Publications

TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach

Published in IEEE Access, 2025

This research presents a monitoring frequency-based detection and dynamic threshold mitigation method using Temporal Convolutional Networks (TCNs) in 5G Healthcare-IoT environments.

Recommended citation: Mirza Akhi, Ciarán Eising, and Lubna Luxmi Dhirani. (2025). "TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach." IEEE Access. https://ieeexplore.ieee.org/iel8/6287639/6514899/10845749.pdf

Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT

Published in 2024 IEEE 12th International Conference on Healthcare Informatics (ICHI), USA, 2024

This research develops a novel method utilizing Convolutional Neural Networks (CNNs) to detect anomalies in time series data from environmental sensors within Healthcare-IoT systems.

Recommended citation: Khatun, M. A., Bhattacharya, M., Eising, C., & Dhirani, L. L. (2024). "Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT." 2024 IEEE 12th International Conference on Healthcare Informatics (ICHI). https://arxiv.org/pdf/2407.20695

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Published in IEEE Access, 2023

This paper reviews and proposes risk mitigation strategies for security concerns in Healthcare-IoT systems using machine learning techniques.

Recommended citation: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani. (2023). "Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation." IEEE Access. 11. https://www.researchgate.net/publication/376763490_Machine_Learning_for_Healthcare-IoT_Security_A_Review_and_Risk_Mitigation

Development of Cyber Attack Model for Private Network

Published in 2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS), 2022

This paper delves into the development and intricacies of a cyber attack model tailored for private networks.

Recommended citation: M. Al-Amin, M. A. Khatun and M. Nasir Uddin, 'Development of Cyber Attack Model for Private Network,' 2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS), Chennai, India, 2022, pp. 216-221, doi: 10.1109/ICPS55917.2022.00046. https://ieeexplore.ieee.org/abstract/document/9941250

Malicious Nodes Detection based on Artificial Neural Network in IoT Environments

Published in 2019 22nd International Conference on Computer and Information Technology (ICCIT), 2019

This study employs the Artificial Neural Network (ANN) to detect malicious nodes in IoT environments, addressing security concerns of embedded devices. The method discerns usual and malicious patterns, achieving a detection accuracy of 77.51%.

Recommended citation: M. A. Khatun, N. Chowdhury and M. N. Uddin, "Malicious Nodes Detection based on Artificial Neural Network in IoT Environments," 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 2019, pp. 1-6, doi: 10.1109/ICCIT48885.2019.9038563. https://ieeexplore.ieee.org/document/9038563