Research & Collaborations

2020

Title Author Journal/ Conference Lab
Systematic Review Analysis on SQLIA Detection and Prevention Approaches Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri Wireless Personal Communications Cyber Reconnaissance and Combat Lab, Bahria University
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon Neural Computing and Applications Cyber Reconnaissance and Combat Lab, Bahria University
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan CMC-Computers, Materials & Continua, 64(1), 31–61s Innovative Secured Systems Lab, UET Peshawar
Proposing Model for Security of IoT Devices in Smart Logistics: A Review Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs Innovative Secured Systems Lab, UET Peshawar
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) National Cyber Security Auditing And Evaluation Lab, NUST
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 9.5) National Cyber Security Auditing And Evaluation Lab, NUST
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 2.8) National Cyber Security Auditing And Evaluation Lab, NUST
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 5.18) National Cyber Security Auditing And Evaluation Lab, NUST
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat Telecommunication Systems, Springer. (Impact Factor 1.7) National Cyber Security Auditing And Evaluation Lab, NUST

2019

Title Author Journal/ Conference Lab
An algorithm for detecting SQL injection vulnerability using black-box testing Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi & Mohd Fo’ad Rohani Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University
Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges Bilal Afzal, Muhammad Umair,Ghalib Asadullah Shah, Ejaz Ahmed Elsevier Future Generation Computer Systems IoT Security Lab, UET Lahore
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices Bilal Imran , Bilal Afzal , Ali Hammad Akbar , Muhammad Ahsan , Ghalib A. Shah IEEE GLOBECOM’19 IoT Security Lab, UET Lahore
one M2M Architecture Based Secure MQTT Binding in Mbed OS Ahsan Muhammad , Bilal Afzal , Bilal Imran , Asim Tanwir , Ali Hammad Akbar , Ghalib Shah IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore
An auditing framework for vulnerability analysis of IoT systems Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore
Blockchain based Permission Delegation and Access Control in Internet of Things (BACI) Gauhar Ali, Naveed Ahmad Yue Cao, Muhammad Asif, Haitham Cruickshank, Qazi Ejaz Ali Elsevier Journal on computer and Security Innovative Secured Systems Lab, UET Peshawar
BCON: Blockchain Based Access Control across Multiple Conflict of Interest Domains Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham Cruickshank Elsevier Journal of Network and Computer Applications Innovative Secured Systems Lab, UET Peshawar
Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations Tahreem Yaqoob, Azka Arshad, Haider Abbas, Muhammad Faisal Amjad, Narmeen Shafqat Elsevier FGCS National Cyber Security Auditing And Evaluation Lab, NUST
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review Tehreem Yaqoob , Haider Abbas , Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) National Cyber Security Auditing And Evaluation Lab, NUST
Trust Models of Internet of Smart Things: A Survey, Open Issues, and Future Directions Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab Journal of Network and Computer Applications. (Impact Factor 4.57) National Cyber Security Auditing And Evaluation Lab, NUST