Research & Collaborations

2020

Title Author Journal/ Conference Lab
Systematic Review Analysis on SQLIA Detection and Prevention Approaches Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri Wireless Personal Communications Cyber Reconnaissance and Combat Lab, Bahria University
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon Neural Computing and Applications Cyber Reconnaissance and Combat Lab, Bahria University
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan CMC-Computers, Materials & Continua, 64(1), 31–61s Innovative Secured Systems Lab, UET Peshawar
Proposing Model for Security of IoT Devices in Smart Logistics: A Review Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs Innovative Secured Systems Lab, UET Peshawar
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 22.9) National Cyber Security Auditing And Evaluation Lab, NUST
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 9.5) National Cyber Security Auditing And Evaluation Lab, NUST
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 2.8) National Cyber Security Auditing And Evaluation Lab, NUST
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 5.18) National Cyber Security Auditing And Evaluation Lab, NUST
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat Telecommunication Systems, Springer. (Impact Factor 1.7) National Cyber Security Auditing And Evaluation Lab, NUST
Quality of experience‐based optimization of satellite Internet‐at‐sea using WAN accelerators A Arfeen, R Uddin Wiley International Journal of Satellite Communications and Networking Internet Security and Quantum Technology Lab, NED Karachi
A Review of Web Browser Forensic Analysis Tools and Techniques Amir Rasool and Zunera Jalil Researchpedia Journal of Computing, Volume 1 National Cybercrime and Forensics Lab, Air
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan SCI Journal (Springer Multimedia Systems Journal ) Innovative Secured Systems Lab, UET Peshawar
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things Gauhar Ali,Naveed Ahmad , Yue Cao, Shahzad Khan, Haitham Cruickshank IEEE Access Innovative Secured Systems Lab, UET Peshawar
IoT-Flock: An Open-source Framework for IoT Traffic Generation Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah IEEE International Conference on Emerging Trends in Smart Technologies Internet of Things (IoT) Security Lab, UET Lahore
Enterprise Mobile Device Management Requirements and Features Hina Batool ; Ammar Masood IEEE International Conferenceon Computer Communications - Devices and Network Security Lab, Air
Towards an Efficient Intrusion Detection System for High Speed Networks Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria
Hardware Trojan Detection using FBHT in FPGAs Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS
Distributed Fault Detection and Isolation in Second Order Networked Systems in a Cyber-Physical Environment AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood ISA Transactions/Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach MA Abbasi, AQ Khan, M Abid Transactions of the Institute of Measurement and Control Critical Infrastructure Protection & Malware Analysis, PIEAS
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ; Guy Gogniat ; Pascal Benoit IEEE Blockchain Security Lab, ITU Lahore
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti Information Systems, 2020 Blockchain Security Lab, ITU Lahore
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat IEEE Blockchain Security Lab, ITU Lahore