Rejwan Bin Sulaiman

University of Bedfordshire

Vicarage St

Luton, LU1 3JU

United Kingdom

http://https://www.beds.ac.uk/

Glyndwr University

Mold Rd.

Wrexham, LL11 2AW

United Kingdom

SCHOLARLY PAPERS

10

DOWNLOADS
Rank 40,604

SSRN RANKINGS

Top 40,604

in Total Papers Downloads

1,963

SSRN CITATIONS

0

CROSSREF CITATIONS

0

Ideas:
“  I am currently working on Malware Analysis and Detection  ”

Scholarly Papers (10)

1.

Artificial Intelligence Based Autonomous Car

Number of pages: 9 Posted: 08 May 2018
Rejwan Bin Sulaiman and Rejwan Bin Sulaiman
University of BedfordshireGlyndwr University
Downloads 827 (47,742)
Citation 1

Abstract:

Loading...

2.

Algorithms and Security Concern in Blockchain Technology: A Brief Review

Number of pages: 15 Posted: 29 Aug 2018
Amer Kareem, Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Muhammad Umer Farooq
University of Bedfordshire, University of BedfordshireGlyndwr University and University of Bedfordshire
Downloads 369 (130,183)
Citation 2

Abstract:

Loading...

Blockchain, Information Security, Security, Decentralized, Distributed, Block Chain, Bitcoins, Blockchain Technology, Distributed Ledger, Cryptocurrency, Crypto Contract

3.

Future Threats to Internet of Things (IoT) Security & Privacy: A Survey

Number of pages: 12 Posted: 15 Jan 2020
Rejwan Bin Sulaiman and Rejwan Bin Sulaiman
University of BedfordshireGlyndwr University
Downloads 191 (251,976)

Abstract:

Loading...

IOT, Sensors, RFID, WSN, GPS, Security, Privacy, Internet of things

4.

Intimate Relation With Robot and Impacts on Humanity

Number of pages: 6 Posted: 27 Oct 2018
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Amer Kareem
University of BedfordshireGlyndwr University and University of Bedfordshire
Downloads 148 (313,536)

Abstract:

Loading...

Robot, Robot Sex, Artificial Intelligence, Sex Robots

5.

Applications of Block-Chain Technology and Related Security Threats

Number of pages: 5 Posted: 23 Jul 2018 Last Revised: 20 Aug 2018
Rejwan Bin Sulaiman and Rejwan Bin Sulaiman
University of BedfordshireGlyndwr University
Downloads 136 (335,203)

Abstract:

Loading...

Security, IOT, threats, privacy, bitcoin, Cybersecurity, privacy-protection, Blockchain, Information security, Security, decentralized, distributed, block chain, bitcoins, blockchain technology, Distributed ledger, cryptocurrency, crypto contract

6.

A Review on Concepts and Technologies of 6G Cellular Network and Future Scope

Number of pages: 6 Posted: 27 Jan 2021
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Amer Kareem
University of BedfordshireGlyndwr University and University of Bedfordshire
Downloads 123 (361,561)

Abstract:

Loading...

6G network, future of 5G, B5G, mobile architecture, future mobile network, 6G, 3d model, 4d model

7.

A Detailed Study on Web-Based-Honeypot To Propose Mitigation Framework in Web Application

Number of pages: 74 Posted: 06 Jan 2021
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Masud Ahmed Rahi
University of BedfordshireGlyndwr University and Glyndwr University
Downloads 89 (454,737)

Abstract:

Loading...

Honeypot, web-based honeypot, vulnerabilities, Mitigation framework

8.

Impact of IOT to Make Cities Smart

Number of pages: 6 Posted: 28 Oct 2018
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Amer Kareem
University of BedfordshireGlyndwr University and University of Bedfordshire
Downloads 47 (626,875)
Citation 1

Abstract:

Loading...

internet of things, smart city, IOT

9.

Statistical In-depth Security Analysis For Vehicle To Everything Communication Over 5g Network

Number of pages: 71 Posted: 15 Jan 2020
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Ranjana Lakshmi Patel
University of BedfordshireGlyndwr University and affiliation not provided to SSRN
Downloads 33 (712,455)

Abstract:

Loading...

vehicle to vehicle communication, V2X communications, V2X communication over 5G, 802.11p, network security, ETSI, ITS, security architecture, connected car; vehicular network security mechanisms.

10.

A Framework to Mitigate Attacks in Web Applications

The IUP Journal of Computer Sciences, Vol. XV, No. 1, January 2021, pp. 22-59
Posted: 09 Apr 2021
Rejwan Bin Sulaiman, Rejwan Bin Sulaiman and Masud Ahmed Rahi
University of BedfordshireGlyndwr University and Glyndwr University

Abstract:

Loading...

Honeypot, Web-based honeypot, Vulnerabilities, Mitigation framework