Research & Collaborations

2019

Title Author Journal/ Conference Lab Impact Factor
The role of the Weibull distribution in modelling traffic in Internet access and backbone core networks Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig Journal of Network and Computer Applications, Elsevier Internet Security and Quantum Technology Lab, NED-UET IF- 5.57
OneM2M Architecture Based Secure MQTT Binding in Mbed OS Ahsan Muhammad, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib Shah 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) - IEEE Internet of Things (IoT) Security Lab, UET-L NEW
To Act or React: Investigating Proactive Strategies For Online Community Moderation Hussam Habib, Maaz Bin Musa, Fareed Zaffar, Rishab Nithyanand Arxiv Internet Security and Quantum Technology Lab, NED-UET ---
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review Tahreem Yaqoob, Haider Abbas, Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials. World’s Top Engg Journal Security Auditing and Evaluation Lab, MCS-NUST IF- 22.9
Global and local scaling analysis of link streams in access and backbone core networks Asad Arfeena, Krzysztof Pawlikowski, Don McNickle, Andreas Willig Computer Networks, Elsevier Internet Security and Quantum Technology Lab, NED-UET IF- 3.11
Extending symbolic execution for automated testing of stored procedures Maryam Abdul Ghafoor, ·Muhammad Suleman Mahmood, Junaid Haroon Siddiqui1 Software Quality Journal, Springer Internet Security and Privacy Lab, LUMS IF- 2.68
An algorithm for detecting SQL injection vulnerability using black-box testing Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi & Mohd Fo’ad Rohani Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.59
Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges Bilal Afzal, Muhammad Umair,Ghalib Asadullah Shah, Ejaz Ahmed Elsevier Future Generation Computer Systems IoT Security Lab, UET Lahore IF- 4.66
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices Bilal Imran , Bilal Afzal , Ali Hammad Akbar , Muhammad Ahsan , Ghalib A. Shah IEEE GLOBECOM’19 IoT Security Lab, UET Lahore B
one M2M Architecture Based Secure MQTT Binding in Mbed OS Ahsan Muhammad , Bilal Afzal , Bilal Imran , Asim Tanwir , Ali Hammad Akbar , Ghalib Shah IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore NEW
An auditing framework for vulnerability analysis of IoT systems Ibrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar IEEE Euro S&P, Workshop on IoT Security IoT Security Lab, UET Lahore NEW
Blockchain based Permission Delegation and Access Control in Internet of Things (BACI) Gauhar Ali, Naveed Ahmad Yue Cao, Muhammad Asif, Haitham Cruickshank, Qazi Ejaz Ali Elsevier Journal on computer and Security Innovative Secured Systems Lab, UET Peshawar IF- 3.57
BCON: Blockchain Based Access Control across Multiple Conflict of Interest Domains Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham Cruickshank Elsevier Journal of Network and Computer Applications Innovative Secured Systems Lab, UET Peshawar IF- 4.57
Framework for calculating Return On Security Investment (ROSI) for security-Oriented organizations Tahreem Yaqoob, Azka Arshad, Haider Abbas, Muhammad Faisal Amjad, Narmeen Shafqat Elsevier FGCS National Cyber Security Auditing And Evaluation Lab, NUST ---
PR-TCAM: Efficient TCAM Emulation on Xilinx FPGAs Using Partial Reconguration. Pedro Reviriego, Anees Ullah, Salvatore Pontarelli Pedro Reviriego, Anees Ullah, Salvatore Pontarelli Transactions on Very Large Scale Integration (VLSI), IEEE Deep Packet Inspection (DPI) Lab, UET-T IF- 2.037
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices – A Review Tehreem Yaqoob , Haider Abbas , Mohammed Atiquzzaman IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) National Cyber Security Auditing And Evaluation Lab, NUST IF- 4.45
Trust Models of Internet of Smart Things: A Survey, Open Issues, and Future Directions Ayesha Altaf, Haider Abbas, Faiza Iqbal, Abdelouahid Derhab Journal of Network and Computer Applications. (Impact Factor 4.57) National Cyber Security Auditing And Evaluation Lab, NUST IF- 4.57
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications Sadeeq Jan, Annibale Panichella, Andrea Arcuri & Lionel Briand Empirical Software Engineering Innovative Secured Systems Lab, UET Peshawar ---
Privacy Leakage through Exploitation of Vulnerable Inter-App Communication on Android Hafiz Muhammad Arslan Maqsood ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
Toward an optimal solution against Denial of Service attacks in Software Defined Networks M Imran, MH Durad, FA Khan, A Derhab Future Generation Computer Systems/Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 6.5
Reducing the effects of DoS attacks in software defined networks using parallel flow installation Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan & Abdelouahid Derhab Human-centric Computing and Information Sciences/Springer Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 3.7
Intrusion detection using deep sparse auto-encoder and self-taught learning Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim & Muhammad Hanif Durad Neural Computing and Applications/ Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 4.68
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks Muhammad Imran ; Muhammad Hanif Durad ; Farrukh Aslam Khan ; Haider Abbas IEEE Systems Journal/IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS IF- 3.98
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture Maria Mushtaq ; Ayaz Akram ; Muhammad Khurram Bhatti ; Usman Ali ; Vianney Lapotre ; Guy Gogniat IEEE Conference on Communications and Network Security Blockchain Security Lab, ITU Lahore IF- B
Wealth Distribution and Link Prediction in Ethereum Z Muzammal, MU Janjua, W Abbas, F Sher IEEE/WIC/ACM International Conference on Web Intelligence Blockchain Security Lab, ITU Lahore B
Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News Adnan Qayyum ; Junaid Qadir ; Muhammad Umar Janjua ; Falak Sher IT professionals Blockchain Security Lab, ITU Lahore IF- 2.11
Guardian-A Smart Cloud Fabric for Virtual Patching and Customized Defenses Rashid Tahir; Abdur Rahman Al-Ahmadi; Bashayyer Al-Sharyoufi; Rajin Azzouni; Fareed Zaffar IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Internet Security and Privacy Lab, LUMS A*
The Browsers Strike Back: CounteringCryptojacking and Parasitic Miners on the Web Rashid Tahir; Sultan Durrani; Faizan Ahmed; Hammas Saeed; Fareed Zaffar; Saqib Ilyas IEEE INFOCOM 2019-IEEE Conference on Computer Communications Internet Security and Privacy Lab, LUMS A*