IIUM Repository

Prof. Farhat Anwar

Electrical and Computer Engineering

KULLIYYAH OF ENGINEERING

Profile Picture

Latest Additions

  1. Anwar, Farhat and Khan, Burhan Ul Islam and Mat Kiah, Miss Laiha and Abdullah, Nor Aniza and Goh, Khang Wen (2022) A comprehensive insight into blockchain technology: past development, present impact and future considerations. International Journal of Advanced Computer Science and Applications, 13 (11). pp. 878-907. ISSN 2158-107X E-ISSN 2156-5570
  2. Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Morshidi, Malik Arman and Anwar, Farhat and Mat Kiah, Miss Laiha (2021) A frictionless and secure user authentication in web-based premium applications. IEEE ACCESS, 9. pp. 129240-129255. E-ISSN 2169-3536
  3. Rahman, Md Arafatur and Asyhari, A. Taufiq and Wen, Ong Wei and Ajra, Husnul and Ahmed, Yussuf and Anwar, Farhat (2021) Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimedia Tools and Applications, 80 (doi.org/10.1007/s11042-021-10567-y). pp. 31381-31399. ISSN 1380-7501 E-ISSN 1573-7721
  4. Khan, Burhan ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks. IEEE Access, 8. pp. 124097-124109. ISSN 2169-3536
  5. Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah Funke and Pampori, Bisma Rasool and Mir, Roohie Naaz (2020) A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT). IEEE Access, 8. pp. 98481-98490. ISSN 2169 3536 E-ISSN 2169 3536
  6. Olanrewaju, Rashidah Funke and Khan, Burhan Ul Islam and Anwar, Farhat and Pampori, Bisma Rasool and Naaz Mir, Roohie (2020) MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions. International Journal of Recent Technology and Engineering (IJRTE), 8 (6). pp. 3013-3024. E-ISSN 2277-3878
  7. Sharmin, Afsah and Anwar, Farhat and Motakabber, S. M. A. (2019) Energy-efficient scalable routing protocol based on ACO for WSNS. In: 7th IEEE International Conference on Mechatronics Engineering - ICOM'19, 30th-31st October 2019, Putrajaya.
  8. Sharmin, Afsah and Anwar, Farhat and Motakabber, S. M. A. (2019) A novel bio-inspired routing algorithm based on ACO for WSNs. Bulletin of Electrical Engineering and Informatics, 8 (2). pp. 718-728. ISSN 2089-3191 E-ISSN 2302-9285
  9. Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Oussama, Allama and Jusoh, Ahmad Zamani (2019) Internet of things: the concept, inherent security challenges and recommended solutions. In: Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore, pp. 63-86. ISBN 978-981-13-8613-8
  10. Mehraj, Tehseen and Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Jusoh, Ahmad Zamani (2019) Critical challenges in access management schemes for smartphones: an appraisal. In: Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore, pp. 87-113. ISBN 978-981-13-8613-8
  11. Mehraj, Tehseen and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Jusoh, Ahmad Zamani (2019) An adaptive and viable face identification for Android mobile devices. In: Handbook of Multimedia Information Security: Techniques and Applications,. Springer, Cham, Switzerland, pp. 301-322. ISBN 978-3-030-15886-6
  12. Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat (2018) Rehashing system security solutions in e-banking. International Journal of Engineering & Technology, 7 (4). pp. 4905-4910. E-ISSN 2227-524X
  13. Olanrewaju, Rashidah Funke and Khan, Burhan ul Islam and Anwar, Farhat and Mir, Roohie Naaz (2018) Internet of things security vulnerabilities and recommended solutions. International Journal of Engineering & Technology, 7 (4). pp. 4899-4904. ISSN 2227-524X
  14. Anwar, Farhat and Huda Adibah, Mohd (2018) FRGS-13-081-0322/ design and modelling of novel dynamic bandwidth aggregation scheme in heterogeneous wireless network (hwn) for mission critical applications. Project Report. UNSPECIFIED. (Unpublished)
  15. Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Najeeb, Athaur Rahman and Mashkuri, Yaacob (2018) A survey on MANETs: architecture, evolution, applications, security issues and solutions. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2). pp. 832-842. ISSN 2502-4752
  16. Anwar, Farhat and Masud, Mosharrof Hussain and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Abdul Latif, Suhaimi (2018) Radio Access Technology (RAT) selection mechanism using TOPSIS method in Heterogeneous Wireless Networks (HWN). Indonesian Journal of Electrical Engineering and Computer Science, 12 (2). pp. 852-864. ISSN 2502-4752
  17. Anwar, Farhat and Masud, Mosharrof Hussain and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Abdul Latif, Suhaimi (2018) Game theory for resource allocation in heterogeneous wireless networks - a review. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2). pp. 843-851. ISSN 2502-4752
  18. Anwar, Farhat and Masud, Mosharrof Hussain and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Abdul Latif, Suhaimi (2018) Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT), 6 (7). pp. 9-20. ISSN 2321-5976
  19. Anwar, Farhat and Masud, Mosharrof Hussain and Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Abdul Latif, Suhaimi (2018) Bandwidth allocation policy using the game theory model in heterogeneous wireless networks. IPASJ International Journal of Information Technology (IIJIT), 6 (7). pp. 9-20. ISSN 2321-5976
  20. Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Anwar, Farhat and Mir, Roohie Naaz and Najeeb, Athaur Rahman (2018) A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. International Journal of Information and Computer Security. pp. 1-23. ISSN 1744-1765 E-ISSN 1744-1773 (In Press)

Most Viewed Items

Item titleViews
1Performance analysis of IIUM wireless campus network608
2Securing electronic transactions via payment gateways: a systematic review558
3A simulation based performance comparison of routing protocol on Mobile Ad-hoc Network (proactive, reactive and hybrid)533
4Review paper of gateway selection schemes for MANET of NEMO (MANEMO) 527
5Improved link repair technique for multicast routing in Wireless Mesh Network508
6Analysis of handoff latency factors for MIPV6 network 507
7Analysis of Radio Model Performance for Clustering Sensor Networks505
8The enhanced fault-tolerance mechanism of AODV routing protocol for Wireless Sensor Network 490
9Fuzzy logic based handoff latency reduction mechanism in layer 2 of heterogeneous mobile IPv6 networks489
10Performance of ad hoc routing protocols in mobile WiMAX environment482
11DFAM: A distributed feedback analysis mechanism for knowledge based educational big data480
12Gateway placement optimisation problem for mobile multicast design in wireless mesh networks 479
13Enhanced handoff latency reduction mechanism in layer 2 and layer 3 of mobile IPv6 (MIPv6) network475
14Enhanced clustering routing protocol for power-efficient gathering in wireless sensor network474
15Intergating multiple metrics to improve the performance of a routing protocol over wireless mesh networks467
16A proposed QoS multicast routing framework for next-generation Wireless Mesh Network 462
17Prospects and problems of cognitive radio network architectures in wireless sensor networks458
18A simulation based performance analysis of reactive routing protocols in Wireless Mesh Networks456
19Enhancing performance of MAODV routing protocol for wireless mesh network using integrated multiple metrics technique (IMMT)455
20Vertical handoff reduction mechanism using IEEE 802.21 standard in mobile IPv6 (MIPv6) network450
21An efficient technique for human verification using finger stripes geometry450
22Integrated metric-ad hoc on-demand distance vector: a routing protocol over Wireless Mesh Networks449
23A performance comparison of proactive and reactive routing protocols of Mobile Ad-hoc Network (MANET)449
24Effect of 3 key factors on average end to end delay and jitter in MANET448
25A survey on MANETs: architecture, evolution, applications, security issues and solutions447
26Secure annihilation of out-of-band authorization for online transactions446
27A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)446
28ENFAT-AODV: the fault-tolerant routing protocol for high failure rate Wireless Sensor Networks445
29A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem444
30An investigation into clustering routing protocols for wireless sensor networks443