User profiles for N. Bawany
Narmeen BawanyJinnah University for Women and FAST- NUCES Verified email at juw.edu.pk Cited by 1338 |
DDoS attack detection and mitigation using SDN: methods, practices, and solutions
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim, …
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim, …
NFTs: Applications and challenges
Before the widespread application of blockchain-based technologies, the mechanisms in
place for verifying ownership of digital assets and thus, means of securing them remained …
place for verifying ownership of digital assets and thus, means of securing them remained …
[HTML][HTML] A systematic review and IoMT based big data framework for COVID-19 prevention and detection
The Internet of Medical Things (IoMT) is transforming modern healthcare systems by merging
technological, economical, and social opportunities and has recently gained traction in the …
technological, economical, and social opportunities and has recently gained traction in the …
[PDF][PDF] Smart city architecture: Vision and challenges
… All Zonal (Zone A, Zone B, Zone C…Zone N) utility data centers will be connected to main
utility data center over reliable high bandwidth connection. Aggregation of data collected from …
utility data center over reliable high bandwidth connection. Aggregation of data collected from …
Virtual dimension—a primer to metaverse
The metaverse is a concept of a persistent, online, 3-D World that combines multiple virtual
spaces. With Metaverse, these independent, computer-generated environments developed …
spaces. With Metaverse, these independent, computer-generated environments developed …
[HTML][HTML] Network intrusion detection using oversampling technique and machine learning algorithms
… Cite this article Ahmed HA, Hameed A, Bawany NZ. Network intrusion detection using
oversampling technique and machine learning algorithms. PeerJ Computer Science 8:e820 https://…
oversampling technique and machine learning algorithms. PeerJ Computer Science 8:e820 https://…
Capbug-a framework for automatic bug categorization and prioritization using nlp and machine learning algorithms
Bug reports facilitate software development teams in improving the quality of software. These
reports include significant information related to problems encountered within a software, …
reports include significant information related to problems encountered within a software, …
Sentiment analysis and classification of restaurant reviews using machine learning
… Kanwal Zahoor, Narmeen Zakaria Bawany, Soomaiya Hamid Center for Computing Research,
… Now algorithm assumes that there are n values to predict the class. Hence the derived …
… Now algorithm assumes that there are n values to predict the class. Hence the derived …
SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks
… Hence, relationship between window size and number of false positives can be
represented as given below: W i n d o w s i z e α 1 N u m b e r o f F a l s e P o s i t i v e s …
represented as given below: W i n d o w s i z e α 1 N u m b e r o f F a l s e P o s i t i v e s …
Dronaid: A smart human detection drone for rescue
R Tariq, M Rahim, N Aslam, N Bawany… - … Conference on Smart …, 2018 - ieeexplore.ieee.org
Natural calamities have recently opened their doors to disasters which in turn have affected
various regions of the world. Disasters serve as an eye-opener as they are unstoppable and …
various regions of the world. Disasters serve as an eye-opener as they are unstoppable and …