Salman Jan

Salman Jan
  • Doctor of Philosophy (Information Technology)-University Kuala Lumpur
  • University of Peshawar

Senior Lecturer/Assistant Professor, Cyber Security & Technological Conversion Section, MIIT, Universiti Kuala Lumpur

About

34
Publications
34,224
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
781
Citations
Current institution
University of Peshawar
Additional affiliations
July 2021 - February 2022
Bacha Khan University
Position
  • Assistant Professor
Education
August 2015 - November 2019
University of Kuala Lumpur
Field of study
  • cyber security

Publications

Publications (34)
Chapter
In recent years, there has been a noticeable increase in reliance on social media news and online news portal platforms for keeping up with world events and checking their authenticity. While online platforms provide the convenience of obtaining news at any time and from any location, it has also become a fertile environment for the distribution of...
Chapter
Securing a smartphone from malware intrusion is a critical issue that requires immediate attention. This study utilizes a Deep Convolutional Generative Adversarial Network (DCGAN) to introduce a novel approach to Android malware detection. The proposed model is trained on the behavioral logs of over 10,000 Android applications by focusing on critic...
Preprint
Full-text available
Internet of Things (IoT) and cloud computing have revolutionized various realms including healthcare, education, industries and businesses. Wearable health monitors, smart medical equipments continuously collect patients data that are sent to cloud computing that possess powerful analytical tools facilitating individuals and healthcare units in ter...
Preprint
Full-text available
In recent years, there has been a noticeable increase in reliance on social media news and online news portal platforms for keeping up with world events and checking their authenticity. While online platforms provide the convenience of obtaining news at any time and from any location, it has also become a fertile environment for the distribution of...
Article
Full-text available
Distributed denial of service (DDoS) attacks pose a significant security risk, particularly with the increasing reliance on cloud computing and information technology (IT). These attacks not only allow unauthorized users to access services but also deny legitimate users the ability to utilize them. Traditional antivirus solutions and firewalls prov...
Article
Full-text available
Various Artificial Intelligence (AI) techniques in water resource management highlight the current methodologies’ strengths and limitations in forecasting, optimization, and control. We identify a gap in integrating these diverse approaches for enhanced water prediction and management. We critically analyze the existing literature on artificial neu...
Article
Full-text available
Smartphones are intricately connected to the modern society. The two widely used mobile phone operating systems, iOS and Android, profoundly affect the lives of millions of people. Android presently holds a market share of close to 71% among these two. As a result, if personal information is not securely protected, it is at tremendous risk. On the...
Article
Full-text available
The widespread use of the Internet and the tremendous growth of social media have enabled people to connect with each other worldwide. Individuals are free to express themselves online, sharing their photos, videos, and text messages globally. However, such freedom sometimes leads to misuse, as some individuals exploit this platform by posting hate...
Article
Full-text available
The development of abstractive summarization methods is a crucial task in Natural Language Processing (NLP) that presents challenges, which require the creation of intelligent systems that are capable of extracting the main idea from text effectively and generate coherent summary. Numerous existing abstractive approaches do not take into account th...
Article
Full-text available
Social media applications, such as Twitter and Facebook, allow users to communicate and share their thoughts, status updates, opinions, photographs, and videos around the globe. Unfortunately, some people utilize these platforms to disseminate hate speech and abusive language. The growth of hate speech may result in hate crimes, cyber violence, and...
Article
Full-text available
The Internet and Big Data expansion have motivated the requirement for more generous stockpiling to hold and share information. Against the current era of information, guaranteeing protection and security to individuals sending data to each other is of utmost importance. The only file type that is instantly and widely used is the image. Therefore,...
Article
Full-text available
Augmented reality (AR) has gained enormous popularity and acceptance in the past few years. AR is indeed a combination of different immersive experiences and solutions that serve as integrated components to assemble and accelerate the augmented reality phenomena as a workable and marvelous adaptive solution for many realms. These solutions of AR in...
Article
Full-text available
Citation: Syed, T.A.; Jan, S.; Siddiqui, M.S.; Alzahrani, A.; Nadeem, A.; Ali, A.; Ullah, A. CAR-Tourist: An Integrity-Preserved Collaborative Augmented Reality Framework-Tourism as a Use-Case.
Article
Full-text available
The unprecedented growth in Augmented Reality (AR) has captured the focus of researchers and the industrial sector. The development of AR applications and their implementation in various domains is broadening. One of the advancements in the field of AR is Collaborative AR, which provides ample opportunities for the members of a team to work on a pa...
Article
In today’s world, the strong economy of a country plays an important role in the journey of development. Many factors help improve the economy and one of these factors is tourism. There are many countries in which their economy is based on tourism. Saudi Arabia is also targeting that their major economic reliance should shift to tourism. Based on t...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSNs) are the most crucial method for exploring the hidden resources under the water. It enables many underwater applications, such as military, commercial, disaster prevention, ocean sampling, and other emergencies. Data transmission through a single relay node creates a hotspot, which will minimize the networ...
Article
Full-text available
Over the last two decades, social media platforms have grown dramatically. Twitter and Facebook are the two most popular social media platforms, with millions of active users posting billions of messages daily. These platforms allow users to have freedom of expression. However, some users exploit this facility by disseminating hate speeches. Manual...
Conference Paper
Full-text available
Performing various transactions on real estate records in the government organization is a cumbersome task and has many pitfalls. There are a number of problems with the existing land registry systems. First, the process of land registry and transferring of a land is currently manual. Even though, some of the processes and records are digitized, ho...
Article
Full-text available
Malware analysis and detection over the Android have been the focus of considerable research, during recent years, as customer adoption of Android attracted a corresponding number of malware writers. Antivirus companies commonly rely on signatures and are error‐prone. Traditional machine learning techniques are based on static, dynamic, and hybrid...
Article
Full-text available
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price predictions and renting a vehicle. Many people perform transactions related to vehicles in their daily life; transp...
Article
Full-text available
Assigning accurate and timely priorities to bugs manually is resource consuming and effects addressing important bugs. In the existing work single feature is used which leads to information loss because bugs have a lot of features including “severity”, “component”, “operation system”, “owner”, “status”, “assigned to”, “summary” etc. In this researc...
Article
Full-text available
Takaful-an Islamic alternative to conventional insurance is fast becoming one of the most important constituents of modern Islamic financial market. The fundamental difference between the two forms of risk mitigation is entrenched from the type of contract selected. The conventional insurance work on the principle of bilateral contracts between the...
Article
Full-text available
In the past few years, the implementation of blockchain technology for various applications has been widely discussed in the research community and the industry. There are sufficient number of articles that discuss the possibility of applying blockchain technology in various areas, such as, healthcare, IoT, and business. However, in this article, w...
Article
Full-text available
Conventional paper currency and modern electronic currency are two important modes of transactions. In several parts of the world, conventional methodology has clear precedence over its electronic counterpart. However, the identification of forged currency paper notes is now becoming an increasingly crucial problem because of the new and improved t...
Article
Full-text available
Businesses need trust to confidently perform trade among each other. Centralized business models are the only mature solutions available to perform trades over the Internet. However, they have many problems which includes but are not limited to the fact that these create bottleneck on the server as well as requires trusted third parties. Recently,...
Article
Full-text available
Malware analysis for Android systems has been the focus of considerable research in the past few years due to the large customer base moving towards Android, which has attracted a corresponding number of malware writers. Several techniques have been used to detect the malicious behavior of Android applications as well as that of the complete system...
Article
Full-text available
The growing number of malware attacks poses serious threats to private data and to the expensive computing resources. To detect malware and their associated families, anti-malware companies rely on signatures which indeed include regular expressions and strings. The recent malware attacks in the last few years including the resurgence of ransomware...
Article
Full-text available
The Internet of Things (IoT) is a latest concept of machine-to-machine communication, that also gave birth to several information security problems. Many traditional software solutions fail to address these security issues such as trustworthiness of remote entities. Remote attestation is a technique given by Trusted Computing Group (TCG) to monitor...
Conference Paper
Full-text available
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this...
Conference Paper
Hosting service providers are completely shifting towards cloud computing from dedicated hardware. However, corporates waffles to move their sensitive data to such a solution where data is no more in their control. The pay-as-you-go is primary notion of cloud service providers. However, they share infrastructure between different tenants that bring...

Network

Cited By