References
- Dublin (Business Wire), Impact of COVID-19 on the Video Conferencing Market, 2020, https://www.businesswire.com/news/home/20200416005739/en/Impact-of-COVID-19-on-the-VideoConferencing-Market-2020---ResearchAndMarkets.com, Accessed on November 2021.
- Guy Campos, Videoconferencing app usage 'hits 21 times pre-Covid levels', https://www.avinteractive.com/news/collaboration/usage-mobile-video-conferencing-apps-including-zoomgrew-150-first-half-2021-05-08-2021/, Accessed on November 2021.
- Sensor tower blog, Usage of Mobile Video Conferencing Apps Including Zoom Grew 150% in the First Half of 2021, https://sensortower.com/blog/video-conferencingapps-mau-growth , Accessed on November 2021.
- Karl KA, Peluchette JV, Aghakhani N. Virtual Work Meetings During the COVID-19 Pandemic: The Good, Bad, and Ugly. Small Group Research. May 2021. doi:10.1177/10464964211015286
- Khan, N. A., Brohi, S. N., & Jhanjhi, N. Z. (2020). UAV's applications, architecture, security issues and attack scenarios: a survey. In Intelligent computing and innovation on data science (pp. 753-760). Springer, Singapore.
- N. A. Khan, S. N. Brohi and N. Zaman, "Ten deadly cyber security threats amid COVID-19 pandemic", 2020.
- Singh, J., & Singh, J. (2021). A survey on machine learning-based malware detection in executable files. Journal of Systems Architecture, 112, 101861. https://doi.org/10.1016/j.sysarc.2020.101861
- Amer, E., Zelinka, I., & El-Sappagh, S. (2021). A Multi-Perspective malware detection approach through behavioral fusion of API call sequence. Computers & Security, 110, 102449. https://doi.org/10.1016/j.cose.2021.102449
- S. J. Hussain, U. Ahmed, H. Liaquat, S. Mir, N. Jhanjhi and M. Humayun, "IMIAD: Intelligent Malware Identification for Android Platform," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-6, doi: 10.1109/ICCISci.2019.8716471.
- Nawaz, A. (2021). Feature Engineering based on Hybrid Features for Malware Detection over Android Framework. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2856-2864.
- K. Hussain, S. J. Hussain, N. Jhanjhi and M. Humayun, "SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET," 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-4, doi: 10.1109/ICCISci.2019.8716416.
- Ben Lutkevich, Types of Malware, Tech Target, https://searchsecurity.techtarget.com/definition/malware, Access on November 2021.
- Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AIenabled phishing attacks detection techniques. Telecommunication Systems, 76(1), 139-154. https://doi.org/10.1007/s11235-020-00733-2
- Ubing, A. A., Jasmi, S. K. B., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Phishing website detection: An improved accuracy through feature selection and ensemble learning. International Journal of Advanced Computer Science and Applications, 10(1), 252-257.
- Elijah, A. V., Abdullah, A., Jhanjhi, N., Supramaniam, M., & Abdullateef, B. (2019). 'Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study. Int. J. Adv. Comput. Sci. Appl, 10(9), 520-528.
- Abbasi, A., Dobolyi, D., Vance, A., & Zahedi, F. M. (2021). The phishing funnel model: A design artifact to predict user susceptibility to phishing websites. Information Systems Research, 32(2), 410-436. https://doi.org/10.1287/isre.2020.0973
- Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.
- Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., & Boutaba, R. (2021). Man in the Middle Attack Mitigation in Internet of Medical Things. IEEE Transactions on Industrial Informatics.
- Noor Qureshi, How to make sure no man-in-the-middle attack can harm you, https://thehacktoday.com/how-to-make-sure-no-man-in-the-middle-attack-can-harmyou/, Accessed on November 2021.
- The new network, 2017: The year of widespread SDN adoption and DDoS attack mitigation, https://www.networkworld.com/article/3156344/2017-widespread-sdn-adoption-and-ddos-attackmitigation.html, Accessed on November 2021.
- Vivek Ganti, et.al, DDoS attack trends for 2021 Q2, https://blog.cloudflare.com/ddos-attack-trends-for2021-q2/, Accessed on November 2021
- Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77(1), 47-62. https://doi.org/10.1007/s11235-020-00747-w
- Gopi, R., Sathiyamoorthi, V., Selvakumar, S. et al. Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-021-10640-6
- Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). A review of intrusion detection system using machine learning approach. International Journal of Engineering Research and Technology, 12(1), 8-15.
- Z. A. Almusaylim, N. Zaman and L. T. Jung, "Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment," 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 2018, pp. 1-5, doi: 10.1109/ICCOINS.2018.8510588.
- Lim, M., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Hidden link prediction in criminal networks using the deep reinforcement learning technique. Computers, 8(1), 8. https://doi.org/10.3390/computers8010008
- B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.
- Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2019). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences.
- N. Zaman and F. A. Almusalli, "Review: Smartphones power consumption & energy saving techniques," 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-7, doi: 10.1109/ICIEECT.2017.7916593.
- D. A. Shafiq, N. Z. Jhanjhi, A. Abdullah and M. A. Alzain, "A Load Balancing Algorithm for the Data Centres to Optimize Cloud Computing Applications," in IEEE Access, vol. 9, pp. 41731-41744, 2021, doi: 10.1109/ACCESS.2021.3065308.
- Seungjin, L., Abdullah, A., & Jhanjhi, N. Z. (2020). A review on honeypot-based botnet detection models for smart factory. International Journal of Advanced Computer Science and Applications, 11(6), 418-435.
- A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPL-RP. Sensors, 20(21), 5997. https://doi.org/10.3390/s20215997
- Kraticakal, SQL Injection Attack: A Major Application Security Threat, https://www.kratikal.com/blog/sql-injection-attack-a-major-application-security-threat/, Accessd on November 2021.
- Jhanjhi, N. Z., Almusalli, F. A., Brohi, S. N., & Abdullah, A. (2018, October). Middleware Power Saving Scheme for Mobile Applications. In 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA) (pp. 1-6). IEEE.
- S. M. Muzammal, R. K. Murugesan, N. Z. Jhanjhi and L. T. Jung, "SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications," 2020 International Conference on Computational Intelligence (ICCI), 2020, pp. 305-310, doi: 10.1109/ICCI51257.2020.9247818.
- M. Humayun, N. Jhanjhi, M. Alruwaili, S. S. Amalathas, V. Balasubramanian and B. Selvaraj, "Privacy Protection and Energy Optimization for 5GAided Industrial Internet of Things," in IEEE Access, vol. 8, pp. 183665-183677, 2020, doi: 10.1109/ACCESS.2020.3028764.
- N. Zaman, A. B. Abdullah and L. T. Jung, "Optimization of energy usage in Wireless Sensor Network using Position Responsive Routing Protocol (PRRP)," 2011 IEEE Symposium on Computers & Informatics, 2011, pp. 51-55, doi: 10.1109/ISCI.2011.5958882.
- Soosahabi, R. (2021). SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond. arXiv preprint arXiv:2108.12161.
- Norah Saud Al-Musib, Faeiz Mohammad Al-Serhani, Mamoona Humayun, N.Z. Jhanjhi, Business email compromise (BEC) attacks, Materials Today: Proceedings, 2021, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2021.03.647.(https://www.sciencedirect.com/science/article/pii/S2214785321027425)
- S. K. Mishra et al., "Energy-Aware Task Allocation for Multi-Cloud Networks," in IEEE Access, vol. 8, pp. 178825-178834, 2020, doi: 10.1109/ACCESS.2020.3026875.
- A Almusaylim, Z., Jhanjhi, N. Z., & Alhumam, A. (2020). Detection and mitigation of RPL rank and version number attacks in the internet of things: SRPLRP. Sensors, 20(21), 5997. https://doi.org/10.3390/s20215997
- Teoh, A. A., Ghani, N. B. A., Ahmad, M., Jhanjhi, N., Alzain, M. A., & Masud, M. (2022). Organizational Data Breach: Building Conscious Care Behavior in Incident Response. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 40(2), 505-515. https://doi.org/10.32604/csse.2022.018468
- Almulhim, M., Islam, N., & Zaman, N. (2019). A lightweight and secure authentication scheme for IoT based e-health applications. International Journal of Computer Science and Network Security, 19(1), 107-120.
- A. P. Singh et al., "A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications," in IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5779-5789, Aug. 2021, doi: 10.1109/TII.2020.3037889.
- Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV's: secure communication protocol issues and challenges. In Drones in Smart-Cities (pp. 37-55). Elsevier.
- Kok, S. H., Abdullah, A., Jhanjhi, N. Z., & Supramaniam, M. (2019). Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers, 8(4), 79. https://doi.org/10.3390/computers8040079
- S. Ali et al., "Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based," in IEEE Access, vol. 8, pp. 148007-148020, 2020, doi: 10.1109/ACCESS.2020.3014671.
- Zaman, N., & Ahmad, M. (2017). Towards the evaluation of authentication protocols for mobile command and control unit in healthcare. Journal of Medical Imaging and Health Informatics, 7(3), 739-742. https://doi.org/10.1166/jmihi.2017.2070
- Ren, A. L. Y., Liang, C. T., Hyug, I. J., Broh, S. N., & Jhanjhi, N. Z. (2020). A Three-Level Ransomware Detection and Prevention Mechanism. EAI Endorsed Transactions on Energy Web, 7(27).
- Jabeen, T., Jabeen, I., Ashraf, H., Jhanjhi, N., Mamoona, H., Mehedi, M., & Sultan, A. (2022). A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare. Computers, Materials, & Continua, 2365-2380.
- Egele, M., Kirda, E., & Kruegel, C. (2009, April). Mitigating drive-by download attacks: Challenges and open problems. In International Workshop on Open Problems in Network Security (pp. 52-62). Springer, Berlin, Heidelberg.
- Sharma, P., Johari, R., & Sarma, S. S. (2012). Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. International Journal of System Assurance Engineering and Management, 3(4), 343-351. https://doi.org/10.1007/s13198-012-0125-6
- A. Ullah, M. Azeem, H. Ashraf, A. A. Alaboudi, M. Humayun and N. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT-A Survey," in IEEE Access, vol. 9, pp. 16849-16865, 2021, doi: 10.1109/ACCESS.2021.3052850.
- Zaman, N., & Abdullah, A. B. (2012). Energy optimization through position responsiverouting protocol (prrp) in wireless sensor network. International Journal of Information and Electronics Engineering, 2(5), 748.
- Jayakumar, P., Brohi, S. N., & Zaman, N. (2020). Top 7 lessons learned from COVID-19 pandemic.
- One Login, Six type of passwords attaks and how to stop them, https://www.onelogin.com/learn/6-types-password-attacks, Accessed on November 2021
- S. M. Muzammal, R. K. Murugesan and N. Z. Jhanjhi, "A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches," in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4186-4210, 15 March15, 2021, doi: 10.1109/JIOT.2020.3031162.
- C. Diwaker et al., "A New Model for Predicting Component-Based Software Reliability Using Soft Computing," in IEEE Access, vol. 7, pp. 147191-147203, 2019, doi: 10.1109/ACCESS.2019.2946862.
- Alferidah, D. K., & Jhanjhi, N. Z. (2020, October). Cybersecurity Impact over Bigdata and IoT Growth. In 2020 International Conference on Computational Intelligence (ICCI) (pp. 103-108). IEEE
- A. Ullah et al., "A Survey on Continuous Object Tracking and Boundary Detection Schemes in IoT Assisted Wireless Sensor Networks," in IEEE Access, vol. 9, pp. 126324-126336, 2021, doi: 10.1109/ACCESS.2021.3110203.
- Humayun, M., Jhanjhi, N. Z., & Alamri, M. Z. (2020). Smart secure and energy efficient scheme for e-health applications using IoT: a review. International Journal of Computer Science and Network Security, 20(4), 55-74. https://doi.org/10.22937/IJCSNS.2020.20.04.8
- M. Lim, A. Abdullah, N. Jhanjhi and M. Khurram Khan, "Situation-Aware Deep Reinforcement Learning Link Prediction Model for Evolving Criminal Networks," in IEEE Access, vol. 8, pp. 16550-16559, 2020, doi: 10.1109/ACCESS.2019.2961805.
- Humayun, M., & Jhanjhi, N. Z. (2019). Exploring the relationship between GSD, knowledge management, trust and collaboration. Journal of Engineering Science and Technology (JESTEC), 14(2), 820-843.
- M. Satheesh Kumar, S. Vimal, N.Z. Jhanjhi, Shanmuga Sundar Dhanabalan, Hesham A. Alhumyani, Blockchain based peer to peer communication in autonomous drone operation, Energy Reports, 2021, ISSN 2352-4847, https://doi.org/10.1016/j.egyr.2021.08.073.
- Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., & Zanero, S. (2011, December). A fast eavesdropping attack against touchscreens. In 2011 7th International Conference on Information Assurance and Security (IAS) (pp. 320-325). IEEE.
- Penta Security, Top 5 AI-powered Cyber Threats & How to Prevent Them, https://www.pentasecurity.com/blog/top-5-aipowered-cyber-threats-how-to-prevent-them/, Access on November 2021
- Hussain, S. J., Irfan, M., Jhanjhi, N. Z., Hussain, K., & Humayun, M. (2021). Performance enhancement in wireless body area networks with secure communication. Wireless Personal Communications, 116(1), 1-22. https://doi.org/10.1007/s11277-020-07702-7
- V. Singhal et al., "Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings," in IEEE Access, vol. 8, pp. 113790-113806, 2020, doi: 10.1109/ACCESS.2020.3002416.
- Brohi, S. N., Jhanjhi, N. Z., Brohi, N. N., & Brohi, M. N. (2020). Key applications of state-of-the-art technologies to mitigate and eliminate COVID-19.
- N. Zaman, K. Ragab, A.B. Abdullah, Wireless Sensor Networks and Energy Efficiency: Protocols Routing and Management, IGI, Globa, Hershey, PA, USA (2012)
- Mamoona Humayun, NZ Jhanjhi, Ahmed Alsayat, Vasaki Ponnusamy, Internet of things and ransomware: Evolution, mitigation and prevention, Egyptian Informatics Journal, Volume 22, Issue 1, 2021, Pages 105-117, ISSN 1110-8665, https://doi.org/10.1016/j.eij.2020.05.003.
- Almusaylim, Z.A., Zaman, N. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Netw 25, 3193-3204 (2019). https://doi.org/10.1007/s11276-018-1712-5
- M. J. Iqbal et al., "Smart Home Automation Using Intelligent Electricity Dispatch," in IEEE Access, vol. 9, pp. 118077-118086, 2021, doi: 10.1109/ACCESS.2021.3106541.
- Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22. https://doi.org/10.1109/mprv.2018.03367731
- Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Valdes, J. F., & Luna-Valero, F. (2020). Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: An experimental approach. Sensors, 20(3), 816. https://doi.org/10.3390/s20030816
- Pan, Y., White, J., Schmidt, D., Elhabashy, A., Sturm, L., Camelio, J., & Williams, C. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems.
- Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. https://doi.org/10.1016/j.ijcip.2019.01.001
- Atlam H.F., Wills G.B. (2020) IoT Security, Privacy, Safety and Ethics. In: Farsi M., Daneshkhah A., Hosseinian-Far A., Jahankhani H. (eds) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing). Springer, Cham. https://doi.org/10.1007/978-3-030-18732-3_8