Skip to main content

Showing 1–9 of 9 results for author: Nafi, K W

Searching in archive cs. Search in all archives.
.
  1. Application of Deep Reinforcement Learning for Intrusion Detection in Internet of Things: A Systematic Review

    Authors: Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, Foutse Khomh, Rasoul Rasta

    Abstract: The Internet of Things (IoT) has significantly expanded the digital landscape, interconnecting an unprecedented array of devices, from home appliances to industrial equipment. This growth enhances functionality, e.g., automation, remote monitoring, and control, and introduces substantial security challenges, especially in defending these devices against cyber threats. Intrusion Detection Systems (… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

    Journal ref: Internet of Things, Volume 25, 101531, 2025 Internet of Things, Volume 25, 101531, 2025 Internet of Things, Volume 25, 101531, 2025

  2. Evaluating Machine Learning-Driven Intrusion Detection Systems in IoT: Performance and Energy Consumption

    Authors: Saeid Jamshidi, Kawser Wazed Nafi, Amin Nikanjam, Foutse Khomh

    Abstract: In the evolving landscape of the Internet of Things (IoT), Machine Learning (ML)-based Intrusion Detection Systems (IDS) represent a significant advancement, especially when integrated with Software-Defined Networking (SDN). These systems play a critical role in enhancing security infrastructure within resource-constrained IoT systems. Despite their growing adoption, limited research has explored… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

    Comments: Computers & Industrial Engineering (2025)

  3. arXiv:2208.08918  [pdf, other

    cs.SE

    Data-access performance anti-patterns in data-intensive systems

    Authors: Biruk Asmare Muse, Kawser Wazed Nafi, Foutse Khomh, Giuliano Antoniol

    Abstract: Data-intensive systems handle variable, high volume, and high-velocity data generated by human and digital devices. Like traditional software, data-intensive systems are prone to technical debts introduced to cope-up with the pressure of time and resource constraints on developers. Data-access is a critical component of data-intensive systems as it determines the overall performance and functional… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

  4. arXiv:1406.5760  [pdf

    cs.DC

    Virtual Memory Streaming Technique for Virtual Machines (VMs) for Rapid Scaling and High Performance in Cloud Environment

    Authors: A B M Moniruzzaman, Kawser Wazed Nafi, Syed Akther Hossain

    Abstract: This paper addresses the impact of Virtual Memory Streaming (VMS) technique in provisioning virtual machines (VMs) in cloud environment. VMS is a scaling virtualization technology that allows different virtual machines rapid scale, high performance, and increase hardware utilization. Traditional hypervisors do not support true no-downtime live migration, and its lack of memory oversubscription can… ▽ More

    Submitted 22 June, 2014; originally announced June 2014.

    Comments: Keywords Virtual memory, Memory Streaming, Virtual machine, Virtual memory scaling, VM live migration, VM Cloning

  5. arXiv:1406.5759  [pdf

    cs.DC

    An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

    Authors: A B M Moniruzzaman, Kawser Wazed Nafi, Syed Akther Hossain

    Abstract: Cloud Computing is becoming a viable computing solution for services oriented computing. Several open-source cloud solutions are available to these supports. Open-source software stacks offer a huge amount of customizability without huge licensing fees. As a result, open source software are widely used for designing cloud, and private clouds are being built increasingly in the open source way. Num… ▽ More

    Submitted 22 June, 2014; originally announced June 2014.

    Comments: 6 pages

  6. arXiv:1304.6809  [pdf

    cs.DC cs.CR

    A New Trusted and E-Commerce Architecture for Cloud Computing

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M. M. A Hashem

    Abstract: Cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. Presently, different types of internet based systems are running in Cloud Computing environment. E-commerce is one of them. Present models are not secured enough for executi… ▽ More

    Submitted 25 April, 2013; originally announced April 2013.

    Comments: Accepted for publication in the Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013). arXiv admin note: substantial text overlap with arXiv:1304.4028

    Journal ref: Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

  7. A Fuzzy Logic Based Certain Trust Model for E-Commerce

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M. M. A Hashem

    Abstract: Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but E-commerce has not reached its full potential. The main reason behind this is lack of Trust of people in e-commerce. Again, proper models are still absent for calculating trust of different… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: Accepted for the Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

    Journal ref: Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)

  8. arXiv:1303.0598  [pdf

    cs.DC cs.CR

    A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture

    Authors: Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, M. M. A. Hashem

    Abstract: The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures se… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 10, pp. 181-186, [ISSN: 2156-5570] (2012)

  9. arXiv:1303.0459  [pdf

    cs.CR

    An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

    Authors: Kawser Wazed Nafi, Tonny Shekha kar, Amjad Hossain, M. M. A Hashem

    Abstract: Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probab… ▽ More

    Submitted 3 March, 2013; originally announced March 2013.

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 12, pp. 164-173, [ISSN: 2156-5570] (2012)