Saira Gillani
Corvinus University of Budapest
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Saira Gillani.
International Workshop on Communication Technologies for Vehicles | 2013
Saira Gillani; Farrukh Shahzad; Amir Qayyum; Rashid Mehmood
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems. VANETs provide many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment – because it is mandatory to assure public and transportation safety. In this paper, we review the various dimensions of VANETs security including security threats, challenges in providing security in vehicular networks environment, requirements and attributes of security solutions. We also provide taxonomy and critically review of the notable security solutions – available for VANETs in literature.
electronic government and the information systems perspective | 2014
Saira Gillani; Andrea Kő
Processes in public administration are complex and changing fast, according to the changes in the regulatory environment. Public servants have to face with the challenge of getting a job role specific knowledge, which is embedded into the processes or available in other unstructured sources, like in public policies. Even though much of government regulations may now available in digital form, due to their complexity and diversity, identifying the ones relevant to a particular context is a non-trivial task. Our paper will discuss a text mining solution to extract, organize and preserve knowledge embedded in organizational processes to enrich the organizational knowledge base in a systematic and controlled way, support employees to easily acquire their job role specific knowledge. The solution has been tested for the case of an agricultural service at public authority. The context of the case is sampling in controlling food safety and quality.
Archive | 2015
Saira Gillani; Peer Azmat Shah; Amir Qayyum; Halabi Hasbullah
Vehicular ad-hoc network (VANET ) is a special form of mobile ad-hoc network (MANET) in which vehicles communicate with each other by creating an ad-hoc network. Before the deployment of VANET, it is necessary to address some important issues of VANET, specially concerning about architecture, routing, mobility, and security. Medium access control (MAC) protocols specify the way in which nodes share the underlying channel. As no standard exists for VANET, the research community has previously used IEEE 802.11a and 802.11b as the MAC layer access technologies. In this paper, we have discussed that the main challenge for VANET safety applications is to design an efficient MAC, so that all safety-related messages can be sent on time and such a protocol should be reliable because human lives are involved in the case of VANET. First, the challenges and requirements of a medium access protocol for VANET are discussed and then a survey of MAC solutions available in the literature to deal with these challenges in VANET is presented.
international conference on computational science | 2016
M. Amaad Ul Haq Tahir; Sohail Asghar; Ayesha Zafar; Saira Gillani
Since last decades, online technologies have revolutionized the modern computing world. However, as a result, security threats are increasing rapidly. A huge community is using the online services even from chatting to banking is done via online transactions. Customers of web technologies face various security threats and phishing is one of the most important threat that needs to be address. Therefore, the security mechanism must be enhanced. The attacker uses phishing attack to get victims credential information like bank account number, passwords or any other information by mimicking a website of an enterprise, and the victim is unaware of phishing website. In literature, several approaches have been proposed for detection and filtering phishing attack. However, researchers are still searching for such a solution that can provide better results to secure users from phishing attack. Phishing websites have certain characteristics and patterns and to identify those features can help us to detect phishing. To identify such features is a classification task and can be solved using data mining techniques. In this paper, we are presenting a hybrid model for classification to overcome phishing-sites problem. To evaluate this model, we have used the dataset from UCI repository which contains 30 attributes and 11055 instances. The experimental results showed that our proposed hybrid model outperforms in terms of high accuracy and less error rate.
Archive | 2016
Saira Gillani; Andrea Kő
Due to the on-going economic crisis, the management of organizational knowledge is becoming more and more important. This knowledge resides in organizational processes. The extraction of this hidden knowledge from the business processes and the usage of this knowledge for domain ontology development is a major challenge. This chapter presents ProMine, a text mining ontology extraction tool that extracts deep representations from the business processes. ProMine extracts new domain related concepts and proposes a new filtering mechanism based on a new hybrid similarity measure to filter most relevant concepts. The tool is evaluated through a case study of the insurance domain. The results showed that ProMine performance is good and it generates many new concepts against each business process.
International Journal of Computer Network and Information Security | 2012
Muhammad Naeem; Sheneela Naz; Saira Gillani
IMS (IP Multimedia Subsystem) is designed to provide multiple-services and can be accessed from any access network. With the advent of new multimedia services; user requirement also changed and required delay tolerant services from the service providers. The new multimedia services demands the restrictions on network parameters and this can be achieved by analyzing the traffic flow from the core as well as access network capabilities. As access and core IMS network are independent of each other and does not exchange user SLA with each other. In this paper we proposed framework based on Session border controller (SBC) that proactively monitored the traffic statistics as well as interact with access network operator for getting user’s SLA and reserve resources accordingly. We are also proposing alterations in SIP invite and re-invite message to incorporate requested information. These alterations will be useful in ensuring availability of user’s handset capabilities to IMS core network. Index Terms — quality of service, IP multimedia subsystem, SIP, RTCP, SBC
International Journal on Semantic Web and Information Systems | 2015
Saira Gillani; Andrea Ko
International Journal of Intelligent Systems and Applications | 2013
Saira Gillani; Muhammad Naeem; Raja Habibullah; Amir Qayyum
International Journal of Information Technology and Computer Science | 2013
Muhammad Naeem; Saira Gillani; Muhammad Abdul Qadir; Sohail Asghar
Archive | 2015
Noureen Zafar; Saif Ur Rehman; Saira Gillani; Sohail Asghar