Noshina Tariq

Noshina Tariq
  • PhD computer science
  • Professor (Assistant) at Air University

About

60
Publications
20,484
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,391
Citations
Current institution
Air University
Current position
  • Professor (Assistant)
Additional affiliations
February 2021 - July 2022
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad Campus
Position
  • Professor (Assistant)
August 2012 - January 2018
International Islamic University, Islamabad
Position
  • Visiting Faculty
February 2020 - January 2021
Air University
Position
  • Visiting Faculty

Publications

Publications (60)
Article
Full-text available
Internet of Things (IoT) devices have revolutionized real-time monitoring and distant patient care in smart cities’ healthcare systems. However, this advancement has come with several issues, such as data security, scalability, operational efficiency, and fault tolerance. Previous approaches are not well suited to the real-time processing of IoT da...
Chapter
Any attempt that may result in a compromise of information, hence affecting the availability, integrity, or confidentiality of information are considered an intrusion. Intrusion detection systems (IDSs) not only detect such threats; they also effectuate a wide range of response techniques that are implemented in a methodical way relating to the typ...
Article
Full-text available
The Internet of Vehicles (IoV) is a critical component of the smart city. Various nodes exchange sensitive data for urban mobility, such as identification, position, messages, speed, and traffic statistics. Along with developing smart cities come threats to privacy and security through networks. Security is of the highest priority, considering vari...
Article
Full-text available
For efficient distribution of electric power, the demand for Smart Grids (SGs) has dramatically increased in recent times. However, in SGs, a safe environment against cyber threats is also a concern. This paper proposes a novel Fog-based Artificial Intelligence (AI) framework for SG Networks. It uses Machine Learning (ML) and Deep Learning (DL)-bas...
Article
Full-text available
With the increasing complexity of global health challenges and the growing awareness of health among individuals, the importance of personal health management has become more prominent. In modern society, due to the frequent occurrence of medical disputes, it has had a significant impact on the protection of the rights and interests of hospitals an...
Article
Full-text available
Alignment of advanced cutting-edge technologies such as Artificial Intelligence (AI) has emerged as a significant driving force to achieve greater precision and timeliness in identifying cardiovascular diseases (CVDs). However, it is difficult to achieve high accuracy and reliability in CVD diagnostics due to complex clinical data and the selection...
Article
Full-text available
The rise of Internet hospitals has significant issues associated with data security and governance in managing sensitive patient data. This paper discusses an alliance blockchain (i.e., a private blockchain) model for governance innovation in internet hospitals with an improved encryption methodology. We compare our proposed model, improved Rivest–...
Article
Full-text available
The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT co...
Article
In recent years, the Internet has facilitated the emergence of social media platforms as significant channels for individuals to express their thoughts and engage in instantaneous interactions. However, the reliance on online reviews has also given rise to deceptive practices, where anonymous spammers generate fake reviews to manipulate the percept...
Article
Full-text available
The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. The development of the IoT has led to the emergence of several solutions in various sectors. However, rapid popularization also has its challenges, and one of the most serious challenges is the security of the IoT. Secu...
Article
Full-text available
Background Breakthroughs in skin cancer diagnostics have resulted from recent image recognition and Artificial Intelligence (AI) technology advancements. There has been growing recognition that skin cancer can be lethal to humans. For instance, melanoma is the most unpredictable and terrible form of skin cancer. Materials and Methodology This pape...
Article
Full-text available
The emergence of quantum computing poses a substantial risk to the security of block chain technology, requiring a transition to post-quantum cryptography (PQC) to protect the future integrity and security of block chain systems. This study provides a comprehensive assessment of integrating post-quantum digital signatures into block chain framework...
Chapter
Healthcare Cyber Physical Systems (CPS) are vulnerable to cyber risks due to their dependency on wireless communication. Due to its centralized safety features and limited security capabilities, CPS networks need help maintaining network and storage security. This paper suggests a jamming attack detection system for healthcare CPS based on trust an...
Article
Full-text available
The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure (AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and raise alarms in response to anomalous activities, the Intrusion Detection System (IDS) plays a crucial role. However, existing intrusion detection models are typically trained on c...
Chapter
The use of drones, also known as unmanned aerial vehicles (UAVs), has significantly transformed multiple industries by providing innovative solutions. The capability of drones to operate above restricted areas and potentially perform malicious activities has generated apprehension regarding the potential risks they may pose. It is essential for gov...
Article
Full-text available
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in IoT systems further enhances their capabilities and potential benefits. Unfortunately, in the era of AI, ensuring the privacy and security of the IoT faces novel and sp...
Article
Full-text available
Cybersecurity challenges pose a significant threat to Healthcare Cyber Physical Systems (CPS) because they heavily rely on wireless communication. Particularly, jamming attacks can severely disrupt the integrity of these CPS networks. This research introduces a decentralized system to address this issue. Therefore, this paper suggested a system tha...
Article
Full-text available
Presents corrections to the paper, (Corrections to ‘‘Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey’’).
Chapter
Network intrusions through jamming and spoofing attacks have become increasingly prevalent. The ability to detect such threats at early stages is necessary for preventing a successful attack from occurring. This survey chapter thoroughly overviews the demand for sophisticated intrusion detection systems (IDS) and how cutting-edge techniques, like f...
Chapter
The internet of things (IoT) refers to the network of connected devices embedded in everyday objects that enable digital transformation. The rapid proliferation of IoT devices has led to significant advancements in technology and data exchange capabilities. However, the security of user data and IoT systems has become a paramount concern. This chap...
Article
Full-text available
Breast cancer continues to pose a substantial worldwide public health concern, necessitating the use of sophisticated diagnostic methods to enable timely identification and management. The present research utilizes an iterative methodology for collaborative learning, using Deep Neural Networks (DNN) to construct a breast cancer detection model with...
Article
Full-text available
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as healthcare, smart grids, and intelligent transportation systems necessitates robust security measures to protect against cyber threats. Among these threats, blackhole and greyhole attacks pose significant risks to the availability and integrity of CPSs. The current...
Article
Full-text available
The rapid growth of the Internet of Things (IoT) has led to its widespread adoption in various industries, enabling enhanced productivity and efficient services. Integrating IoT systems with existing enterprise application systems has become common practice. However, this integration necessitates reevaluating and reworking current Enterprise Archit...
Article
Full-text available
During the COVID-19 pandemic, the urgency of effective testing strategies had never been more apparent. The fusion of Artificial Intelligence (AI) and Machine Learning (ML) models, particularly within medical imaging (e.g., chest X-rays), holds promise in smart healthcare systems. Deep Learning (DL), a subset of AI, has exhibited prowess in enhanci...
Preprint
Full-text available
The proliferation of the Internet and mobile devices has resulted in malicious bots access to genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of-service, and spoofing attacks to mention a few. Authentication and testing mechanisms to verify the end-users and prohibit malicious programs from infiltrating the serv...
Chapter
This book presents use-cases of IoT, AI and Machine Learning (ML) for healthcare delivery and medical devices. It compiles 15 topics that discuss the applications, opportunities, and future trends of machine intelligence in the medical domain. The objective of the book is to demonstrate how these technologies can be used to keep patients safe and h...
Article
Full-text available
Numerous sensitive applications, such as healthcare and medical services, need reliable transmission as a prerequisite for the success of the new age of communications technology. Unfortunately, these systems are highly vulnerable to attacks like Sybil, where many false nodes are created and spread with deceitful intentions. Therefore, these false...
Article
Full-text available
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. A high failure rate, low information, and instability in correspondence links recognize them. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and Lossy...
Article
Full-text available
With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential and private. Unfortunately, conventional health systems cannot support such a colossal amount of biomedical data. Hence, data is typically sto...
Article
Full-text available
The Internet of Things (IoT) and its relevant advances have attracted significant scholarly, governmental, and industrial attention in recent years. Since the IoT specifications are quite different from what the Internet can deliver today, many groundbreaking techniques, such as Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSN), ha...
Article
Full-text available
Recently, the Internet of Things (IoT) has emerged as an important way to connect diverse physical devices to the internet. The IoT paves the way for a slew of new cutting-edge applications. Despite the prospective benefits and many security solutions offered in the literature, the security of IoT networks remains a critical concern, considering th...
Article
In clinical documents, privacy and confidentiality protection are the two main challenges before sharing or publishing data. According to the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR), even a few terms can cause privacy threats. In retrospect, confidentiality threats are not fully...
Article
Internet of Things (IoT) is a pervasively-used technology for the last few years. IoT technologies are also responsible for intensifying various everyday smart applications improving the standard of living. However, the inter-crossing of IoT systems and the multi-directional elements responsible for these systems' placement have raised new safety c...
Article
Data publication and sharing are critical components of assessing network infrastructures in the Internet of Things (IoT) for Quality of Service (QoS) enhancement. Especially, the advancement in communication technology (e.g., 5G/6G) enables the improvement of the current bottlenecks in Industrial IoT (IIoT). Recent approaches remove raw data and i...
Article
Full-text available
Twitter is one of the most popular micro-blogging social media platforms that has millions of users. Due to its popularity, Twitter has been targeted by different attacks such as spreading rumors, phishing links, and malware. Tweet-based botnets represent a serious threat to users as they can launch large-scale attacks and manipulation campaigns. T...
Article
Full-text available
Internet of Things (IoT) fostered a new epoch of innovation by interconnecting digital devices to make human life more convenient and attractive. These smart objects are largely deployed as low power and lossy networks (LLNs) and use routing protocol for LLNs (RPL) for routing. Unfortunately, it is extremely vulnerable to a large variety of externa...
Article
Smart homes, smart cities, smart grids, and smart vehicles are a few examples of the Internet of Things (IoT) applications. These applications possess distributed data delivery infrastructures for remote access, storage, distribution, and processing. As a result, the communication amongst such smart objects offers new horizons for applications to i...
Article
Full-text available
A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life. Along with the bounties of smart things and applications, there are hazards of external and internal attacks. Unfortunately, mitigating internal attacks is quite challenging, where network lifes...
Article
Full-text available
The Internet of Things (IoT) has penetrated its roots in almost every domain of life. Smart healthcare is one of the major domains that extensively uses IoT infrastructures and solutions. IoT-based smart healthcare systems have immensely added value to the healthcare domain with the use of wearable and mobile devices. This leads to a substantial us...
Article
Full-text available
The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and...
Article
Full-text available
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart co...
Article
Full-text available
Conventionally, the security of critical infrastructures was mainly focused on environmental threats. Cyber attacks, nevertheless, have shifted the attention to various other threats and damages. The attackers try to exploit vulnerabilities in networks and Internet of Things (IoT) technologies, since these technologies are the integral part of the...
Chapter
Full-text available
The ubiquity of the Internet has led to develop security measures to protect its services against abusive and malicious attacks. Most of the mercantile websites extensively use CAPTCHAs as a security measure against illegal bot attacks. Their purpose is to distinguish between humans and bot programs in order to defend web services from the bot prog...

Network

Cited By