| 
                                        Fault-Tolerant Robust Model Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances
                                     | 
                                    
                                        Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad
                                     | 
                                    
                                        IEEE Transactions on Industrial Electronics
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    
                                        W
                                     | 
                                
                                
                                    | 
                                        Attack Detection From Network Traffic using Machine Learning
                                     | 
                                    
                                        Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad
                                     | 
                                    
                                        VFAST Transactions on Software Engineering
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    
                                        X
                                     | 
                                
                                
                                    | 
                                        Identification of Malware Families for Creating Generic Signatures : Using Dynamic Analysis and Clustering Methods
                                     | 
                                    
                                        Umm-e-Hani, M. Ali, M. Ismail, A. Khan and H. Durad
                                     | 
                                    
                                        International Symposium on Recent Advances in Electrical Engineering & Computer Sciences 
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    
                                        W
                                     | 
                                
                                
                                    | 
                                        Separation Principle with Secure State Estimation and Lyapunov Stability of Cyber-Physical System under Sensor Attack
                                     | 
                                    
                                        Maryam Khan, Naeem Iqbal, Abdul Qayyum Khan
                                     | 
                                    
                                        IEEE Conference on Recent Advances in Electrical Engineering
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    
                                        ---
                                     | 
                                
                                
                                    | 
                                        A Novel Ensemble Machine Learning Method to Detect Phishing Attack
                                     | 
                                    
                                        Abdul Basit; Maham Zafar; Abdul Rehman Javed; Zunera Jalil
                                     | 
                                    
                                        IEEE International Conference on Multi Topic
                                     | 
                                    National Cybercrime and Forensics Lab, Air University | 
                                    
                                        ---
                                     | 
                                
                                
                                    | 
                                        A comprehensive survey of AI-enabled phishing attacks detection techniques
                                     | 
                                    
                                        Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil & Kashif Kifayat
                                     | 
                                    
                                        Telecommunication Systems
                                     | 
                                    National Cybercrime and Forensics Lab, Air University | 
                                    
                                        IF- 1.734
                                     | 
                                
                                
                                    | 
                                        Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes
                                     | 
                                    MUuhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen | 
                                    
                                        Wiley International Journal of Satellite Communications and Networking
                                     | 
                                    Security Auditing and Evaluation Lab, NUST | 
                                    
                                        IF- 1.652
                                     | 
                                
                                
                                    | 
                                        Quality of experience‐based optimization of satellite Internt using WAN accelerators
                                     | 
                                    Asad Arfeen, Riaz Uddin | 
                                    
                                        Wiley International Journal of Satellite Communications and Networking
                                     | 
                                    Security Auditing and Evaluation Lab, NUST | 
                                    
                                        IF- 1.652
                                     | 
                                
                                
                                    | 
                                        Context - Oriented Trust Computational Modal for Malicious Node Avoidance Using Edge Intelligence in Industrial Internet of Things
                                     | 
                                    A Altaf, H Abbas, F Iqbal, FA Khan, S Rubab | 
                                    
                                        Computer & Electrical Engineering
                                     | 
                                    Security Auditing and Evaluation Lab | 
                                    
                                        IF- 2.663
                                     | 
                                
                                
                                    | 
                                        Robust, Secure and Adaptive Trust-Based Service Selection in Smart Buildings in the Internet of Things (IoT)
                                     | 
                                    Ayesha Altaf; Haider Abbas; Faiza Iqbal; Malik Muhammad Zaki Murtaza Khan; Mahmoud Daneshmand | 
                                    
                                        IEEE Internet of Things Journal.
                                     | 
                                    Security Auditing and Evaluation Lab | 
                                    
                                        IF- 9.5
                                     | 
                                
                                
                                    | 
                                        Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location
                                        Coordinates for Privacy Enhancement
                                     | 
                                    Anum Arshad; Haider Abbas; Waleed Bin Shahid; Anique Azhar | 
                                    
                                        WETICE 2020
                                     | 
                                    Security Auditing and Evaluation Lab | 
                                    
                                        ---
                                     | 
                                
                                
                                    | 
                                        Towards Characterizing the COVID-19 Awareness on Twitter.
                                     | 
                                    Muhammad Saad, Muhammad Hassan, Fareed Zaffar | 
                                    
                                        Arxiv
                                     | 
                                    Internet security and privacy lab, LUMS | 
                                    IF- 1.128 | 
                                
                                
                                    | 
                                        ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes
                                     | 
                                    Waseem Iqbal; Haider Abbas; Pan Deng; Jiafu Wan; Bilal Rauf; Yawar Abbas; Imran Rashid | 
                                    
                                        IEEE Internet of Things Journal
                                     | 
                                    Internet of things, UETL | 
                                    
                                        IF- 9.936
                                     | 
                                
                                
                                    | Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis | 
                                    Zafeer Ahmed; Ibrahim Nadir; Haroon Mahmood; Ali Hammad Akbar; Ghalib Asadullah Shah | 
                                    
                                        2020 International Conference on Cyber Warfare and Security (ICCWS)
                                     | 
                                    Internet of things, UETL | 
                                    NEW | 
                                
                                
                                    | 
                                        IoT DoS and DDoS Attack Detection using ResNet
                                     | 
                                    
                                        Faisal Hussain; Syed Ghazanfar Abbas; Muhammad Husnain; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah
                                     | 
                                    
                                        IEEE International Multi Topic Conference
                                     | 
                                    Internet of things, UETL | 
                                    
                                        C
                                     | 
                                
                                
                                    | 
                                        A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
                                     | 
                                    
                                        Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah
                                     | 
                                    
                                        IEEE TrustCom / IWCSS
                                     | 
                                    Internet of things, UETL | 
                                    
                                        A
                                     | 
                                
                                
                                    | IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source | 
                                    Syed Ghazanfar Abbas; Shahzaib Zahid; Faisal Hussain; Ghalib A. Shah; Muhammad Husnain | 
                                    
                                        IEEE TrustCom/C4W
                                     | 
                                    Internet of things, UETL | 
                                    A | 
                                
                                
                                    | 
                                        A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
                                     | 
                                    
                                        IEEE Trustcom/BigDataSE
                                     | 
                                    
                                        IEEE Trustcom/BigDataSE
                                     | 
                                    Internet of things, UETL | 
                                    A | 
                                
                                
                                    | Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles | 
                                    Abdul Rehman Javed,  Zunera Jalil,  Syed Atif Moqurrab,  Sidra Abbas,  Xuan Liu | 
                                    Transactions on Emerging Telecommunications Technologies, Wiley | 
                                    National Cybercrime and forensics Lab, AU | 
                                    IF- 1.59 | 
                                
                                
                                    | Towards a Universal Features Set for IoT Botnet Attacks Detection | 
                                    Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | 
                                    IEEE International Multi Topic Conference | 
                                    Internet of Things (IoT) Security Lab, UET-L | 
                                    C | 
                                
                                
                                    | Web Server Attack Detection using Machine Learning | 
                                    Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq | 
                                    IEEE ICCWS 2020 | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    NEW | 
                                
                                
                                    | Automatic YARA Rule Generation | 
                                    Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad | 
                                    IEEE ICCWS 2020 | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    NEW | 
                                
                                
                                    | Towards Characterizing COVID-19 Awareness on Twitter | 
                                    Muhammad Saad, Muhammad Hassan, Fareed Zaffar | 
                                    Arxiv | 
                                    Internet Security and Privacy Lab, LUMS | 
                                    --- | 
                                
                                
                                    | Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus | 
                                    
                                        Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli
                                        Erica Barone, M. H. Alizai
                                     | 
                                    SenSys '20 | 
                                    Internet Security and Privacy Lab, LUMS | 
                                     A* | 
                                
                                
                                    | Intermittent Computing with Dynamic Voltage and Frequency Scaling | 
                                    
                                        Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
                                     | 
                                    EWSN '20 | 
                                    Internet Security and Privacy Lab, LUMS | 
                                    A | 
                                
                                
                                    | Analysis of File-less Malware and its Evasive Behavior | 
                                    
                                        Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
                                     | 
                                    IEEE ICCWS 2020 | 
                                    Internet Security and Quantum Technology Lab, NED UET | 
                                    NEW | 
                                
                                
                                    | Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection | 
                                    
                                        Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah
                                     | 
                                    IEEE ICCWS 2020 | 
                                    Internet of Things (IoT) Security Lab, UET-L | 
                                    NEW | 
                                
                                
                                    | Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web | 
                                    
                                        Syed Suleman Ahmad ,  Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab  Nithyanand
                                     | 
                                    WWW '20 | 
                                    Internet Security and Privacy Lab, LUMS | 
                                    A* | 
                                
                                
                                    | CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks | 
                                    
                                        Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar
                                     | 
                                    PETS | 
                                    Internet Security and Privacy Lab, LUMS | 
                                     B | 
                                
                                
                                    | Using Application Layer Banner Data to Automatically Identify IoT Devices | 
                                    
                                        Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed
                                     | 
                                    Internet Measurement Conference | 
                                    Internet Security and Privacy Lab, LUMS | 
                                    A | 
                                
                                
                                    | Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis | 
                                    Fatima Khalid, Ammar Masood | 
                                    IEEE ICCWS, 2020 | 
                                    Devices and Network Security Lab, AU | 
                                    NEW | 
                                
                                
                                    | Role of User and Entity Behavior Analytics in Detecting Insider Attacks | 
                                    Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood | 
                                    IEEE ICCWS, 2020 | 
                                    Devices and Network Security Lab, AU | 
                                    NEW | 
                                
                                
                                    | FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs | 
                                    Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad | 
                                    Transactions on Very Large Scale Integration (VLSI), IEEE | 
                                    Deep Packet Inspection (DPI) Lab, UET-T | 
                                    IF- 2.037 | 
                                
                                
                                    | Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques | 
                                    Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat | 
                                    IEEE Access | 
                                    Blockchain Security Lab, ITU-L | 
                                    IF- 3.47 | 
                                
                                
                                    | Byte-Level Object Identification for Forensic Investigation of Digital Images | 
                                    Abdul Rehman Javed, Zunera Jalil | 
                                    IEEE ICCWS, 2020 | 
                                    National Cybercrime and forensics Lab, AU | 
                                    NEW | 
                                
                                
                                    | Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM | 
                                    
                                        Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani
                                     | 
                                    IEEE INMIC-2020 | 
                                    National Cybercrime and forensics Lab, AU | 
                                    Not Ranked | 
                                
                                
                                    | A Generalized Machine Learning Based Model for Detection of DDoS Attacks | 
                                    Murk Marvi,  Asad Arfeen,  Riaz Uddin | 
                                    International Journal of Network Management, Wiley | 
                                    Internet Security and Quantum Technology Lab, NED-UET | 
                                    IF- 1.66 | 
                                
                                
                                    | Application layer classification of Internet traffic using ensemble learning models | 
                                    Asad Arfeen,  Khizar Ul Haq,  Syed Muhammad Yasir | 
                                    International Journal of Network Management, Wiley | 
                                    Internet Security and Quantum Technology Lab, NED-UET | 
                                    IF- 1.66 | 
                                
                                
                                    | Application layer classification of Internet traffic using ensemble learning models | 
                                    Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen | 
                                    Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK | 
                                    Internet Security and Quantum Technology Lab, NED-UET | 
                                    IF- 0.68 | 
                                
                                
                                    | Analysis of achievable distances of BB84 and KMB09 QKD protocols | 
                                    Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz | 
                                    International Journal of Quantum Information, WORLD SCIENTIFIC | 
                                    Internet Security and Quantum Technology Lab, NED-UET | 
                                    IF- 1.17 | 
                                
                                
                                    | Systematic Review Analysis on SQLIA Detection and Prevention Approaches | 
                                    Muhammad Saidu Aliero,  Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri   | 
                                    Wireless Personal Communications | 
                                    Cyber Reconnaissance and Combat Lab, Bahria University | 
                                    IF- 1.20 | 
                                
                                
                                    | Security protocol using elliptic curve cryptography algorithm for wireless sensor networks | 
                                    Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad  | 
                                    Journal of Ambient Intelligence and Humanized Computing | 
                                    Cyber Reconnaissance and Combat Lab, Bahria University | 
                                    IF- 4.59 | 
                                
                                
                                    | Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks | 
                                    Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon | 
                                    Neural Computing and Applications | 
                                    Cyber Reconnaissance and Combat Lab, Bahria University | 
                                    IF- 4.68 | 
                                
                                
                                    | A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique | 
                                    Fazal Qudus Khan,  George Tsaramirsis,  Sadeeq Jan | 
                                    CMC-Computers, Materials & Continua, 64(1), 31–61s | 
                                    Innovative Secured Systems Lab, UET Peshawar | 
                                    IF- 4.68 | 
                                
                                
                                    | Proposing Model for Security of IoT Devices in Smart Logistics: A Review | 
                                    Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan | 
                                    3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs | 
                                    Innovative Secured Systems Lab, UET Peshawar | 
                                    IF- A | 
                                
                                
                                    | SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks  | 
                                    Kaleem Ullah , Imran Rashid , Hammad Afzal  , Mian Muhammad Waseem Iqbal  , Yawar Abbas Bangas, Haider Abbas | 
                                    IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1   | 
                                    National Cyber Security Auditing And Evaluation Lab, NUST | 
                                    IF- 22.9 | 
                                
                                
                                    | An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security | 
                                    Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass | 
                                    IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1   | 
                                    National Cyber Security Auditing And Evaluation Lab, NUST | 
                                    IF- 9.5 | 
                                
                                
                                    | AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis   | 
                                    Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib  | 
                                    Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1    | 
                                    National Cyber Security Auditing And Evaluation Lab, NUST | 
                                    IF- 2.8 | 
                                
                                
                                    | Integrated Security, Safety, and Privacy Framework for Securing Medical Devices   | 
                                    Tahreem Yaqoob , Haider Abbas  , Narmeen Shafqat | 
                                    IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1  | 
                                    National Cyber Security Auditing And Evaluation Lab, NUST | 
                                    IF- 5.18 | 
                                
                                
                                    | Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices   | 
                                    Naveeda Ashraf,  Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat  | 
                                    Telecommunication Systems, Springer.    | 
                                    National Cyber Security Auditing And Evaluation Lab, NUST | 
                                    IF- 1.70 | 
                                
                                
                                    | A Review of Web Browser Forensic Analysis Tools and Techniques   | 
                                    Amir Rasool and Zunera Jalil  | 
                                    Researchpedia Journal of Computing, Volume 1 | 
                                    National Cybercrime and Forensics Lab, Air | 
                                    --- | 
                                
                                
                                    | An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data  | 
                                    Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan   | 
                                    SCI Journal (Springer Multimedia Systems Journal ) | 
                                    Innovative Secured Systems Lab, UET Peshawar | 
                                    IF- 1.73 | 
                                
                                
                                    | xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things  | 
                                    
                                        Gauhar Ali,Naveed Ahmad ,
                                        Yue Cao,
                                        Shahzad Khan,
                                        Haitham Cruickshank
                                     | 
                                    IEEE Access | 
                                    Innovative Secured Systems Lab, UET Peshawar | 
                                    IF- 3.47 | 
                                
                                
                                    |  IoT-Flock: An Open-source Framework for IoT Traffic Generation | 
                                    Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah | 
                                    IEEE International Conference on Emerging Trends in Smart Technologies | 
                                    Internet of Things (IoT) Security Lab, UET Lahore | 
                                    NEW | 
                                
                                
                                    | Enterprise Mobile Device Management Requirements and Features | 
                                    Hina Batool ; Ammar Masood | 
                                    
                                        IEEE International Conferenceon Computer Communications -
                                     | 
                                    Devices and Network Security Lab, Air | 
                                    NEW | 
                                
                                
                                    | Towards an Efficient Intrusion Detection System for High Speed Networks | 
                                    Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam | 
                                    
                                        IEEE
                                     | 
                                    Cyber Reconnaissance and Combat (CRC) Lab, Bahria | 
                                    Not Ranked | 
                                
                                
                                    | Hardware Trojan Detection using FBHT in FPGAs | 
                                    Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik | 
                                    
                                        IEEE
                                     | 
                                    Cyber Reconnaissance and Combat (CRC) Lab, Bahria | 
                                    Not Ranked | 
                                
                                
                                    | LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol | 
                                    
                                        Ateeq ur Rehman ; Muhammad Rehan  ; Naeem Iqbal ; Choon Ki Ahn
                                     | 
                                    
                                        IEEE
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    5.131 | 
                                
                                
                                    | 
                                        Distributed Fault Detection and Isolation in Second
                                        Order Networked Systems in a Cyber-Physical
                                        Environment
                                     | 
                                    
                                        AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood
                                     | 
                                    
                                        ISA Transactions/Elsevier
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    4.30 | 
                                
                                
                                    | 
                                        Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach
                                     | 
                                    
                                        MA Abbasi, AQ Khan, M Abid
                                     | 
                                    
                                        Transactions of the Institute of Measurement and Control
                                     | 
                                    Critical Infrastructure Protection & Malware Analysis, PIEAS | 
                                    1.97 | 
                                
                                
                                    | 
                                        WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
                                     | 
                                    
                                        Maria Mushtaq  ; Jeremy Bricq  ; Muhammad Khurram Bhatti  ; Ayaz Akram  ; Vianney Lapotre ;
                                        Guy Gogniat ;
                                        Pascal Benoit
                                     | 
                                    
                                        IEEE
                                     | 
                                    Blockchain Security Lab, ITU Lahore | 
                                    3.47 | 
                                
                                
                                    | 
                                        Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
                                     | 
                                    
                                        M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti
                                     | 
                                    
                                        Information Systems, 2020
                                     | 
                                    Blockchain Security Lab, ITU Lahore | 
                                    2.77 | 
                                
                                
                                    | 
                                        Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
                                     | 
                                    
                                        Ayaz Akram  ; Maria Mushtaq ; Muhammad Khurram Bhatti  ; Vianney Lapotre  ; Guy Gogniat
                                     | 
                                    
                                        IEEE
                                     | 
                                    Blockchain Security Lab, ITU Lahore | 
                                    --- |