Skip to main content

Showing 1–9 of 9 results for author: Shahzad, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.01971  [pdf, other

    cs.CR

    IoT DoS and DDoS Attack Detection using ResNet

    Authors: Faisal Hussain, Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah

    Abstract: The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Comments: Accepted in 2020 IEEE 23rd International Multitopic Conference (INMIC), 7 pages, 6 figures, 1 table

  2. arXiv:2004.00844  [pdf

    cs.NI cs.CY

    IoT-Flock: An Open-source Framework for IoT Traffic Generation

    Authors: Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah

    Abstract: Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be u… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: 6 Pages, 2 Figures, 4 Tables. Accepted in IEEE International Conference on Emerging Trends in Smart Technologies(ICETST) 2020

  3. arXiv:1708.02030  [pdf, ps, other

    cs.DC

    CRAFT: A library for easier application-level Checkpoint/Restart and Automatic Fault Tolerance

    Authors: Faisal Shahzad, Jonas Thies, Moritz Kreutzer, Thomas Zeiser, Georg Hager, Gerhard Wellein

    Abstract: In order to efficiently use the future generations of supercomputers, fault tolerance and power consumption are two of the prime challenges anticipated by the High Performance Computing (HPC) community. Checkpoint/Restart (CR) has been and still is the most widely used technique to deal with hard failures. Application-level CR is the most effective CR technique in terms of overhead efficiency but… ▽ More

    Submitted 7 August, 2017; originally announced August 2017.

  4. arXiv:1703.03783  [pdf

    cs.SE

    Survey on Essential and Accidental Real-Time Issues in Software Engineering

    Authors: Furrakh Shahzad, Maruf Pasha, Urooj Pasha, Bushra Majeed, Khurram Shahzad

    Abstract: Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast… ▽ More

    Submitted 10 March, 2017; originally announced March 2017.

    Journal ref: Journal of Software Engineering and Applications, 2017, 10, 245-256

  5. arXiv:1702.07140  [pdf

    cs.CR

    An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS)

    Authors: M. Omer Mushtaq, Furrakh Shahzad, M. Owais Tariq, Mahina Riaz, Bushra Majeed

    Abstract: There is a dynamic escalation and extension in the new infrastructure, educating personnel and licensing new computer programs in the field of IT, due to the emergence of Cloud Computing (CC) paradigm. It has become a quick growing segment of IT business in last couple of years. However, due to the rapid growth of data, people and IT firms, the issue of information security is getting more complex… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

    Journal ref: International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016

  6. arXiv:1702.07136  [pdf

    cs.NI cs.CR

    A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures

    Authors: Furrakh Shahzad, Maruf Pasha, Arslan Ahmad

    Abstract: Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an aband… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

    Journal ref: International Journal of Computer Science and Information Security, Vol. 14, No. 12, December 2016

  7. arXiv:1701.09182  [pdf

    cs.MM

    Analysis of challenges faced by WebRTC videoconferencing and a remedial architecture

    Authors: Maruf Pasha, Furrakh Shahzad, Arslan Ahmad

    Abstract: Lately, World Wide Web came up with an evolution in the niche of videoconference applications. Latest technologies give browsers a capacity to initiate real-time communications. WebRTC is one of the free and open source projects that aim at providing the users freedom to enjoy real-time communications, and it does so by following and redefining the standards. However, WebRTC is still a new project… ▽ More

    Submitted 13 February, 2017; v1 submitted 1 January, 2017; originally announced January 2017.

    Journal ref: Vol. 14 No. 10 OCTOBER 2016 International Journal of Computer Science and Information Security

  8. GHOST: Building blocks for high performance sparse linear algebra on heterogeneous systems

    Authors: Moritz Kreutzer, Jonas Thies, Melven Röhrig-Zöllner, Andreas Pieper, Faisal Shahzad, Martin Galgon, Achim Basermann, Holger Fehske, Georg Hager, Gerhard Wellein

    Abstract: While many of the architectural details of future exascale-class high performance computer systems are still a matter of intense research, there appears to be a general consensus that they will be strongly heterogeneous, featuring "standard" as well as "accelerated" resources. Today, such resources are available as multicore processors, graphics processing units (GPUs), and other accelerators such… ▽ More

    Submitted 15 February, 2016; v1 submitted 29 July, 2015; originally announced July 2015.

    Comments: 32 pages, 11 figures

  9. arXiv:1505.04628  [pdf, ps, other

    cs.DC

    Building a fault tolerant application using the GASPI communication layer

    Authors: Faisal Shahzad, Moritz Kreutzer, Thomas Zeiser, Rui Machado, Andreas Pieper, Georg Hager, Gerhard Wellein

    Abstract: It is commonly agreed that highly parallel software on Exascale computers will suffer from many more runtime failures due to the decreasing trend in the mean time to failures (MTTF). Therefore, it is not surprising that a lot of research is going on in the area of fault tolerance and fault mitigation. Applications should survive a failure and/or be able to recover with minimal cost. MPI is not yet… ▽ More

    Submitted 18 May, 2015; originally announced May 2015.