Research & Collaborations

2024

Title Author Journal/ Conference Lab Impact Factor
Gemstones Supply Chain Management through Blockchain Mechanism Talha Ahsan, Muhammad Junaid, Abdul Haseeb Malik, Qazi Ejaz Ali International Journal of Innovations in Science & Technology Blockchain Security Lab, ITU IF-2.65
A compliance-based ranking of certificate authorities using probabilistic approaches Kashif Junaid, Muhammad Umar Janjua & Junaid Qadir International Journal of Information Security Blockchain Security Lab, ITU IF-2.4
Complex networks after centrality-based attacks and defense Maham Zafar, Kashif Kifayat, Ammara Gul, Usman Tahir & Sarah Abu Ghazalah Complex & Intelligent Systems NCCS Secretariat, Air University IF-5.0
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique Syeda Tayyaba Bukhari; Muhammad Umar Janjua; Junaid Qadir IEEE Open Journal of the Computer Society Blockchain Security Lab, ITU-L IF---
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems Fatima Mavra Khalil, Adnan Fazil, Muhammad Jawad Hussain, Ammar Masood Computers & Security Volume 137, February 2024, 103633 Device and Network Security Lab, Air University IF-4.8
Cybersecurity on a Budget: Evaluating Security and Performance of Open-source SIEM Solutions for SMEs Jawad Manzoor, Abdul Waleed, Abdul Fareed Jamali, Ammar Masood PLOS ONE Device and Network Security Lab, Air University IF-2.9
Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework Faiza Babar Khan; Muhammad Hanif Durad; Asifullah Khan; Farrukh Aslam Khan; Muhammad Rizwan; Aftab Ali IEEE Access ( Volume: 12) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-3.47
Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring Muhammad Sheeraz; Muhammad Hanif Durad; Shahzaib Tahir; Hasan Tahir; Saqib Saeed; Abdullah M. Almuhaideb IEEE Access ( Volume: 12) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-3.47
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection Muhammad Sheeraz; Muhammad Hanif Durad; Muhammad Arsalan Paracha; Syed Muhammad Mohsin; Sadia Nishat Kazmi; Carsten Maple MDPI Sensors (2024) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-4.1
Fully-distributed Consensus Control of Multi-agent Systems Under Stochastic Hybrid Attacks on a Directed Graph Muhammad Mamoon, Ghulam Mustafa, Naeem Iqbal & Muhammad Rehan International Journal of Control, Automation and Systems (2024) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-2.5
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF Hassan Jalil Hadi; Mubashir Adnan; Faisal Bashir Hussain; Mohammed Ali Alshara; Yasir Javed MDPI- Technologies Jounal (2024) Cyber Reconnaissance and Combat (CRC) Lab, Bahria --

2023

Title Author Journal/ Conference Lab Impact Factor
Energy management of smart homes over fog-based IoT architecture Muhammad Umair, Muhammad Aamir Cheema, Bilal Afzal, Ghalib Shah Sustainable Computing: Informatics and Systems, Elsevier Internet of things, UETL IF-3.8
KTSDroid: A Framework for Android Malware Categorization Using the Kernel Task Structure Saneeha Khalid, Khalid Imran, Faisal Bashir Hussain Hindawi (published in the journal Security and Communication Networks) Internet of things, UETL IF---
An intelligent context-aware threat detection and response model for smart cyber-physical systems Zainab Noor, Sadaf Hina, Faisal Hayat, Ghalib A Shah Internet of Things Internet of things, UETL IF-6.1
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization Maham Chaudhary, Ammar Masood Neural Computing & Applications (2023) Device and Network Security Lab, Air University IF-4.5
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts Maha Ayub, Tania Saleem, Muhammad Janjua, Talha Ahmad ACM Transactions on Software Engineering and Methodology 2023 Blockchain Security Lab, ITU Lahore IF-6.0
Effective Security Monitoring Using Efficient SIEM Architecture Sheeraz Muhammad, Paracha Muhammad Arsalan, Haque Mansoor Ul, Durad Muhammad Hanif, Mohsin Syed Muhammad, Band Shahab S., and Mosavi Amir Human-centric Computing and Information Sciences (published by the Korea Computer Industry Association) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-11.1
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning Muhammad Arsalan Paracha, Muhammad Sadiq, Junwei Liang, Muhammad Hanif Durad, Muhammad Sheeraz MDPI Sensors 2023 Critical Infrastructure Protection & Malware Analysis, PIEAS IF-3.84
Detection of Data Scarce Malware Using One-Shot Learning With Relation Network Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed Alqarni IEEE Access ( Volume: 11) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-3.47
Effective network intrusion detection using stacking-based ensemble approach Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, Anila Usman, Syed Muhammad Mohsin, Hana Mujlid & Carsten Maple Springer International Journal of Information Security Critical Infrastructure Protection & Malware Analysis, PIEAS IF-2.4
Autonomous and Collaborative Smart Home Security System (ACSHSS) Hassan Jalil Hadi, Khaleeq Un Nisa, Sheetal Harris arXiv preprint arXiv (2023) Cyber Reconnaissance and Combat (CRC) Lab, Bahria University --
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware Haider Abbas; Muhammad Shahzad; Maliha Safdar; Ahmed Hemani IEEE Transactions on Dependable and Secure Computing Security Auditing and Evaluation Lab, NUST IF: 7.3
Security Assessment and Evaluation of VPNs: A Comprehensive Survey Haider Abbas; Naina Emmanuel; Muhammad Faisal Amjad; Tahreem Yaqoob; Mohammed Atiquzzaman; Zafar Iqbal; Narmeen Shafqat; Waleed Bin Shahid; Ali Tanveer; Umer Ashfaq ACM Computing Surveys, Volume 55, Issue 13s National Cyber Security Auditing And Evaluation Lab, NUST IF-23.8
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning Muhammad Arsalan Paracha; Muhammad Sadiq; Junwei Liang; Muhammad Hanif Durad; Muhammad Sheeraz Sensors 2023, 23(13), 5829 Critical Infrastructure Protection & Malware Analysis, PIEAS IF-4.1

2022

Title Author Journal/ Conference Lab Impact Factor
Tracking adoption of revocation and cryptographic features in X.509 certificates Maryam Zulfiqar, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Tania Saleem & Jack W. Stokes Springer International Journal of Information Security, 2022 Blockchain Security Lab, ITU Lahore IF-1.98
Design of an Advance Intrusion Detection System for IoT Networks Asima Sarwar; Salva Hasan; Waseem Ullah Khan; Salman Ahmed; Safdar Nawaz Khan Marwat 2nd International Conference on Artificial Intelligence Innovative Secured Systems Lab, UET-P C
Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol. Waseem Ullah Khan; Safdar Nawaz Khan Marwat; Salman Ahmed Techscience-Computer Systems Science & Engineering Innovative Secured Systems Lab, UET-P IF-4.397
Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO Asima Sarwar; Abdullah M. Alnajim; Safdar Nawaz Khan Marwat; Salman Ahmed; Saleh Alyahya; Waseem Ullah Khan Sensors 2022, 22(13), 4926 Innovative Secured Systems Lab, UET-P IF-3.57
Design of a computationally efficient observer-based distributed fault detection and isolation scheme in second-order networked control systems Aadil Sarwar Khan; Abdul Qayyum Khan; Naeem Iqbal; Ghulam Mustafa; Muhammad Asim Abbasi; Atif Mahmood ISA Transactions (Elsvier) Critical Infrastructure Protection & Malware Analysis, PIEAS IF-I.474
A Survey of the Recent Trends in Deep Learning Based Malware Detection Umm-e-Hani Tayyab; Faiza Babar Khan; Muhammad Hanif Durad; Asifullah Khan; Yeon Soo Lee Journal of Cybersecurity and Privacy Critical Infrastructure Protection & Malware Analysis, PIEAS IF-4.1
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System Muhammad Husnain; Khizar Hayat; Enrico Cambiaso; Ubaid U. Fayyaz; Maurizio Mongelli; Habiba Akram; Syed Ghazanfar Abbas; Ghalib A. Shah MDPI Sensors 2022 Internet of things, UETL IF 3.57
An automated context-aware IoT vulnerability assessment rule-set generator Fabiha Hashmat; Syed Ghazanfar Abbas; Sadaf Hina; Ghalib A. Shah; Taimur Bakhshi; Waseem Abbas Computer Communications, Volume 186, 15 March 2022 Internet of things, UETL IF 3.167
A framework to predict early news popularity using deep temporal propagation patterns Ramsha Saeed; Haider Abbas; Sara Asif; Saddaf Rubab; Malik M. Khan; Naima Iltaf; Shynar Mussiraliyeva Elsevier: Expert Systems with Applications, Volume 195, 1 June 2022 Security Auditing and Evaluation Lab, NUST IF 8.665
Forensic analysis of image deletion applications Maheen Fatima, Haider Abbas, Waseem Iqbal & Narmeen Shafqat Multimedia Tools and Applications Security Auditing and Evaluation Lab, NUST IF-3.158
Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE) Fatima Khalid; Ammar Masood Computers & Security, 2022 Device and Network Security Lab IF-2.514
Which open-source IDS? Snort, Suricata or Zeek Abdul Waleed; Abdul Fareed Jamali; Ammar Masood Computers & Security, 2022 Device and Network Security Lab IF-6.708
Security-enhanced Android for an enterprise Syed Rameez Rehman; Mudassar Waheed; Ammar Masood International Journal of Security and Networks Device and Network Security Lab IF-0.64
A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics Ahmed Abbasi; Abdul Rehman Rehman Javed; Amanullah Yasin; Zunera Jalil; Natalia Kryvinska; Usman Tariq IEEE Access -2022 Intelligent Big Data Analytics for Internet of Things, Services and People National Cybercrime and Forensics Lab, Air University Lab IF-3.367

2021

Title Author Journal/ Conference Lab Impact Factor
Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction Anwar Said, Muhammad Umar Janjua, Saeed-Ul Hassan, Zeeshan Muzammal, Tania Saleem, Tipajin Thaipisutikul, Suppawong Tuarob, Raheel Nawaz PeerJ Computer Science, 2021 Blockchain Security Lab, ITU Lahore IF-1.39
EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds Maryam Zulfiqar; Filza Tariq; Muhammad Umar Janjua; Adnan Noor Mian; Adnan Qayyum; Junaid Qadir; Falak Sher ; Muhammad Hassan Computers & Security Volume 100, Jan 2021 Blockchain Security Lab, ITU Lahore IF-4.43
An approximate-computing empowered green 6G downlink Maryam Idrees; Mohammed Manzar Maqbool; Muhammad Khurram Bhatti; M. Mahboob Ur Rahman; Rehan Hafiz; Muhammad Shafique Journal of Physical Communication, Volume 49, December 2021 Blockchain Security Lab, ITU Lahore IF-1.35
Realization of a Novel, Lightweight and Secured CoAP Based Monitoring System in Smart Logistics Salva Hasan; Salman Ahmed; Safdar Nawaz Khan Marwat 2021 6th International Multi-Topic ICT Conference (IMTIC) Innovative Secured Systems Lab, UET-P --
Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System S. Johar; N. Ahmad; A. Durrani; G. Ali IEEE Access 2021 Innovative Secured Systems Lab, UET-P IF-3.47
Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey Sumaira Johar; Naveed Ahmad; Warda Asher; Haitham Cruickshank; Amad Durrani MDPI Applied Sciences 2021 Innovative Secured Systems Lab, UET-P IF-2.67
Reverse Engineering of Mobile Banking Applications Syeda Warda Asher; Sadeeq Jan; George Tsaramirsis; Fazal Qudus Khan; Abdullah Khalil; Muhammad Obaidullah Tech Science - Computer Systems Science & Engineering Innovative Secured Systems Lab, UET-P IF-3.772
Implementation of Cyber-Physical Systems with Modbus Communication for Security Studies Haseeb Ahmed Chattha; Muhammad Miftah Ur Rehman; Ghulam Mustafa; Abdul Qayyum Khan; Muhammad Abid; Ehtisham Ul Haq IEEE ICCWS 2021 Critical Infrastructure Protection & Malware Analysis, PIEAS --
A Generic Machine Learning Approach for IoT Device Identification Zain Ali; Faisal Hussain; Syed Ghazanfar; Muhammad Husnain; Shahzaib Zahid; Ghalib A. Shah 2021 International Conference on Cyber Warfare and Security (ICCWS) Internet of things, UETL --
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach Syed Ghazanfar Abbas; Ivan Vaccari; Faisal Hussain; Shahzaib Zahid; Ubaid Ullah Fayyaz; Ghalib A. Shah; Taimur Bakhshi; Enrico Cambiaso MDPI Sensors 2021 Internet of things, UETL IF 7.529
Generic signature development for IoT Botnet families Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah; Kashif Zafar Forensic Science International: Digital Investigation, Volume 38, September 2021, Internet of things, UETL IF 2.39
A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks Faisal Hussain; Syed Ghazanfar Abbas; Ivan Miguel Pires; Sabeeha Tanveer; Ubaid U. Fayyaz; Nuno M. Garcia; Ghalib A. Shah; Farrukh Shahzad 2021 IEEE Access Internet of things, UETL --
SSD Forensic: Evidence Generation and Forensic Research on Solid State Drives Using Trim Analysis Hassan Jalil Hadi; Numan Musthaq; Irshad Ullah Khan 2021 International Conference on Cyber Warfare and Security (ICCWS) Cyber Reconnaissance and Combat (CRC) Lab, Bahria University --
A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks Arshad Masood; Ammar Masood 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST) Device and Network Security Lab, Air University --
FOIST - Framework for Operating System Testing by Integrating Standards and Tools Maheen Fatima; Haider Abbas; Tahreem Yaqoob; Zarmeen Ahmad 2021 International Conference on Communication Technologies (ComTech) Security Auditing and Evaluation Lab, NUST NEW
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware Zia Muhammad; Muhammad Faisal Amjad; Haider Abbas; Zafar Iqbal; Anique Azhar; Ahsan Yasin; Hasan Iesar 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC) Security Auditing and Evaluation Lab, NUST B
A Malware Evasion Technique for Auditing Android Anti-Malware Solutions Samrah Mirza; Haider Abbas; Waleed Bin Shahid; Narmeen Shafqat; Mariagrazia Fugini; Zafar Iqbal; Zia Muhammad 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) Security Auditing and Evaluation Lab, NUST B
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu Ramsha Saeed, Hammad Afzal, Haider Abbas, Maheen Fatima ACM Transactions on Asian and Low-Resource Language Information Processing 2021 Security Auditing and Evaluation Lab, NUST IF 1.14
A survey on common criteria (CC) evaluating schemes for security assessment of IT products Maheen Fatima1, Haider Abbas, Tahreem Yaqoob1, Narmeen Shafqat1, Zarmeen Ahmad1, Raja Zeeshan1, Zia Muhammad1, Tauseef Rana2, Shynar Mussiraliyeva Peer J Computer Science Security Auditing and Evaluation Lab, NUST IF-1.39
A systematic review of scalable hardware architectures for pattern matching in network security Malik Imran; Faisal Bashir; Atif Raza Jafri; Muhammad Rashid; Muhammad Najam ul Islam Elsevier Computers & Electrical Engineering 2021 Cyber Reconnaissance and Combat Lab, Bahria University IF-3.8
Deep learning based cyber bullying early detection using distributed denial of service flow Muhammad Hassan Zaib; Faisal Bashir; Kashif Naseer Qureshi; Sumaira Kausar; Muhammad Rizwan; Gwanggil Jeon Multimedia Systems Springer 2021 Cyber Reconnaissance and Combat Lab, Bahria University IF-1.93
Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine Junaid Shabbir Abbasi; Faisal Bashir; Kashif Naseer Qureshi; Muhammad Najam ul Islam; Gwanggil Jeon Computers & Electrical Engineering Elsevier 2021 Cyber Reconnaissance and Combat Lab, Bahria University IF-5.57
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network Syed Ibrahim Imtiaz; Saif ur Rehman; Abdul Rehman Javed; Zunera Jalil; Xuan Liu; Waleed S. Alnumay Future Generation Computer Systems, volume 115, February 2021, Pages 844-856 National Cybercrime and Forensics Lab IF-8.87
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects Waqas Ahmed; Faisal Shahzad; Abdul Rehman Javed; Farkhund Iqbal; Liaqat Ali 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) National Cybercrime and Forensics Lab ---
Robust Early Stage Botnet Detection using Machine Learning Ali Muhammad; Muhammad Asad; Abdul Rehman Javed ICCWS-2020 National Cybercrime and Forensics Lab ---
ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning Ahmad Abbasi; Abdul Rehman Javed; Chinmay Chakraborty; Jamel Nebhen; Wisha Zehra; Zunera Jalil IEEE - Intelligent Big Data Analytics for Internet of Things National Cybercrime and Forensics Lab IF- 1.508
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, Ali Kashif Bashir Future Generation Computer Systems National Cybercrime and Forensics Lab IF- 6.125
Cross corpus multi-lingual speech emotion recognition using ensemble learning Wisha Zehra, Abdul Rehman Javed, Zunera Jalil, Habib Ullah Khan & Thippa Reddy Gadekallu Complex & Intelligent Systems, springer National Cybercrime and Forensics Lab IF- 5.277
Mitigating Service - Oriented Attaks Using Context - Based Trust for Smart Cities in IoT Networks Ayesha Altaf, Haider Abbas, Faiza Iqbal, Malik Muhammad Zaki Murtaza Khan, Abdul Rauf, Tehsin Kanwal Journal of Systems Architecture Security Auditing and Evaluation Lab, NUST IF- 2.552
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparison Syed Wasif Abbas Hamdani, Haider Abbas, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik, Malik Hamza Murtaza ACM Computing Surveys Security Auditing and Evaluation Lab, NUST IF- 7.9
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles Junaid Shabbir Abbasi, Faisal Bashir, Kashif Naseer Qureshi, Muhammad Najam ul Islam, Gwanggil Jeon Computers & Electrical Engineering Blockchain Lab, ITU-L IF- 4.79
Deep learning based cyber bullying early detection using distributed denial of service flow Muhammad Hassan Zaib, Faisal Bashir, Kashif Naseer Qureshi, Sumaira Kausar, Muhammad Rizwan & Gwanggil Jeon Multimedia Systems Blockchain Lab, ITU-L IF- 1.563
A Framework for Malicious Traffic Detection in IoT Healthcare Environment Faisal Hussain, Syed Ghazanfar Abbas, Ghalib A. Shah,Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia and Zdravevski MDPI Internet of things, UETL 3.275
A Framework for Malicious Traffic Detection in IoT Healthcare Environment Sadeeq Jan, Omer Bin Tauqeer, Fazal Qudus Khan, George Tsaramirsis, Awais Ahmad,Iftikhar Ahmad, Imran Maqsood and Niamat Ullah Computers, Materials & Continua Innovative Secured Systems Lab, UET-P 4.890

2020

Title Author Journal/ Conference Lab Impact Factor
A Framework for Systematic Classification of Assets for Security Testing Sadeeq Jan; Omer Bin Tauqeer; Fazal Qudus Khan; George Tsaramirsis; Awais Ahmad; Iftikhar Ahmad; Imran Maqsood; Niamat Ullah Tech Science - Computers, Materials and Continua Innovative Secured Systems Lab, UET-P IF-3.77
Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks Syed Hasan Amin Mahmood; Syed Mustafa Ali Abbasi; Ahmed Abbasi; Fareed Zaffar IEEE International Conference on Intelligence and Security Informatics (ISI) Internet of things, UETL C
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems Muhammad Rashid, Malik Imran, Atif Raza Jafri IAIT 20: Proceedings of the 11th International Conference on Advances in Information Technology Cyber Reconnaissance and Combat (CRC) Lab, Bahria University --
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages Abdur Rehman Raza; Khawir Mahmood; Muhammad Faisal Amjad; Haider Abbas; Mehreen Afzal Future Generation Computer Systems, Volume 104, March 2020 Security Auditing and Evaluation Lab, NUST IF-7.18
Security analysis of KXB10 QKD protocol with higher-dimensional quantum states Usama Ahsan; Muhammad Mubashir Khan; Asad Arfeen; Khadija Azam International Journal of Quantum Information, World Scientific Internet Security and Quantum Technology Lab, NED UET IF-1.17
Fault-Tolerant Robust Model Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad IEEE Transactions on Industrial Electronics Critical Infrastructure Protection & Malware Analysis, PIEAS W
Attack Detection From Network Traffic using Machine Learning Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad VFAST Transactions on Software Engineering Critical Infrastructure Protection & Malware Analysis, PIEAS X
Identification of Malware Families for Creating Generic Signatures : Using Dynamic Analysis and Clustering Methods Umm-e-Hani, M. Ali, M. Ismail, A. Khan and H. Durad International Symposium on Recent Advances in Electrical Engineering & Computer Sciences  Critical Infrastructure Protection & Malware Analysis, PIEAS W
Separation Principle with Secure State Estimation and Lyapunov Stability of Cyber-Physical System under Sensor Attack Maryam Khan, Naeem Iqbal, Abdul Qayyum Khan IEEE Conference on Recent Advances in Electrical Engineering Critical Infrastructure Protection & Malware Analysis, PIEAS ---
A Novel Ensemble Machine Learning Method to Detect Phishing Attack Abdul Basit; Maham Zafar; Abdul Rehman Javed; Zunera Jalil IEEE International Conference on Multi Topic National Cybercrime and Forensics Lab, Air University ---
A comprehensive survey of AI-enabled phishing attacks detection techniques Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil & Kashif Kifayat Telecommunication Systems National Cybercrime and Forensics Lab, Air University IF- 1.734
Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes MUuhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen Wiley International Journal of Satellite Communications and Networking Security Auditing and Evaluation Lab, NUST IF- 1.652
Quality of experience‐based optimization of satellite Internt using WAN accelerators Asad Arfeen, Riaz Uddin Wiley International Journal of Satellite Communications and Networking Security Auditing and Evaluation Lab, NUST IF- 1.652
Context - Oriented Trust Computational Modal for Malicious Node Avoidance Using Edge Intelligence in Industrial Internet of Things A Altaf, H Abbas, F Iqbal, FA Khan, S Rubab Computer & Electrical Engineering Security Auditing and Evaluation Lab IF- 2.663
Robust, Secure and Adaptive Trust-Based Service Selection in Smart Buildings in the Internet of Things (IoT) Ayesha Altaf; Haider Abbas; Faiza Iqbal; Malik Muhammad Zaki Murtaza Khan; Mahmoud Daneshmand IEEE Internet of Things Journal. Security Auditing and Evaluation Lab IF- 9.5
Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement Anum Arshad; Haider Abbas; Waleed Bin Shahid; Anique Azhar WETICE 2020 Security Auditing and Evaluation Lab ---
Towards Characterizing the COVID-19 Awareness on Twitter. Muhammad Saad, Muhammad Hassan, Fareed Zaffar Arxiv Internet security and privacy lab, LUMS IF- 1.128
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes Waseem Iqbal; Haider Abbas; Pan Deng; Jiafu Wan; Bilal Rauf; Yawar Abbas; Imran Rashid IEEE Internet of Things Journal Internet of things, UETL IF- 9.936
Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis Zafeer Ahmed; Ibrahim Nadir; Haroon Mahmood; Ali Hammad Akbar; Ghalib Asadullah Shah 2020 International Conference on Cyber Warfare and Security (ICCWS) Internet of things, UETL NEW
IoT DoS and DDoS Attack Detection using ResNet Faisal Hussain; Syed Ghazanfar Abbas; Muhammad Husnain; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah IEEE International Multi Topic Conference Internet of things, UETL C
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah IEEE TrustCom / IWCSS Internet of things, UETL A
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source Syed Ghazanfar Abbas; Shahzaib Zahid; Faisal Hussain; Ghalib A. Shah; Muhammad Husnain IEEE TrustCom/C4W Internet of things, UETL A
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case IEEE Trustcom/BigDataSE IEEE Trustcom/BigDataSE Internet of things, UETL A
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu Transactions on Emerging Telecommunications Technologies, Wiley National Cybercrime and forensics Lab, AU IF- 1.59
Towards a Universal Features Set for IoT Botnet Attacks Detection Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali IEEE International Multi Topic Conference Internet of Things (IoT) Security Lab, UET-L C
Web Server Attack Detection using Machine Learning Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq IEEE ICCWS 2020 Critical Infrastructure Protection & Malware Analysis, PIEAS NEW
Automatic YARA Rule Generation Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad IEEE ICCWS 2020 Critical Infrastructure Protection & Malware Analysis, PIEAS NEW
Towards Characterizing COVID-19 Awareness on Twitter Muhammad Saad, Muhammad Hassan, Fareed Zaffar Arxiv Internet Security and Privacy Lab, LUMS ---
Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli Erica Barone, M. H. Alizai SenSys '20 Internet Security and Privacy Lab, LUMS A*
Intermittent Computing with Dynamic Voltage and Frequency Scaling Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai EWSN '20 Internet Security and Privacy Lab, LUMS A
Analysis of File-less Malware and its Evasive Behavior Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai IEEE ICCWS 2020 Internet Security and Quantum Technology Lab, NED UET NEW
Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah IEEE ICCWS 2020 Internet of Things (IoT) Security Lab, UET-L NEW
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web Syed Suleman Ahmad , Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab Nithyanand WWW '20 Internet Security and Privacy Lab, LUMS A*
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar PETS Internet Security and Privacy Lab, LUMS B
Using Application Layer Banner Data to Automatically Identify IoT Devices Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed Internet Measurement Conference Internet Security and Privacy Lab, LUMS A
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis Fatima Khalid, Ammar Masood IEEE ICCWS, 2020 Devices and Network Security Lab, AU NEW
Role of User and Entity Behavior Analytics in Detecting Insider Attacks Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood IEEE ICCWS, 2020 Devices and Network Security Lab, AU NEW
FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad Transactions on Very Large Scale Integration (VLSI), IEEE Deep Packet Inspection (DPI) Lab, UET-T IF- 2.037
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat IEEE Access Blockchain Security Lab, ITU-L IF- 3.47
Byte-Level Object Identification for Forensic Investigation of Digital Images Abdul Rehman Javed, Zunera Jalil IEEE ICCWS, 2020 National Cybercrime and forensics Lab, AU NEW
Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani IEEE INMIC-2020 National Cybercrime and forensics Lab, AU Not Ranked
A Generalized Machine Learning Based Model for Detection of DDoS Attacks Murk Marvi, Asad Arfeen, Riaz Uddin International Journal of Network Management, Wiley Internet Security and Quantum Technology Lab, NED-UET IF- 1.66
Application layer classification of Internet traffic using ensemble learning models Asad Arfeen, Khizar Ul Haq, Syed Muhammad Yasir International Journal of Network Management, Wiley Internet Security and Quantum Technology Lab, NED-UET IF- 1.66
Application layer classification of Internet traffic using ensemble learning models Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK Internet Security and Quantum Technology Lab, NED-UET IF- 0.68
Analysis of achievable distances of BB84 and KMB09 QKD protocols Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz International Journal of Quantum Information, WORLD SCIENTIFIC Internet Security and Quantum Technology Lab, NED-UET IF- 1.17
Systematic Review Analysis on SQLIA Detection and Prevention Approaches Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri Wireless Personal Communications Cyber Reconnaissance and Combat Lab, Bahria University IF- 1.20
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.59
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon Neural Computing and Applications Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.68
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan CMC-Computers, Materials & Continua, 64(1), 31–61s Innovative Secured Systems Lab, UET Peshawar IF- 4.68
Proposing Model for Security of IoT Devices in Smart Logistics: A Review Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs Innovative Secured Systems Lab, UET Peshawar IF- A
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 22.9
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 9.5
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 2.8
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 5.18
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat Telecommunication Systems, Springer. National Cyber Security Auditing And Evaluation Lab, NUST IF- 1.70
A Review of Web Browser Forensic Analysis Tools and Techniques Amir Rasool and Zunera Jalil Researchpedia Journal of Computing, Volume 1 National Cybercrime and Forensics Lab, Air ---
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan SCI Journal (Springer Multimedia Systems Journal ) Innovative Secured Systems Lab, UET Peshawar IF- 1.73
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things Gauhar Ali,Naveed Ahmad , Yue Cao, Shahzad Khan, Haitham Cruickshank IEEE Access Innovative Secured Systems Lab, UET Peshawar IF- 3.47
IoT-Flock: An Open-source Framework for IoT Traffic Generation Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah IEEE International Conference on Emerging Trends in Smart Technologies Internet of Things (IoT) Security Lab, UET Lahore NEW
Enterprise Mobile Device Management Requirements and Features Hina Batool ; Ammar Masood IEEE International Conferenceon Computer Communications - Devices and Network Security Lab, Air NEW
Towards an Efficient Intrusion Detection System for High Speed Networks Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
Hardware Trojan Detection using FBHT in FPGAs Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS 5.131
Distributed Fault Detection and Isolation in Second Order Networked Systems in a Cyber-Physical Environment AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood ISA Transactions/Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS 4.30
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach MA Abbasi, AQ Khan, M Abid Transactions of the Institute of Measurement and Control Critical Infrastructure Protection & Malware Analysis, PIEAS 1.97
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ; Guy Gogniat ; Pascal Benoit IEEE Blockchain Security Lab, ITU Lahore 3.47
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti Information Systems, 2020 Blockchain Security Lab, ITU Lahore 2.77
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat IEEE Blockchain Security Lab, ITU Lahore ---

2019

Title Author Journal/ Conference Lab Impact Factor
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network Naveed Ahmad; Haitham Cruickshank; Yue Cao; Fakhri Alam Khan; Mohammad Asif; Awais Ahmad; Gwanggil Jeon Future Generation Computer Systems, Volume 93, April 2019 Innovative Secured Systems Lab, UET-P IF-7.187
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network Naveed Ahmad; Haitham Cruickshank; Yue Cao; Fakhri Alam Khan; Mohammad Asif; Awais Ahmad; Gwanggil Jeon Elsevier FGCS 2019 Innovative Secured Systems Lab, UET-P IF-4.3
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks Muhammad Imran; Muhammad Hanif Durad; Farrukh Aslam Khan; Haider Abbas IEEE Systems Journal Critical Infrastructure Protection & Malware Analysis, PIEAS IF-2.5
A Framework to Determine Applications’ Authenticity Rida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal Procedia Computer Science, Volume 155, 2019 Security Auditing and Evaluation Lab, NUST IF-0.883
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review Tahreem Yaqoob; Haider Abbas; Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials ( Volume: 21, Issue: 4, Fourthquarter 2019) Security Auditing and Evaluation Lab, NUST IF-22.9
Context - Based Trust Formation Using Direct User Experience in the IoT Ayesha Altaf; Haider Abbas; Faiza Iqbal IEEE International Conference on Cloud Computing Technology and Science (CloudCom) Security Auditing and Evaluation Lab, NUST IF- 1.07
The role of the Weibull distribution in modelling traffic in Internet access and backbone core networks Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig Journal of Network and Computer Applications, Elsevier Internet Security and Quantum Technology Lab, NED-UET IF- 5.57
To Act or React: Investigating Proactive Strategies For Online Community Moderation Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand Arxiv Internet Security and Quantum Technology Lab, NED-UET ---
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials. World’s Top Engg Journal Security Auditing and Evaluation Lab, MCS-NUST IF- 22.9
Global and local scaling analysis of link streams in access and backbone core networks Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig Computer Networks, Elsevier Internet Security and Quantum Technology Lab, NED-UET IF- 3.11
Extending symbolic execution for automated testing of stored procedures Maryam Abdul Ghafoor, ·Muhammad Suleman Mahmood, Junaid Haroon Siddiqui1 Software Quality Journal, Springer Internet Security and Privacy Lab, LUMS IF- 2.68
An algorithm for detecting SQL injection vulnerability using black-box testing Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi & Mohd Fo’ad Rohani Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.59
Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges Bilal Afzal, Muhammad Umair,Ghalib Asadullah Shah, Ejaz Ahmed Elsevier Future Generation Computer Systems IoT Security Lab, UET Lahore IF- 4.66
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices Bilal Imran , Bilal Afzal , Ali Hammad Akbar , Muhammad Ahsan , Ghalib A. Shah IEEE GLOBECOM’19 IoT Security Lab, UET Lahore B
one M2M Architecture Based Secure MQTT Binding in Mbed OS Ahsan Muhammad , Bilal Afzal , Bilal Imran , Asim Tanwir , Ali Hammad Akbar , Ghalib Shah IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore NEW
An auditing framework for vulnerability analysis of IoT systems Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore NEW
Blockchain based Permission Delegation and Access Control in Internet of Things (BACI) Gauhar Ali, Naveed Ahmad Yue Cao, Muhammad Asif, Haitham Cruickshank, Qazi Ejaz Ali Elsevier Journal on computer and Security Innovative Secured Systems Lab, UET Peshawar IF- 3.57
BCON: Blockchain Based Access Control across Multiple Conflict of Interest Domains Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham Cruickshank Elsevier Journal of Network and Computer Applications Innovative Secured Systems Lab, UET Peshawar IF- 4.57
Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations Tahreem Yaqoob, Azka Arshad, Haider Abbas, Muhammad Faisal Amjad, Narmeen Shafqat Elsevier FGCS National Cyber Security Auditing And Evaluation Lab, NUST ---
PR-TCAM: Efficient TCAM Emulation on Xilinx FPGAs Using Partial Reconguration. Pedro Reviriego, Anees Ullah, Salvatore Pontarelli Pedro Reviriego, Anees Ullah, Salvatore Pontarelli Transactions on Very Large Scale Integration (VLSI), IEEE Deep Packet Inspection (DPI) Lab, UET-T IF- 2.037
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review Tehreem Yaqoob , Haider Abbas , Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) National Cyber Security Auditing And Evaluation Lab, NUST IF- 4.45
Trust Models of Internet of Smart Things: A Survey, Open Issues, and Future Directions Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab Journal of Network and Computer Applications. National Cyber Security Auditing And Evaluation Lab, NUST IF- 4.57
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications Sadeeq Jan, Annibale Panichella, Andrea Arcuri & Lionel Briand Empirical Software Engineering Innovative Secured Systems Lab, UET Peshawar ---
Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android Hafiz Muhammad Arslan Maqsood ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
Toward an optimal solution against Denial of Service attacks in Software Defined Networks M Imran, MH Durad, FA Khan, A Derhab Future Generation Computer Systems/Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 6.5
Reducing the effects of DoS attacks in software defined networks using parallel flow installation Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan & Abdelouahid Derhab Human-centric Computing and Information Sciences/Springer Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 3.7
Intrusion detection using deep sparse auto-encoder and self-taught learning Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim & Muhammad Hanif Durad Neural Computing and Applications/ Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 4.68
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks Muhammad Imran ; Muhammad Hanif Durad ; Farrukh Aslam Khan ; Haider Abbas IEEE Systems Journal/IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 3.98
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture Maria Mushtaq ; Ayaz Akram ; Muhammad Khurram Bhatti ; Usman Ali ; Vianney Lapotre ; Guy Gogniat IEEE Conference on Communications and Network Security Blockchain Security Lab, ITU Lahore B
Wealth Distribution and Link Prediction in Ethereum Z Muzammal, MU Janjua, W Abbas, F Sher IEEE/WIC/ACM International Conference on Web Intelligence Blockchain Security Lab, ITU Lahore B
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News Adnan Qayyum ; Junaid Qadir ; Muhammad Umar Janjua ; Falak Sher IT professionals Blockchain Security Lab, ITU Lahore IF- 2.11
Guardian-A Smart Cloud Fabric for Virtual Patching and Customized Defenses Rashid Tahir; Abdur Rahman Al-Ahmadi; Bashayyer Al-Sharyoufi; Rajin Azzouni; Fareed Zaffar IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Internet Security and Privacy Lab, LUMS A*
The Browsers Strike Back: CounteringCryptojacking and Parasitic Miners on the Web Rashid Tahir; Sultan Durrani; Faizan Ahmed; Hammas Saeed; Fareed Zaffar; Saqib Ilyas IEEE INFOCOM 2019-IEEE Conference on Computer Communications Internet Security and Privacy Lab, LUMS A*

2018

Cellular Networks under Signalling Attacks
Title Author Journal/ Conference Lab
Efficient iterative deepening for bounded exhaustive generation of complex structures Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings Internet Security and Privacy Lab, LUMS A*
Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks Muhammad Faraz Tariq , Abdul Qayyum Khan , Muhammad Abid, Ghulam Mustafa Communications of the ACM, ACM Internet Security and Privacy Lab, LUMS IF- 4.55
Data-Driven Robust Fault Detection and Isolation of Three-Phase Induction Motor Muhammad Faraz Tariq ; Abdul Qayyum Khan ; Muhammad Abid ; Ghulam Mustafa IEEE Transactions on Industrial Electronics/ IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 8.7
Sol2js: Translating Solidity Contracts into Javascript for Hyperledger Fabric MA Zafar, F Sher, MU Janjua, S Baset SERIAL'18: Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers Blockchain Security Lab, ITU Lahore Not Ranked
TRIMMER: application specialization for code debloating Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering Internet Security and Privacy Lab, LUMS A
Exploring Server-Side Blocking of Regions Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson Usenix Security Symposium Internet Security and Privacy Lab, LUMS A*