Malik Najmus Saqib's research while affiliated with University of Jeddah and other places

Publications (7)

Article
Full-text available
In this paper, a routing protocol based on energy temperature degree-low energy-adaptive clustering hierarchy (ETD-LEACH) is proposed. In the protocol, nodes consume less energy when transmitting data, which improves the network lifetime. The proposed protocol selects the cluster heads (CHs) on the bases of degree, temperature, and energy to perfor...
Article
Full-text available
Due to the increase in the number of electricity thieves, the electric utilities are facing problems in providing electricity to their consumers in an efficient way. An accurate Electricity Theft Detection (ETD) is quite challenging due to the inaccurate classification on the imbalance electricity consumption data, the overfitting issues and the Hi...
Article
Full-text available
Recent years have witnessed huge growth in Android malware development. Colossal reliance on Android applications for day to day working and their massive development dictates for an automated mechanism to distinguish malicious applications from benign ones. A significant amount of research has been devoted to analyzing and mitigating this growing...
Article
Full-text available
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in re...
Article
Full-text available
The traditional paper-based voting is severely criticized after having found evidence of rigging in elections, leading to the uncertainty in the fairness of the election process. Traditional voting systems have severe issues in either user’s privacy or voting procedures. To counter these issues, e-voting systems have emerged as a potential solution...
Thesis
Full-text available
Revolutionary development in integrated circuit miniaturisation facilitates the in-volvement of electronic sensors in every aspect of our life. This involvement results in a wide range of Wireless Sensor Network (WSN) applications in terrestrial, underwater and health care. However, small size poses power limitation on these sensors. In order to co...

Citations

... It is reminded that features are generated here using this research-generated code library of anomaly detection feature preprocessors. Previous work on supervised learning theft detection was performed by Khan et al. [62]. ...
... Note that this information is updated again at the beginning of each clustering. The information at this stage is sent through a secure channel [9,41]. The initialization steps are shown in Fig. 15 Cluster head CH i selects a unique ID ID i and pseudonym and sends it to the cluster head CH j . ...
... In the behavioral-based approach, intended actions of objects are evaluated before such actions are carried out. is approach analyses the potential behavior of any actions carried by objects before the actual execution of behavior. e older malware was easy to detect as they were able to hide their features, but the malware uses different techniques like obfuscation [1][2][3][4] to hide their identity for a longer span and even they can bypass the firewall and other security checks present in the network or system. Also, multiple types of malwares are used to launch the attack, so the effects are more devastating. ...
... The confidentiality feature ensures that the participants' privacy and data access rights are safeguarded [23]. Our approach uses modifiers with the functions to restrict access to just authorized users. ...