Context - Based Trust Formation Using Direct User Experience in the IoT
|
Ayesha Altaf; Haider Abbas; Faiza Iqbal |
IEEE International Conference on Cloud Computing Technology and Science (CloudCom) |
Security Auditing and Evaluation Lab, NUST |
IF- 1.07 |
The role of the Weibull distribution in modelling traffic in Internet access and backbone core networks |
Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig |
Journal of Network and Computer Applications, Elsevier |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 5.57 |
To Act or React: Investigating Proactive Strategies For Online Community Moderation |
Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand |
Arxiv |
Internet Security and Quantum Technology Lab, NED-UET |
--- |
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review |
Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman |
IEEE Communications Surveys & Tutorials. World’s Top Engg Journal |
Security Auditing and Evaluation Lab, MCS-NUST |
IF- 22.9 |
Global and local scaling analysis of link streams in access and backbone core networks |
Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig |
Computer Networks, Elsevier |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 3.11 |
Extending symbolic execution for automated testing of stored procedures |
Maryam Abdul Ghafoor, ·Muhammad Suleman Mahmood, Junaid Haroon Siddiqui1 |
Software Quality Journal, Springer |
Internet Security and Privacy Lab, LUMS |
IF- 2.68 |
An algorithm for detecting SQL injection vulnerability using black-box testing |
Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi & Mohd Fo’ad Rohani |
Journal of Ambient Intelligence and Humanized Computing |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 4.59 |
Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges |
Bilal Afzal, Muhammad Umair,Ghalib Asadullah Shah, Ejaz Ahmed |
Elsevier Future Generation Computer Systems |
IoT Security Lab, UET Lahore |
IF- 4.66 |
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices |
Bilal Imran , Bilal Afzal , Ali Hammad Akbar , Muhammad Ahsan , Ghalib A. Shah |
IEEE GLOBECOM’19 |
IoT Security Lab, UET Lahore |
B |
one M2M Architecture Based Secure MQTT Binding in Mbed OS |
Ahsan Muhammad , Bilal Afzal , Bilal Imran , Asim Tanwir , Ali Hammad Akbar , Ghalib Shah |
IEEE Euro S&P, Workshop on IoT Security |
IoT Security Lab, UET Lahore |
NEW |
An auditing framework for vulnerability analysis of IoT systems |
Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar |
IEEE Euro S&P, Workshop on IoT Security |
IoT Security Lab, UET Lahore |
NEW |
Blockchain based Permission Delegation and Access Control in Internet of Things (BACI) |
Gauhar Ali, Naveed Ahmad Yue Cao, Muhammad Asif, Haitham Cruickshank, Qazi Ejaz Ali |
Elsevier Journal on computer and Security |
Innovative Secured Systems Lab, UET Peshawar |
IF- 3.57 |
BCON: Blockchain Based Access Control across Multiple Conflict of Interest Domains |
Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham Cruickshank |
Elsevier Journal of Network and Computer Applications |
Innovative Secured Systems Lab, UET Peshawar |
IF- 4.57 |
Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations |
Tahreem Yaqoob, Azka Arshad, Haider Abbas, Muhammad Faisal Amjad, Narmeen Shafqat |
Elsevier FGCS |
National Cyber Security Auditing And Evaluation Lab, NUST |
--- |
PR-TCAM: Efficient TCAM Emulation on Xilinx FPGAs Using Partial Reconguration. Pedro Reviriego, Anees Ullah, Salvatore Pontarelli |
Pedro Reviriego, Anees Ullah, Salvatore Pontarelli |
Transactions on Very Large Scale Integration (VLSI), IEEE |
Deep Packet Inspection (DPI) Lab, UET-T |
IF- 2.037 |
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review |
Tehreem Yaqoob , Haider Abbas , Mohammed Atiquzzaman |
IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 4.45 |
Trust Models of Internet of Smart Things: A Survey, Open Issues, and Future Directions |
Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab |
Journal of Network and Computer Applications. |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 4.57 |
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications |
Sadeeq Jan, Annibale Panichella, Andrea Arcuri & Lionel Briand |
Empirical Software Engineering |
Innovative Secured Systems Lab, UET Peshawar |
--- |
Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android |
Hafiz Muhammad Arslan Maqsood ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam |
IEEE |
Cyber Reconnaissance and Combat (CRC) Lab, Bahria |
Not Ranked |
Toward an optimal solution against Denial of Service attacks in Software Defined Networks |
M Imran, MH Durad, FA Khan, A Derhab |
Future Generation Computer Systems/Elsevier |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
IF- 6.5 |
Reducing the effects of DoS attacks in software defined networks using parallel flow installation |
Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan & Abdelouahid Derhab |
Human-centric Computing and Information Sciences/Springer |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
IF- 3.7 |
Intrusion detection using deep sparse auto-encoder and self-taught learning |
Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim & Muhammad Hanif Durad |
Neural Computing and Applications/
Elsevier
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
IF- 4.68 |
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks |
Muhammad Imran ; Muhammad Hanif Durad ; Farrukh Aslam Khan ; Haider Abbas |
IEEE Systems Journal/IEEE
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
IF- 3.98 |
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
|
Maria Mushtaq ; Ayaz Akram ; Muhammad Khurram Bhatti ; Usman Ali ; Vianney Lapotre ; Guy Gogniat
|
IEEE Conference on Communications and Network Security
|
Blockchain Security Lab, ITU Lahore |
B |
Wealth Distribution and Link Prediction in Ethereum
|
Z Muzammal, MU Janjua, W Abbas, F Sher
|
IEEE/WIC/ACM International Conference on Web Intelligence
|
Blockchain Security Lab, ITU Lahore |
B |
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News
|
Adnan Qayyum ; Junaid Qadir ; Muhammad Umar Janjua ; Falak Sher
|
IT professionals
|
Blockchain Security Lab, ITU Lahore |
IF- 2.11 |
Guardian-A Smart Cloud Fabric for Virtual Patching and Customized Defenses
|
Rashid Tahir; Abdur Rahman Al-Ahmadi; Bashayyer Al-Sharyoufi; Rajin Azzouni; Fareed Zaffar
|
IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
|
Internet Security and Privacy Lab, LUMS |
A* |
The Browsers Strike Back: CounteringCryptojacking and Parasitic Miners on the Web
|
Rashid Tahir; Sultan Durrani; Faizan Ahmed; Hammas Saeed; Fareed Zaffar; Saqib Ilyas
|
IEEE INFOCOM 2019-IEEE Conference on Computer Communications
|
Internet Security and Privacy Lab, LUMS |
A* |