scispace - formally typeset
Search or ask a question
Author

Mamoona Humayun

Other affiliations: Harbin Institute of Technology
Bio: Mamoona Humayun is an academic researcher from Al Jouf University. The author has contributed to research in topics: Computer science & Artificial intelligence. The author has an hindex of 12, co-authored 70 publications receiving 414 citations. Previous affiliations of Mamoona Humayun include Harbin Institute of Technology.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
25 Jun 2020
TL;DR: A layered framework, namely BCTLF, for smart logistics and transportation that integrates IoT and Blockchain to provide an intelligent logistics and Transportation system is proposed.
Abstract: Transportation and logistics management play a vital role in the development of a country With the advancement of the Internet of Things (IoT) devices, smart transportation is becoming a reality However, these abundant connected IoT devices are vulnerable to security attacks Recently, Blockchain has emerged as one of the most widely accepted technologies for trusted, secure and decentralized intelligent transportation systems This research study aims to contribute to the field of logistics and transportation by exploring the potential of IoT and Blockchain technology in smart logistics and transportation We propose a layered framework, namely BCTLF, for smart logistics and transportation that integrates IoT and Blockchain to provide an intelligent logistics and transportation system Finally, we present two real-life IoT and Blockchain-based case studies to highlight the contribution of IoT and Blockchain in logistics and transportation

130 citations

Journal ArticleDOI
TL;DR: A systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed, showing that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware.
Abstract: There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.

123 citations

Journal ArticleDOI
TL;DR: A survey of different data collection and secure transmission schemes where fog computing based architectures are considered is presented in this article, where fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio.
Abstract: Internet of medical things (IoMT) is getting researchers’ attention due to its wide applicability in healthcare Smart healthcare sensors and IoT enabled medical devices exchange data and collaborate with other smart devices without human interaction to securely transmit collected sensitive healthcare data towards the server nodes Alongside data communications, security and privacy is also quite challenging to securely aggregate and transmit healthcare data towards Fog and cloud servers We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered A taxonomy is presented to categorize the schemes Fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio We present a summary of these scheme along with analytical discussion Finally, a number of open research challenges are identified Moreover, the schemes are explored to identify the challenges that are addressed in each scheme

104 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on evolution, prevention and mitigation of Ransomware in IoT context is provided and is expected to be useful for researchers and practitioners who are involved in developing solutions for IoT security.

88 citations

Journal ArticleDOI
TL;DR: A new authentication scheme for the WBAN environment based on the light-weight scheme proposed for wearable devices is proposed, which minimizes the computation cost and maintains the privacy and security along with anonymous authentication.
Abstract: Over the years, the performance of devices used to gather sensitive medical information about individuals has increased substantially. These include implanted devices in the body, placed on or around the body, creating a Wireless body area network. Security and privacy have been a greater concern over a period of time due to the sensitive nature of the data collected and transmitted by the network. It has been noticed that various techniques have been applied to secure the data and provide privacy in WBANs but with a tradeoff of execution overhead. Although the latest available anonymous authentication schemes provide privacy and security but due to the limited computation capacity of WBAN devices, these schemes show greater time cost for authentication and consume more processing time. We review two latest anonymous authentication schemes for the WBAN environment in terms of computation cost. These two schemes provide anonymous authentication and use encryption to secure the data and ensure privacy. Then we analyze a recent lightweight authentication scheme proposed for wearable devices which provides anonymity and privacy along with security with very low computation cost. This scheme uses hash functions in order to obtain authentication and anonymity and doesn’t use encryption in the authentication process. This scheme is not proposed for the WBAN environment, but it can be applied on the WBAN environment with necessary variations. The comparison of these available schemes shows clearly that the computation cost is considerably decreased by applying the latest authentication scheme in the WBAN environment. We propose a new authentication scheme for the WBAN environment based on the light-weight scheme proposed for wearable devices. The detailed analysis shows that our proposed scheme minimizes the computation cost and maintains the privacy and security along with anonymous authentication.

84 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

01 Jan 2020
TL;DR: Prolonged viral shedding provides the rationale for a strategy of isolation of infected patients and optimal antiviral interventions in the future.
Abstract: Summary Background Since December, 2019, Wuhan, China, has experienced an outbreak of coronavirus disease 2019 (COVID-19), caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Epidemiological and clinical characteristics of patients with COVID-19 have been reported but risk factors for mortality and a detailed clinical course of illness, including viral shedding, have not been well described. Methods In this retrospective, multicentre cohort study, we included all adult inpatients (≥18 years old) with laboratory-confirmed COVID-19 from Jinyintan Hospital and Wuhan Pulmonary Hospital (Wuhan, China) who had been discharged or had died by Jan 31, 2020. Demographic, clinical, treatment, and laboratory data, including serial samples for viral RNA detection, were extracted from electronic medical records and compared between survivors and non-survivors. We used univariable and multivariable logistic regression methods to explore the risk factors associated with in-hospital death. Findings 191 patients (135 from Jinyintan Hospital and 56 from Wuhan Pulmonary Hospital) were included in this study, of whom 137 were discharged and 54 died in hospital. 91 (48%) patients had a comorbidity, with hypertension being the most common (58 [30%] patients), followed by diabetes (36 [19%] patients) and coronary heart disease (15 [8%] patients). Multivariable regression showed increasing odds of in-hospital death associated with older age (odds ratio 1·10, 95% CI 1·03–1·17, per year increase; p=0·0043), higher Sequential Organ Failure Assessment (SOFA) score (5·65, 2·61–12·23; p Interpretation The potential risk factors of older age, high SOFA score, and d-dimer greater than 1 μg/mL could help clinicians to identify patients with poor prognosis at an early stage. Prolonged viral shedding provides the rationale for a strategy of isolation of infected patients and optimal antiviral interventions in the future. Funding Chinese Academy of Medical Sciences Innovation Fund for Medical Sciences; National Science Grant for Distinguished Young Scholars; National Key Research and Development Program of China; The Beijing Science and Technology Project; and Major Projects of National Science and Technology on New Drug Creation and Development.

4,408 citations

Journal ArticleDOI

885 citations

Journal Article
TL;DR: This book writtern contains secrets and lies digital security in a networked world to read, not only check out, yet likewise download them and even check out online.
Abstract: Looking for competent reading sources? We have secrets and lies digital security in a networked world to read, not only check out, yet likewise download them and even check out online. Discover this excellent book writtern by by now, merely here, yeah only here. Get the data in the types of txt, zip, kindle, word, ppt, pdf, as well as rar. Once more, never ever miss to check out online and also download this book in our website right here. Click the link.

348 citations