Skip to main content

Research Repository

Advanced Search

Outputs (22)

DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer (2025)
Journal Article

The widespread adoption of Internet of Things (IoT) devices has introduced numerous vulnerabilities, particularly in firmware over-the-air (OTA) updates. These updates are essential for improving device functionality and addressing security vulnerabi... Read More about DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer.

DDoSViT: IoT DDoS Attack Detection for Fortifying Firmware Over-The-Air (OTA) Updates Using Vision Transformer (2025)
Data

The widespread adoption of Internet of Things (IoT) devices has introduced numerous vulnerabilities, particularly in firmware over-the-air (OTA) updates. These updates are essential for improving device functionality and addressing security vulnerabi... Read More about DDoSViT: IoT DDoS Attack Detection for Fortifying Firmware Over-The-Air (OTA) Updates Using Vision Transformer.

An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks (2025)
Journal Article

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to... Read More about An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks.

Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees (2023)
Journal Article
Faizan Ali, R., Dominic, P. D. D., Hina, S., & Naseer, S. (in press). Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees. International Journal of Information Security, https://doi.org/10.1007/s10207-023-00786-9

Oil and gas (O&G) organizations are progressively being digitalized in order to facilitate substantial information flow to remain competitive in the information age. This critical sector is spearheading the establishment of technical security measure... Read More about Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees.

CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning (2023)
Journal Article
Ahmed, K., Khurshid, S. K., & Hina, S. (2024). CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning. Computers and Security, 136, 103579. https://doi.org/10.1016/j.cose.2023.103579

The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two e... Read More about CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning.

Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems (2023)
Journal Article
Abbas, Q., Hina, S., Sajjad, H., Zaidi, K. S., & Akbar, R. (in press). Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Computer Science, 9, e1552. https://doi.org/10.7717/peerj-cs.1552

Network intrusion is one of the main threats to organizational networks and systems. Its timely detection is a profound challenge for the security of networks and systems. The situation is even more challenging for small and medium enterprises (SMEs)... Read More about Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems.

An intelligent context-aware threat detection and response model for smart cyber-physical systems (2023)
Journal Article
Noor, Z., Hina, S., Hayat, F., & Shah, G. A. (2023). An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet of Things, 23, Article 100843. https://doi.org/10.1016/j.iot.2023.100843

Smart cities, businesses, workplaces, and even residences have all been converged by the Internet of Things (IoT). The types and characteristics of these devices vary depending on the industry 4.0 and have rapidly increased recently... Read More about An intelligent context-aware threat detection and response model for smart cyber-physical systems.

Agentless approach for security information and event management in industrial IoT (2023)
Journal Article
Zahid, H., Hina, S., Hayat, M., & Shah, G. (in press). Agentless approach for security information and event management in industrial IoT. Electronics, 12(8), 1831. https://doi.org/10.3390/electronics12081831

The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors. However, in recent years, smart infrastructure, including cyber-physical industries, has wi... Read More about Agentless approach for security information and event management in industrial IoT.