Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
Gemstones Supply Chain Management through Blockchain Mechanism | Talha Ahsan, Muhammad Junaid, Abdul Haseeb Malik, Qazi Ejaz Ali | International Journal of Innovations in Science & Technology | Blockchain Security Lab, ITU | IF-2.65 |
A compliance-based ranking of certificate authorities using probabilistic approaches | Kashif Junaid, Muhammad Umar Janjua & Junaid Qadir | International Journal of Information Security | Blockchain Security Lab, ITU | IF-2.4 |
Complex networks after centrality-based attacks and defense | Maham Zafar, Kashif Kifayat, Ammara Gul, Usman Tahir & Sarah Abu Ghazalah | Complex & Intelligent Systems | NCCS Secretariat, Air University | IF-5.0 |
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique | Syeda Tayyaba Bukhari; Muhammad Umar Janjua; Junaid Qadir | IEEE Open Journal of the Computer Society | Blockchain Security Lab, ITU-L | IF--- |
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems | Fatima Mavra Khalil, Adnan Fazil, Muhammad Jawad Hussain, Ammar Masood | Computers & Security Volume 137, February 2024, 103633 | Device and Network Security Lab, Air University | IF-4.8 |
Cybersecurity on a Budget: Evaluating Security and Performance of Open-source SIEM Solutions for SMEs | Jawad Manzoor, Abdul Waleed, Abdul Fareed Jamali, Ammar Masood | PLOS ONE | Device and Network Security Lab, Air University | IF-2.9 |
Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework | Faiza Babar Khan; Muhammad Hanif Durad; Asifullah Khan; Farrukh Aslam Khan; Muhammad Rizwan; Aftab Ali | IEEE Access ( Volume: 12) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-3.47 |
Advancing Snort IPS to Achieve Line Rate Traffic Processing for Effective Network Security Monitoring | Muhammad Sheeraz; Muhammad Hanif Durad; Shahzaib Tahir; Hasan Tahir; Saqib Saeed; Abdullah M. Almuhaideb | IEEE Access ( Volume: 12) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-3.47 |
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection | Muhammad Sheeraz; Muhammad Hanif Durad; Muhammad Arsalan Paracha; Syed Muhammad Mohsin; Sadia Nishat Kazmi; Carsten Maple | MDPI Sensors (2024) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-4.1 |
Fully-distributed Consensus Control of Multi-agent Systems Under Stochastic Hybrid Attacks on a Directed Graph | Muhammad Mamoon, Ghulam Mustafa, Naeem Iqbal & Muhammad Rehan | International Journal of Control, Automation and Systems (2024) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-2.5 |
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF | Hassan Jalil Hadi; Mubashir Adnan; Faisal Bashir Hussain; Mohammed Ali Alshara; Yasir Javed | MDPI- Technologies Jounal (2024) | Cyber Reconnaissance and Combat (CRC) Lab, Bahria | -- |
Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
Energy management of smart homes over fog-based IoT architecture | Muhammad Umair, Muhammad Aamir Cheema, Bilal Afzal, Ghalib Shah | Sustainable Computing: Informatics and Systems, Elsevier | Internet of things, UETL | IF-3.8 |
KTSDroid: A Framework for Android Malware Categorization Using the Kernel Task Structure | Saneeha Khalid, Khalid Imran, Faisal Bashir Hussain | Hindawi (published in the journal Security and Communication Networks) | Internet of things, UETL | IF--- |
An intelligent context-aware threat detection and response model for smart cyber-physical systems | Zainab Noor, Sadaf Hina, Faisal Hayat, Ghalib A Shah | Internet of Things | Internet of things, UETL | IF-6.1 |
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization | Maham Chaudhary, Ammar Masood | Neural Computing & Applications (2023) | Device and Network Security Lab, Air University | IF-4.5 |
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts | Maha Ayub, Tania Saleem, Muhammad Janjua, Talha Ahmad | ACM Transactions on Software Engineering and Methodology 2023 | Blockchain Security Lab, ITU Lahore | IF-6.0 |
Effective Security Monitoring Using Efficient SIEM Architecture | Sheeraz Muhammad, Paracha Muhammad Arsalan, Haque Mansoor Ul, Durad Muhammad Hanif, Mohsin Syed Muhammad, Band Shahab S., and Mosavi Amir | Human-centric Computing and Information Sciences (published by the Korea Computer Industry Association) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-11.1 |
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning | Muhammad Arsalan Paracha, Muhammad Sadiq, Junwei Liang, Muhammad Hanif Durad, Muhammad Sheeraz | MDPI Sensors 2023 | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-3.84 |
Detection of Data Scarce Malware Using One-Shot Learning With Relation Network | Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed Alqarni | IEEE Access ( Volume: 11) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-3.47 |
Effective network intrusion detection using stacking-based ensemble approach | Muhammad Ali, Mansoor-ul- Haque, Muhammad Hanif Durad, Anila Usman, Syed Muhammad Mohsin, Hana Mujlid & Carsten Maple | Springer International Journal of Information Security | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-2.4 |
Autonomous and Collaborative Smart Home Security System (ACSHSS) | Hassan Jalil Hadi, Khaleeq Un Nisa, Sheetal Harris | arXiv preprint arXiv (2023) | Cyber Reconnaissance and Combat (CRC) Lab, Bahria University | -- |
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware | Haider Abbas; Muhammad Shahzad; Maliha Safdar; Ahmed Hemani | IEEE Transactions on Dependable and Secure Computing | Security Auditing and Evaluation Lab, NUST | IF: 7.3 |
Security Assessment and Evaluation of VPNs: A Comprehensive Survey | Haider Abbas; Naina Emmanuel; Muhammad Faisal Amjad; Tahreem Yaqoob; Mohammed Atiquzzaman; Zafar Iqbal; Narmeen Shafqat; Waleed Bin Shahid; Ali Tanveer; Umer Ashfaq | ACM Computing Surveys, Volume 55, Issue 13s | National Cyber Security Auditing And Evaluation Lab, NUST | IF-23.8 |
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning | Muhammad Arsalan Paracha; Muhammad Sadiq; Junwei Liang; Muhammad Hanif Durad; Muhammad Sheeraz | Sensors 2023, 23(13), 5829 | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-4.1 |
Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
Tracking adoption of revocation and cryptographic features in X.509 certificates | Maryam Zulfiqar, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Tania Saleem & Jack W. Stokes | Springer International Journal of Information Security, 2022 | Blockchain Security Lab, ITU Lahore | IF-1.98 |
Design of an Advance Intrusion Detection System for IoT Networks | Asima Sarwar; Salva Hasan; Waseem Ullah Khan; Salman Ahmed; Safdar Nawaz Khan Marwat | 2nd International Conference on Artificial Intelligence | Innovative Secured Systems Lab, UET-P | C |
Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol. | Waseem Ullah Khan; Safdar Nawaz Khan Marwat; Salman Ahmed | Techscience-Computer Systems Science & Engineering | Innovative Secured Systems Lab, UET-P | IF-4.397 |
Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO | Asima Sarwar; Abdullah M. Alnajim; Safdar Nawaz Khan Marwat; Salman Ahmed; Saleh Alyahya; Waseem Ullah Khan | Sensors 2022, 22(13), 4926 | Innovative Secured Systems Lab, UET-P | IF-3.57 |
Design of a computationally efficient observer-based distributed fault detection and isolation scheme in second-order networked control systems | Aadil Sarwar Khan; Abdul Qayyum Khan; Naeem Iqbal; Ghulam Mustafa; Muhammad Asim Abbasi; Atif Mahmood | ISA Transactions (Elsvier) | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-I.474 |
A Survey of the Recent Trends in Deep Learning Based Malware Detection | Umm-e-Hani Tayyab; Faiza Babar Khan; Muhammad Hanif Durad; Asifullah Khan; Yeon Soo Lee | Journal of Cybersecurity and Privacy | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-4.1 |
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System | Muhammad Husnain; Khizar Hayat; Enrico Cambiaso; Ubaid U. Fayyaz; Maurizio Mongelli; Habiba Akram; Syed Ghazanfar Abbas; Ghalib A. Shah | MDPI Sensors 2022 | Internet of things, UETL | IF 3.57 |
An automated context-aware IoT vulnerability assessment rule-set generator | Fabiha Hashmat; Syed Ghazanfar Abbas; Sadaf Hina; Ghalib A. Shah; Taimur Bakhshi; Waseem Abbas | Computer Communications, Volume 186, 15 March 2022 | Internet of things, UETL | IF 3.167 |
A framework to predict early news popularity using deep temporal propagation patterns | Ramsha Saeed; Haider Abbas; Sara Asif; Saddaf Rubab; Malik M. Khan; Naima Iltaf; Shynar Mussiraliyeva | Elsevier: Expert Systems with Applications, Volume 195, 1 June 2022 | Security Auditing and Evaluation Lab, NUST | IF 8.665 |
Forensic analysis of image deletion applications | Maheen Fatima, Haider Abbas, Waseem Iqbal & Narmeen Shafqat | Multimedia Tools and Applications | Security Auditing and Evaluation Lab, NUST | IF-3.158 |
Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE) | Fatima Khalid; Ammar Masood | Computers & Security, 2022 | Device and Network Security Lab | IF-2.514 |
Which open-source IDS? Snort, Suricata or Zeek | Abdul Waleed; Abdul Fareed Jamali; Ammar Masood | Computers & Security, 2022 | Device and Network Security Lab | IF-6.708 |
Security-enhanced Android for an enterprise | Syed Rameez Rehman; Mudassar Waheed; Ammar Masood | International Journal of Security and Networks | Device and Network Security Lab | IF-0.64 |
A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics | Ahmed Abbasi; Abdul Rehman Rehman Javed; Amanullah Yasin; Zunera Jalil; Natalia Kryvinska; Usman Tariq | IEEE Access -2022 Intelligent Big Data Analytics for Internet of Things, Services and People | National Cybercrime and Forensics Lab, Air University Lab | IF-3.367 |
Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction | Anwar Said, Muhammad Umar Janjua, Saeed-Ul Hassan, Zeeshan Muzammal, Tania Saleem, Tipajin Thaipisutikul, Suppawong Tuarob, Raheel Nawaz | PeerJ Computer Science, 2021 | Blockchain Security Lab, ITU Lahore | IF-1.39 |
EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds | Maryam Zulfiqar; Filza Tariq; Muhammad Umar Janjua; Adnan Noor Mian; Adnan Qayyum; Junaid Qadir; Falak Sher ; Muhammad Hassan | Computers & Security Volume 100, Jan 2021 | Blockchain Security Lab, ITU Lahore | IF-4.43 |
An approximate-computing empowered green 6G downlink | Maryam Idrees; Mohammed Manzar Maqbool; Muhammad Khurram Bhatti; M. Mahboob Ur Rahman; Rehan Hafiz; Muhammad Shafique | Journal of Physical Communication, Volume 49, December 2021 | Blockchain Security Lab, ITU Lahore | IF-1.35 |
Realization of a Novel, Lightweight and Secured CoAP Based Monitoring System in Smart Logistics | Salva Hasan; Salman Ahmed; Safdar Nawaz Khan Marwat | 2021 6th International Multi-Topic ICT Conference (IMTIC) | Innovative Secured Systems Lab, UET-P | -- |
Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System | S. Johar; N. Ahmad; A. Durrani; G. Ali | IEEE Access 2021 | Innovative Secured Systems Lab, UET-P | IF-3.47 |
Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey | Sumaira Johar; Naveed Ahmad; Warda Asher; Haitham Cruickshank; Amad Durrani | MDPI Applied Sciences 2021 | Innovative Secured Systems Lab, UET-P | IF-2.67 |
Reverse Engineering of Mobile Banking Applications | Syeda Warda Asher; Sadeeq Jan; George Tsaramirsis; Fazal Qudus Khan; Abdullah Khalil; Muhammad Obaidullah | Tech Science - Computer Systems Science & Engineering | Innovative Secured Systems Lab, UET-P | IF-3.772 |
Implementation of Cyber-Physical Systems with Modbus Communication for Security Studies | Haseeb Ahmed Chattha; Muhammad Miftah Ur Rehman; Ghulam Mustafa; Abdul Qayyum Khan; Muhammad Abid; Ehtisham Ul Haq | IEEE ICCWS 2021 | Critical Infrastructure Protection & Malware Analysis, PIEAS | -- |
A Generic Machine Learning Approach for IoT Device Identification | Zain Ali; Faisal Hussain; Syed Ghazanfar; Muhammad Husnain; Shahzaib Zahid; Ghalib A. Shah | 2021 International Conference on Cyber Warfare and Security (ICCWS) | Internet of things, UETL | -- |
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach | Syed Ghazanfar Abbas; Ivan Vaccari; Faisal Hussain; Shahzaib Zahid; Ubaid Ullah Fayyaz; Ghalib A. Shah; Taimur Bakhshi; Enrico Cambiaso | MDPI Sensors 2021 | Internet of things, UETL | IF 7.529 |
Generic signature development for IoT Botnet families | Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah; Kashif Zafar | Forensic Science International: Digital Investigation, Volume 38, September 2021, | Internet of things, UETL | IF 2.39 |
A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks | Faisal Hussain; Syed Ghazanfar Abbas; Ivan Miguel Pires; Sabeeha Tanveer; Ubaid U. Fayyaz; Nuno M. Garcia; Ghalib A. Shah; Farrukh Shahzad | 2021 IEEE Access | Internet of things, UETL | -- |
SSD Forensic: Evidence Generation and Forensic Research on Solid State Drives Using Trim Analysis | Hassan Jalil Hadi; Numan Musthaq; Irshad Ullah Khan | 2021 International Conference on Cyber Warfare and Security (ICCWS) | Cyber Reconnaissance and Combat (CRC) Lab, Bahria University | -- |
A Taxonomy of Insider Threat in isolated (air-gapped) Computer Networks | Arshad Masood; Ammar Masood | 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST) | Device and Network Security Lab, Air University | -- |
FOIST - Framework for Operating System Testing by Integrating Standards and Tools | Maheen Fatima; Haider Abbas; Tahreem Yaqoob; Zarmeen Ahmad | 2021 International Conference on Communication Technologies (ComTech) | Security Auditing and Evaluation Lab, NUST | NEW |
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware | Zia Muhammad; Muhammad Faisal Amjad; Haider Abbas; Zafar Iqbal; Anique Azhar; Ahsan Yasin; Hasan Iesar | 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC) | Security Auditing and Evaluation Lab, NUST | B |
A Malware Evasion Technique for Auditing Android Anti-Malware Solutions | Samrah Mirza; Haider Abbas; Waleed Bin Shahid; Narmeen Shafqat; Mariagrazia Fugini; Zafar Iqbal; Zia Muhammad | 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) | Security Auditing and Evaluation Lab, NUST | B |
Enriching Conventional Ensemble Learner with Deep Contextual Semantics to Detect Fake News in Urdu | Ramsha Saeed, Hammad Afzal, Haider Abbas, Maheen Fatima | ACM Transactions on Asian and Low-Resource Language Information Processing 2021 | Security Auditing and Evaluation Lab, NUST | IF 1.14 |
A survey on common criteria (CC) evaluating schemes for security assessment of IT products | Maheen Fatima1, Haider Abbas, Tahreem Yaqoob1, Narmeen Shafqat1, Zarmeen Ahmad1, Raja Zeeshan1, Zia Muhammad1, Tauseef Rana2, Shynar Mussiraliyeva | Peer J Computer Science | Security Auditing and Evaluation Lab, NUST | IF-1.39 |
A systematic review of scalable hardware architectures for pattern matching in network security | Malik Imran; Faisal Bashir; Atif Raza Jafri; Muhammad Rashid; Muhammad Najam ul Islam | Elsevier Computers & Electrical Engineering 2021 | Cyber Reconnaissance and Combat Lab, Bahria University | IF-3.8 |
Deep learning based cyber bullying early detection using distributed denial of service flow | Muhammad Hassan Zaib; Faisal Bashir; Kashif Naseer Qureshi; Sumaira Kausar; Muhammad Rizwan; Gwanggil Jeon | Multimedia Systems Springer 2021 | Cyber Reconnaissance and Combat Lab, Bahria University | IF-1.93 |
Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine | Junaid Shabbir Abbasi; Faisal Bashir; Kashif Naseer Qureshi; Muhammad Najam ul Islam; Gwanggil Jeon | Computers & Electrical Engineering Elsevier 2021 | Cyber Reconnaissance and Combat Lab, Bahria University | IF-5.57 |
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network | Syed Ibrahim Imtiaz; Saif ur Rehman; Abdul Rehman Javed; Zunera Jalil; Xuan Liu; Waleed S. Alnumay | Future Generation Computer Systems, volume 115, February 2021, Pages 844-856 | National Cybercrime and Forensics Lab | IF-8.87 |
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects | Waqas Ahmed; Faisal Shahzad; Abdul Rehman Javed; Farkhund Iqbal; Liaqat Ali | 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) | National Cybercrime and Forensics Lab | --- |
Robust Early Stage Botnet Detection using Machine Learning | Ali Muhammad; Muhammad Asad; Abdul Rehman Javed | ICCWS-2020 | National Cybercrime and Forensics Lab | --- |
ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning | Ahmad Abbasi; Abdul Rehman Javed; Chinmay Chakraborty; Jamel Nebhen; Wisha Zehra; Zunera Jalil | IEEE - Intelligent Big Data Analytics for Internet of Things | National Cybercrime and Forensics Lab | IF- 1.508 |
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) | Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, Ali Kashif Bashir | Future Generation Computer Systems | National Cybercrime and Forensics Lab | IF- 6.125 |
Cross corpus multi-lingual speech emotion recognition using ensemble learning | Wisha Zehra, Abdul Rehman Javed, Zunera Jalil, Habib Ullah Khan & Thippa Reddy Gadekallu | Complex & Intelligent Systems, springer | National Cybercrime and Forensics Lab | IF- 5.277 |
Mitigating Service - Oriented Attaks Using Context - Based Trust for Smart Cities in IoT Networks | Ayesha Altaf, Haider Abbas, Faiza Iqbal, Malik Muhammad Zaki Murtaza Khan, Abdul Rauf, Tehsin Kanwal | Journal of Systems Architecture | Security Auditing and Evaluation Lab, NUST | IF- 2.552 |
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparison | Syed Wasif Abbas Hamdani, Haider Abbas, Abdul Rehman Janjua, Waleed Bin Shahid, Muhammad Faisal Amjad, Jahanzaib Malik, Malik Hamza Murtaza | ACM Computing Surveys | Security Auditing and Evaluation Lab, NUST | IF- 7.9 |
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles | Junaid Shabbir Abbasi, Faisal Bashir, Kashif Naseer Qureshi, Muhammad Najam ul Islam, Gwanggil Jeon | Computers & Electrical Engineering | Blockchain Lab, ITU-L | IF- 4.79 |
Deep learning based cyber bullying early detection using distributed denial of service flow | Muhammad Hassan Zaib, Faisal Bashir, Kashif Naseer Qureshi, Sumaira Kausar, Muhammad Rizwan & Gwanggil Jeon | Multimedia Systems | Blockchain Lab, ITU-L | IF- 1.563 |
A Framework for Malicious Traffic Detection in IoT Healthcare Environment | Faisal Hussain, Syed Ghazanfar Abbas, Ghalib A. Shah,Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia and Zdravevski | MDPI | Internet of things, UETL | 3.275 |
A Framework for Malicious Traffic Detection in IoT Healthcare Environment | Sadeeq Jan, Omer Bin Tauqeer, Fazal Qudus Khan, George Tsaramirsis, Awais Ahmad,Iftikhar Ahmad, Imran Maqsood and Niamat Ullah | Computers, Materials & Continua | Innovative Secured Systems Lab, UET-P | 4.890 |
Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
A Framework for Systematic Classification of Assets for Security Testing | Sadeeq Jan; Omer Bin Tauqeer; Fazal Qudus Khan; George Tsaramirsis; Awais Ahmad; Iftikhar Ahmad; Imran Maqsood; Niamat Ullah | Tech Science - Computers, Materials and Continua | Innovative Secured Systems Lab, UET-P | IF-3.77 |
Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks | Syed Hasan Amin Mahmood; Syed Mustafa Ali Abbasi; Ahmed Abbasi; Fareed Zaffar | IEEE International Conference on Intelligence and Security Informatics (ISI) | Internet of things, UETL | C |
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems | Muhammad Rashid, Malik Imran, Atif Raza Jafri | IAIT 20: Proceedings of the 11th International Conference on Advances in Information Technology | Cyber Reconnaissance and Combat (CRC) Lab, Bahria University | -- |
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages | Abdur Rehman Raza; Khawir Mahmood; Muhammad Faisal Amjad; Haider Abbas; Mehreen Afzal | Future Generation Computer Systems, Volume 104, March 2020 | Security Auditing and Evaluation Lab, NUST | IF-7.18 |
Security analysis of KXB10 QKD protocol with higher-dimensional quantum states | Usama Ahsan; Muhammad Mubashir Khan; Asad Arfeen; Khadija Azam | International Journal of Quantum Information, World Scientific | Internet Security and Quantum Technology Lab, NED UET | IF-1.17 |
Fault-Tolerant Robust Model Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances | Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad | IEEE Transactions on Industrial Electronics | Critical Infrastructure Protection & Malware Analysis, PIEAS | W |
Attack Detection From Network Traffic using Machine Learning | Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad | VFAST Transactions on Software Engineering | Critical Infrastructure Protection & Malware Analysis, PIEAS | X |
Identification of Malware Families for Creating Generic Signatures : Using Dynamic Analysis and Clustering Methods | Umm-e-Hani, M. Ali, M. Ismail, A. Khan and H. Durad | International Symposium on Recent Advances in Electrical Engineering & Computer Sciences | Critical Infrastructure Protection & Malware Analysis, PIEAS | W |
Separation Principle with Secure State Estimation and Lyapunov Stability of Cyber-Physical System under Sensor Attack | Maryam Khan, Naeem Iqbal, Abdul Qayyum Khan | IEEE Conference on Recent Advances in Electrical Engineering | Critical Infrastructure Protection & Malware Analysis, PIEAS | --- |
A Novel Ensemble Machine Learning Method to Detect Phishing Attack | Abdul Basit; Maham Zafar; Abdul Rehman Javed; Zunera Jalil | IEEE International Conference on Multi Topic | National Cybercrime and Forensics Lab, Air University | --- |
A comprehensive survey of AI-enabled phishing attacks detection techniques | Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil & Kashif Kifayat | Telecommunication Systems | National Cybercrime and Forensics Lab, Air University | IF- 1.734 |
Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes | MUuhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen | Wiley International Journal of Satellite Communications and Networking | Security Auditing and Evaluation Lab, NUST | IF- 1.652 |
Quality of experience‐based optimization of satellite Internt using WAN accelerators | Asad Arfeen, Riaz Uddin | Wiley International Journal of Satellite Communications and Networking | Security Auditing and Evaluation Lab, NUST | IF- 1.652 |
Context - Oriented Trust Computational Modal for Malicious Node Avoidance Using Edge Intelligence in Industrial Internet of Things | A Altaf, H Abbas, F Iqbal, FA Khan, S Rubab | Computer & Electrical Engineering | Security Auditing and Evaluation Lab | IF- 2.663 |
Robust, Secure and Adaptive Trust-Based Service Selection in Smart Buildings in the Internet of Things (IoT) | Ayesha Altaf; Haider Abbas; Faiza Iqbal; Malik Muhammad Zaki Murtaza Khan; Mahmoud Daneshmand | IEEE Internet of Things Journal. | Security Auditing and Evaluation Lab | IF- 9.5 |
Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement | Anum Arshad; Haider Abbas; Waleed Bin Shahid; Anique Azhar | WETICE 2020 | Security Auditing and Evaluation Lab | --- |
Towards Characterizing the COVID-19 Awareness on Twitter. | Muhammad Saad, Muhammad Hassan, Fareed Zaffar | Arxiv | Internet security and privacy lab, LUMS | IF- 1.128 |
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes | Waseem Iqbal; Haider Abbas; Pan Deng; Jiafu Wan; Bilal Rauf; Yawar Abbas; Imran Rashid | IEEE Internet of Things Journal | Internet of things, UETL | IF- 9.936 |
Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis | Zafeer Ahmed; Ibrahim Nadir; Haroon Mahmood; Ali Hammad Akbar; Ghalib Asadullah Shah | 2020 International Conference on Cyber Warfare and Security (ICCWS) | Internet of things, UETL | NEW |
IoT DoS and DDoS Attack Detection using ResNet | Faisal Hussain; Syed Ghazanfar Abbas; Muhammad Husnain; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah | IEEE International Multi Topic Conference | Internet of things, UETL | C |
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application | Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah | IEEE TrustCom / IWCSS | Internet of things, UETL | A |
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source | Syed Ghazanfar Abbas; Shahzaib Zahid; Faisal Hussain; Ghalib A. Shah; Muhammad Husnain | IEEE TrustCom/C4W | Internet of things, UETL | A |
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case | IEEE Trustcom/BigDataSE | IEEE Trustcom/BigDataSE | Internet of things, UETL | A |
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles | Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu | Transactions on Emerging Telecommunications Technologies, Wiley | National Cybercrime and forensics Lab, AU | IF- 1.59 |
Towards a Universal Features Set for IoT Botnet Attacks Detection | Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | IEEE International Multi Topic Conference | Internet of Things (IoT) Security Lab, UET-L | C |
Web Server Attack Detection using Machine Learning | Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq | IEEE ICCWS 2020 | Critical Infrastructure Protection & Malware Analysis, PIEAS | NEW |
Automatic YARA Rule Generation | Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad | IEEE ICCWS 2020 | Critical Infrastructure Protection & Malware Analysis, PIEAS | NEW |
Towards Characterizing COVID-19 Awareness on Twitter | Muhammad Saad, Muhammad Hassan, Fareed Zaffar | Arxiv | Internet Security and Privacy Lab, LUMS | --- |
Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus | Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli Erica Barone, M. H. Alizai | SenSys '20 | Internet Security and Privacy Lab, LUMS | A* |
Intermittent Computing with Dynamic Voltage and Frequency Scaling | Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai | EWSN '20 | Internet Security and Privacy Lab, LUMS | A |
Analysis of File-less Malware and its Evasive Behavior | Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai | IEEE ICCWS 2020 | Internet Security and Quantum Technology Lab, NED UET | NEW |
Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection | Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah | IEEE ICCWS 2020 | Internet of Things (IoT) Security Lab, UET-L | NEW |
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web | Syed Suleman Ahmad , Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab Nithyanand | WWW '20 | Internet Security and Privacy Lab, LUMS | A* |
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks | Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar | PETS | Internet Security and Privacy Lab, LUMS | B |
Using Application Layer Banner Data to Automatically Identify IoT Devices | Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed | Internet Measurement Conference | Internet Security and Privacy Lab, LUMS | A |
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis | Fatima Khalid, Ammar Masood | IEEE ICCWS, 2020 | Devices and Network Security Lab, AU | NEW |
Role of User and Entity Behavior Analytics in Detecting Insider Attacks | Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood | IEEE ICCWS, 2020 | Devices and Network Security Lab, AU | NEW |
FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs | Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad | Transactions on Very Large Scale Integration (VLSI), IEEE | Deep Packet Inspection (DPI) Lab, UET-T | IF- 2.037 |
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques | Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat | IEEE Access | Blockchain Security Lab, ITU-L | IF- 3.47 |
Byte-Level Object Identification for Forensic Investigation of Digital Images | Abdul Rehman Javed, Zunera Jalil | IEEE ICCWS, 2020 | National Cybercrime and forensics Lab, AU | NEW |
Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM | Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani | IEEE INMIC-2020 | National Cybercrime and forensics Lab, AU | Not Ranked |
A Generalized Machine Learning Based Model for Detection of DDoS Attacks | Murk Marvi, Asad Arfeen, Riaz Uddin | International Journal of Network Management, Wiley | Internet Security and Quantum Technology Lab, NED-UET | IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models | Asad Arfeen, Khizar Ul Haq, Syed Muhammad Yasir | International Journal of Network Management, Wiley | Internet Security and Quantum Technology Lab, NED-UET | IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models | Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen | Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK | Internet Security and Quantum Technology Lab, NED-UET | IF- 0.68 |
Analysis of achievable distances of BB84 and KMB09 QKD protocols | Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz | International Journal of Quantum Information, WORLD SCIENTIFIC | Internet Security and Quantum Technology Lab, NED-UET | IF- 1.17 |
Systematic Review Analysis on SQLIA Detection and Prevention Approaches | Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri | Wireless Personal Communications | Cyber Reconnaissance and Combat Lab, Bahria University | IF- 1.20 |
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks | Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad | Journal of Ambient Intelligence and Humanized Computing | Cyber Reconnaissance and Combat Lab, Bahria University | IF- 4.59 |
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks | Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon | Neural Computing and Applications | Cyber Reconnaissance and Combat Lab, Bahria University | IF- 4.68 |
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique | Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan | CMC-Computers, Materials & Continua, 64(1), 31–61s | Innovative Secured Systems Lab, UET Peshawar | IF- 4.68 |
Proposing Model for Security of IoT Devices in Smart Logistics: A Review | Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan | 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs | Innovative Secured Systems Lab, UET Peshawar | IF- A |
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks | Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas | IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 22.9 |
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security | Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass | IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 9.5 |
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis | Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib | Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 2.8 |
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices | Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat | IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 5.18 |
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices | Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat | Telecommunication Systems, Springer. | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 1.70 |
A Review of Web Browser Forensic Analysis Tools and Techniques | Amir Rasool and Zunera Jalil | Researchpedia Journal of Computing, Volume 1 | National Cybercrime and Forensics Lab, Air | --- |
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data | Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan | SCI Journal (Springer Multimedia Systems Journal ) | Innovative Secured Systems Lab, UET Peshawar | IF- 1.73 |
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things | Gauhar Ali,Naveed Ahmad , Yue Cao, Shahzad Khan, Haitham Cruickshank | IEEE Access | Innovative Secured Systems Lab, UET Peshawar | IF- 3.47 |
IoT-Flock: An Open-source Framework for IoT Traffic Generation | Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah | IEEE International Conference on Emerging Trends in Smart Technologies | Internet of Things (IoT) Security Lab, UET Lahore | NEW |
Enterprise Mobile Device Management Requirements and Features | Hina Batool ; Ammar Masood | IEEE International Conferenceon Computer Communications - | Devices and Network Security Lab, Air | NEW |
Towards an Efficient Intrusion Detection System for High Speed Networks | Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam | IEEE | Cyber Reconnaissance and Combat (CRC) Lab, Bahria | Not Ranked |
Hardware Trojan Detection using FBHT in FPGAs | Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik | IEEE | Cyber Reconnaissance and Combat (CRC) Lab, Bahria | Not Ranked |
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol | Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn | IEEE | Critical Infrastructure Protection & Malware Analysis, PIEAS | 5.131 |
Distributed Fault Detection and Isolation in Second Order Networked Systems in a Cyber-Physical Environment | AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood | ISA Transactions/Elsevier | Critical Infrastructure Protection & Malware Analysis, PIEAS | 4.30 |
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach | MA Abbasi, AQ Khan, M Abid | Transactions of the Institute of Measurement and Control | Critical Infrastructure Protection & Malware Analysis, PIEAS | 1.97 |
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks | Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ; Guy Gogniat ; Pascal Benoit | IEEE | Blockchain Security Lab, ITU Lahore | 3.47 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA | M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti | Information Systems, 2020 | Blockchain Security Lab, ITU Lahore | 2.77 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA | Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat | IEEE | Blockchain Security Lab, ITU Lahore | --- |
Title | Author | Journal/ Conference | Lab | Impact Factor |
---|---|---|---|---|
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network | Naveed Ahmad; Haitham Cruickshank; Yue Cao; Fakhri Alam Khan; Mohammad Asif; Awais Ahmad; Gwanggil Jeon | Future Generation Computer Systems, Volume 93, April 2019 | Innovative Secured Systems Lab, UET-P | IF-7.187 |
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network | Naveed Ahmad; Haitham Cruickshank; Yue Cao; Fakhri Alam Khan; Mohammad Asif; Awais Ahmad; Gwanggil Jeon | Elsevier FGCS 2019 | Innovative Secured Systems Lab, UET-P | IF-4.3 |
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks | Muhammad Imran; Muhammad Hanif Durad; Farrukh Aslam Khan; Haider Abbas | IEEE Systems Journal | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF-2.5 |
A Framework to Determine Applications’ Authenticity | Rida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal | Procedia Computer Science, Volume 155, 2019 | Security Auditing and Evaluation Lab, NUST | IF-0.883 |
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review | Tahreem Yaqoob; Haider Abbas; Mohammed Atiquzzaman | IEEE Communications Surveys & Tutorials ( Volume: 21, Issue: 4, Fourthquarter 2019) | Security Auditing and Evaluation Lab, NUST | IF-22.9 |
Context - Based Trust Formation Using Direct User Experience in the IoT | Ayesha Altaf; Haider Abbas; Faiza Iqbal | IEEE International Conference on Cloud Computing Technology and Science (CloudCom) | Security Auditing and Evaluation Lab, NUST | IF- 1.07 |
The role of the Weibull distribution in modelling traffic in Internet access and backbone core networks | Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig | Journal of Network and Computer Applications, Elsevier | Internet Security and Quantum Technology Lab, NED-UET | IF- 5.57 |
To Act or React: Investigating Proactive Strategies For Online Community Moderation | Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand | Arxiv | Internet Security and Quantum Technology Lab, NED-UET | --- |
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review | Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman | IEEE Communications Surveys & Tutorials. World’s Top Engg Journal | Security Auditing and Evaluation Lab, MCS-NUST | IF- 22.9 |
Global and local scaling analysis of link streams in access and backbone core networks | Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig | Computer Networks, Elsevier | Internet Security and Quantum Technology Lab, NED-UET | IF- 3.11 |
Extending symbolic execution for automated testing of stored procedures | Maryam Abdul Ghafoor, ·Muhammad Suleman Mahmood, Junaid Haroon Siddiqui1 | Software Quality Journal, Springer | Internet Security and Privacy Lab, LUMS | IF- 2.68 |
An algorithm for detecting SQL injection vulnerability using black-box testing | Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi & Mohd Fo’ad Rohani | Journal of Ambient Intelligence and Humanized Computing | Cyber Reconnaissance and Combat Lab, Bahria University | IF- 4.59 |
Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges | Bilal Afzal, Muhammad Umair,Ghalib Asadullah Shah, Ejaz Ahmed | Elsevier Future Generation Computer Systems | IoT Security Lab, UET Lahore | IF- 4.66 |
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices | Bilal Imran , Bilal Afzal , Ali Hammad Akbar , Muhammad Ahsan , Ghalib A. Shah | IEEE GLOBECOM’19 | IoT Security Lab, UET Lahore | B |
one M2M Architecture Based Secure MQTT Binding in Mbed OS | Ahsan Muhammad , Bilal Afzal , Bilal Imran , Asim Tanwir , Ali Hammad Akbar , Ghalib Shah | IEEE Euro S&P, Workshop on IoT Security | IoT Security Lab, UET Lahore | NEW |
An auditing framework for vulnerability analysis of IoT systems | Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar | IEEE Euro S&P, Workshop on IoT Security | IoT Security Lab, UET Lahore | NEW |
Blockchain based Permission Delegation and Access Control in Internet of Things (BACI) | Gauhar Ali, Naveed Ahmad Yue Cao, Muhammad Asif, Haitham Cruickshank, Qazi Ejaz Ali | Elsevier Journal on computer and Security | Innovative Secured Systems Lab, UET Peshawar | IF- 3.57 |
BCON: Blockchain Based Access Control across Multiple Conflict of Interest Domains | Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham Cruickshank | Elsevier Journal of Network and Computer Applications | Innovative Secured Systems Lab, UET Peshawar | IF- 4.57 |
Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations | Tahreem Yaqoob, Azka Arshad, Haider Abbas, Muhammad Faisal Amjad, Narmeen Shafqat | Elsevier FGCS | National Cyber Security Auditing And Evaluation Lab, NUST | --- |
PR-TCAM: Efficient TCAM Emulation on Xilinx FPGAs Using Partial Reconguration. Pedro Reviriego, Anees Ullah, Salvatore Pontarelli | Pedro Reviriego, Anees Ullah, Salvatore Pontarelli | Transactions on Very Large Scale Integration (VLSI), IEEE | Deep Packet Inspection (DPI) Lab, UET-T | IF- 2.037 |
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review | Tehreem Yaqoob , Haider Abbas , Mohammed Atiquzzaman | IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 4.45 |
Trust Models of Internet of Smart Things: A Survey, Open Issues, and Future Directions | Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab | Journal of Network and Computer Applications. | National Cyber Security Auditing And Evaluation Lab, NUST | IF- 4.57 |
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications | Sadeeq Jan, Annibale Panichella, Andrea Arcuri & Lionel Briand | Empirical Software Engineering | Innovative Secured Systems Lab, UET Peshawar | --- |
Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android | Hafiz Muhammad Arslan Maqsood ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam | IEEE | Cyber Reconnaissance and Combat (CRC) Lab, Bahria | Not Ranked |
Toward an optimal solution against Denial of Service attacks in Software Defined Networks | M Imran, MH Durad, FA Khan, A Derhab | Future Generation Computer Systems/Elsevier | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF- 6.5 |
Reducing the effects of DoS attacks in software defined networks using parallel flow installation | Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan & Abdelouahid Derhab | Human-centric Computing and Information Sciences/Springer | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF- 3.7 |
Intrusion detection using deep sparse auto-encoder and self-taught learning | Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim & Muhammad Hanif Durad | Neural Computing and Applications/ Elsevier | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF- 4.68 |
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks | Muhammad Imran ; Muhammad Hanif Durad ; Farrukh Aslam Khan ; Haider Abbas | IEEE Systems Journal/IEEE | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF- 3.98 |
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture | Maria Mushtaq ; Ayaz Akram ; Muhammad Khurram Bhatti ; Usman Ali ; Vianney Lapotre ; Guy Gogniat | IEEE Conference on Communications and Network Security | Blockchain Security Lab, ITU Lahore | B |
Wealth Distribution and Link Prediction in Ethereum | Z Muzammal, MU Janjua, W Abbas, F Sher | IEEE/WIC/ACM International Conference on Web Intelligence | Blockchain Security Lab, ITU Lahore | B |
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News | Adnan Qayyum ; Junaid Qadir ; Muhammad Umar Janjua ; Falak Sher | IT professionals | Blockchain Security Lab, ITU Lahore | IF- 2.11 |
Guardian-A Smart Cloud Fabric for Virtual Patching and Customized Defenses | Rashid Tahir; Abdur Rahman Al-Ahmadi; Bashayyer Al-Sharyoufi; Rajin Azzouni; Fareed Zaffar | IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) | Internet Security and Privacy Lab, LUMS | A* |
The Browsers Strike Back: CounteringCryptojacking and Parasitic Miners on the Web | Rashid Tahir; Sultan Durrani; Faizan Ahmed; Hammas Saeed; Fareed Zaffar; Saqib Ilyas | IEEE INFOCOM 2019-IEEE Conference on Computer Communications | Internet Security and Privacy Lab, LUMS | A* |
Title | Author | Journal/ Conference | Lab | |
---|---|---|---|---|
Efficient iterative deepening for bounded exhaustive generation of complex structures | Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui | Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings | Internet Security and Privacy Lab, LUMS | A* |
Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks | Muhammad Faraz Tariq , Abdul Qayyum Khan , Muhammad Abid, Ghulam Mustafa | Communications of the ACM, ACM | Internet Security and Privacy Lab, LUMS | IF- 4.55 |
Data-Driven Robust Fault Detection and Isolation of Three-Phase Induction Motor | Muhammad Faraz Tariq ; Abdul Qayyum Khan ; Muhammad Abid ; Ghulam Mustafa | IEEE Transactions on Industrial Electronics/ IEEE | Critical Infrastructure Protection & Malware Analysis, PIEAS | IF- 8.7 | Cellular Networks under Signalling Attacks
Sol2js: Translating Solidity Contracts into Javascript for Hyperledger Fabric | MA Zafar, F Sher, MU Janjua, S Baset | SERIAL'18: Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers | Blockchain Security Lab, ITU Lahore | Not Ranked |
TRIMMER: application specialization for code debloating | Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar | Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering | Internet Security and Privacy Lab, LUMS | A |
Exploring Server-Side Blocking of Regions | Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson | Usenix Security Symposium | Internet Security and Privacy Lab, LUMS | A* |