Mohd Nadeem

Work place: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, Uttar Pradesh, India

E-mail: mohd.nadeem1155@gmail.com

Website:

Research Interests: Software Development Process, Software Engineering, Information Security, Network Architecture, Network Security

Biography

Mr. Mohd. Nadeem is currently working as a Full-Time Research Scholar at the Department of Information Technology, Babasaheb Bhimrao Ambedkar University (A Central University), VidyaVihar, Raibareli Road, Lucknow, India and he has completed his M-Tech Degree in Electronic Circuit and System from Integral University, Dashauli, Lucknow, India in 2013. He has completed his B-Tech Degree in Electronics and Communication from Chandrasekhar Azad University Kanpur, India in 2010. His research interests are in the areas of Software Security, Quantum Security, Network Security, Security Risk, and IoT Security.

Author Articles
Determination of Security Factors Affecting Internet of Medical Things by Artificial Intelligence Technique

By Mohd Nadeem Prabhash Chandra Pathak Mahfooz Ahmad Masood Ahmad

DOI: https://doi.org/10.5815/ijeme.2024.02.04, Pub. Date: 8 Apr. 2024

In the age of computing, there is a vast assortment of medical equipment and software available. Software and medical equipment that can be online connected to healthcare Information Technology (IT) systems are referred to as Internet of Medical Things (IoMT). This research study elaborates healthcare connectivity and its security issues to the different dimension of IoMT. During the pandemic situation in 2020-21 Covid, importance of virtualization and its dependencies have got the momentum. The security challenge of IoMT needs to be addressed. The research analysis is evaluating the impact of security factors in IoMT. By systematically evaluating research studies based on the keywords IoMT, security of IoMT, and security in healthcare sector, security attributes and factors were discovered from the different digital library. This evaluation uses soft computing and Artificial Intelligence (AI) techniques, quantitatively elaborates the factors of IoMT and their impact based on security. The results provide guidance for the development of IoMT with security attributes that can help to ensure the security of the device and software based applications on networks or in the cloud. To assess the importance of the criteria and the ranking of the alternatives, the AI technique of Analytic Hierarchy Process (AHP) and Technique for Order of Preferences by Similarity to Ideal Solution (TOPSIS) were applied. The hybrid Fuzzy AHP, Fuzzy TOPSIS techniques are utilizing the concept of decision making in security of IoMT. The items were evaluated using a multi rules choice investigation with several standards. In this research study, eight factors and ten alternatives of IoMT were selected to determine their impact on security. The creating new funding, operating and business model factor of IoMT got the top weight and successfully navigating regulatory change got the least. The AI research on IoMT security determination helps the developer, medical practitioner, and medical device operator to consider the impact of security in IoMT. 

[...] Read more.
Analysis of the Vulnerability of the Network by Using the ML Technique

By Masood Ahmad Mohd Nadeem Raees Ahmad Khan

DOI: https://doi.org/10.5815/ijwmt.2024.01.01, Pub. Date: 8 Feb. 2024

The increasing use of healthcare devices and their communication networks has raised concerns about the security of patient information and the potential for cyber-attacks. In this study, we propose a machine learning approach for classifying security vulnerabilities in healthcare device communication networks by using the Machine Learing (ML) Technique. We collected a dataset of healthcare device vulnerabilities and used feature selection and engineering techniques to extract the most relevant features for the classification task. We trained several machine learning algorithms, Snort algorithm, and support vector machines (SVM) and evaluated their performance using various evaluation metrics. The results showed that the SVM and Snort algorithms had an accuracy of 94%, a precision of 95%, a recall of 93%, and an F1-score of 94%. Our approach can help identify and prioritize security vulnerabilities in healthcare device communication networks, which can lead to better security practices and patient safety.

[...] Read more.
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

By Suhel Ahmad Khan Mohd Nadeem Alka Agrawal Raees Ahmad Khan Rajeev Kumar

DOI: https://doi.org/10.5815/ijmecs.2021.06.04, Pub. Date: 8 Dec. 2021

The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.

[...] Read more.
Other Articles