Thi...
Research
Full-text available
The rapid expansion of cloud computing in video and media processing has introduced new cybersecurity challenges, necessitating advanced protective measures. As cloud-based platforms handle vast amounts of sensitive data, including intellectual property, user information, and real-time streaming content, ensuring robust security mechanisms is criti...
Research
Full-text available
In today's digital landscape, video and media platforms have become central to business and consumer experiences. As these platforms increasingly rely on cloud computing for scalability and flexibility, ensuring robust cybersecurity measures has become a pressing concern. The rise in cyber threats, including data breaches, unauthorized access, and...
Research
Full-text available
The rapid adoption of cloud computing in video and media platforms has significantly transformed content delivery, making it more scalable, flexible, and efficient. However, this shift to the cloud also introduces a range of cybersecurity challenges, including data breaches, unauthorized access, and content piracy. To address these concerns, the in...
Research
Full-text available
The convergence of Artificial Intelligence (AI), Machine Learning (ML), and the Internet of Things (IoT) in manufacturing is reshaping business intelligence (BI) strategies, driving smarter decision-making processes and enhancing operational efficiency. With the integration of AI/ML and IoT, manufacturers can collect, analyze, and leverage vast amo...
Research
Full-text available
The rapid evolution of educational technology in the AI era has opened up new frontiers for enhancing learning experiences. As educational institutions strive to meet the growing demands of digital transformation, the integration of cloud and edge computing with artificial intelligence (AI) is playing a pivotal role in reshaping how learning is del...
Research
Full-text available
With the rapid expansion of cloud computing, ensuring the security and privacy of sensitive data has become a critical concern. Machine learning (ML)-powered image processing techniques have emerged as a promising solution for secure data hiding in cloud environments. This approach leverages advanced ML algorithms to enhance traditional image proce...
Research
Full-text available
The dynamic nature of requirements in modern smart software systems presents significant challenges in ensuring flexibility, adaptability, and robust performance. As these systems are increasingly integrated with AI and machine learning (ML) technologies, the complexity of managing these evolving requirements grows. This paper explores the applicat...
Research
Full-text available
The integration of Cloud computing and Artificial Intelligence (AI) is revolutionizing the healthcare industry, particularly in the domain of robotics for smart healthcare solutions. The synergy between these two advanced technologies enables the creation of intelligent systems that can provide more accurate, efficient, and personalized healthcare...
Research
Full-text available
Revolutionizing data security through advanced techniques has become a critical focus in the digital age, particularly with the growing reliance on sensitive data transmitted across networks. One of the most promising advancements in this field is the integration of deep learning and edge computing for enhancing image hiding techniques. Image hidin...

Network