Aamir Parvaiz Wagay | Himalayan University (original) (raw)

Aamir Parvaiz  Wagay

My Name is Aamir Parvaiz Wagay and I was born on 15 March 1990, in Hadipora, Kashmir.My Parents are Parvaiz Ahmad and Tahira. My early childhood was a typical middle class environment circa the 2000's. My dad
worked for Cooperative Bank as a Clerk and my mom was a stay at home mother. I did my Schooling in Hadipora Rafiabad and i did my Graduation in Govt. College Baramulla.
I always wanted to become an Engineer and i went to Chennai for Masters in Computer Application. I got admission in University of Madras, where i completed by MCA in 2015. I worked for Accenture for a short time span of 5 months and after that i joined for Ph.D. in Himalayan University, Itanagar, Arunachal Pradesh, India.

less

Related Authors

Alessio Merlo

Aanchal Priyadarshini

Dhananjay Kanade

Oluwakemi Christiana Abikoye

Imran Zualkernan

Natasha Khan

Vinesh Jain

Malaviya National Institute of Technology, Jaipur

Uploads

Papers by Aamir Parvaiz Wagay

Research paper thumbnail of The Internet of Things: Security Challenges

IEEE Security & Privacy, 2019

Research paper thumbnail of Internet of Things: Security Challenges

— Internet of factors (moreover IoT) with the aid of definition refers to a networked interconnec... more — Internet of factors (moreover IoT) with the aid of definition refers to a networked interconnection of gadgets in regular use which can be often equipped with ubiquitous intelligence. It far based totally on processing of massive portions of statistics to be able to provide useful data/provider and permits a green regulatory coverage within the region of IoT. One of the key challenges for the realization of the IoT includes protection challenges, particularly within the area of privateness and confidentiality among control of heterogeneities and barriers of network capacities. Those demanding situations can be based totally on statistics protection control structures as well as on felony foundations. When considering the criminal framework of security and privateness of the IoT, it needs to be determined which version of law should be implemented. Thereby, no conventional authorities' law is certainly appropriate for an international gadget along with IoT. The maximum essential basis therefore will be the regulatory foundations of EU union (at the territory of European) and, consequently building the model of self-law primarily based in part on country and mostly on regulation worldwide agreements that are to be considered as tools to manipulate the IoT. This paper offers an insight into the most crucial safety demanding situations related to implementation of IoT and constructing appropriate regulatory framework. Adoption of the regulatory framework is essential for the improvement of IoT offerings because of adequate criminal safety businesses will get.

Research paper thumbnail of IoT DEVICES SECURITY RISKS AND VULNERABLITIES: ANDROID DEVICES AS USE CASES

The Internet of Things (IoT) remains at the highest of the Gartner Hype Cycle as the most hyped t... more The Internet of Things (IoT) remains at the highest of the Gartner Hype Cycle as the most hyped technology, which implies that it's the most popular topic has gained the foremost attraction of the researchers presently. In recent years, there has been an enormous quantity of analysis that has investigating totally different aspects and considerations of this field. Meanwhile, privacy and security is an indivisible a part of this technology. While not providing enough security, the promising edges of this flourishing technology are abused and otiose. In this paper, we will give a brief definition of IoT devices security risks, attacks, vulnerabilities and then we will go through more details about the current challenges.

Research paper thumbnail of The Internet of Things: Security Challenges

IEEE Security & Privacy, 2019

Research paper thumbnail of Internet of Things: Security Challenges

— Internet of factors (moreover IoT) with the aid of definition refers to a networked interconnec... more — Internet of factors (moreover IoT) with the aid of definition refers to a networked interconnection of gadgets in regular use which can be often equipped with ubiquitous intelligence. It far based totally on processing of massive portions of statistics to be able to provide useful data/provider and permits a green regulatory coverage within the region of IoT. One of the key challenges for the realization of the IoT includes protection challenges, particularly within the area of privateness and confidentiality among control of heterogeneities and barriers of network capacities. Those demanding situations can be based totally on statistics protection control structures as well as on felony foundations. When considering the criminal framework of security and privateness of the IoT, it needs to be determined which version of law should be implemented. Thereby, no conventional authorities' law is certainly appropriate for an international gadget along with IoT. The maximum essential basis therefore will be the regulatory foundations of EU union (at the territory of European) and, consequently building the model of self-law primarily based in part on country and mostly on regulation worldwide agreements that are to be considered as tools to manipulate the IoT. This paper offers an insight into the most crucial safety demanding situations related to implementation of IoT and constructing appropriate regulatory framework. Adoption of the regulatory framework is essential for the improvement of IoT offerings because of adequate criminal safety businesses will get.

Research paper thumbnail of IoT DEVICES SECURITY RISKS AND VULNERABLITIES: ANDROID DEVICES AS USE CASES

The Internet of Things (IoT) remains at the highest of the Gartner Hype Cycle as the most hyped t... more The Internet of Things (IoT) remains at the highest of the Gartner Hype Cycle as the most hyped technology, which implies that it's the most popular topic has gained the foremost attraction of the researchers presently. In recent years, there has been an enormous quantity of analysis that has investigating totally different aspects and considerations of this field. Meanwhile, privacy and security is an indivisible a part of this technology. While not providing enough security, the promising edges of this flourishing technology are abused and otiose. In this paper, we will give a brief definition of IoT devices security risks, attacks, vulnerabilities and then we will go through more details about the current challenges.

Log In