Fault-Tolerant Robust Model Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances
|
Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad
|
IEEE Transactions on Industrial Electronics
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
W
|
Attack Detection From Network Traffic using Machine Learning
|
Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad
|
VFAST Transactions on Software Engineering
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
X
|
Identification of Malware Families for Creating Generic Signatures : Using Dynamic Analysis and Clustering Methods
|
Umm-e-Hani, M. Ali, M. Ismail, A. Khan and H. Durad
|
International Symposium on Recent Advances in Electrical Engineering & Computer Sciences
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
W
|
Separation Principle with Secure State Estimation and Lyapunov Stability of Cyber-Physical System under Sensor Attack
|
Maryam Khan, Naeem Iqbal, Abdul Qayyum Khan
|
IEEE Conference on Recent Advances in Electrical Engineering
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
---
|
A Novel Ensemble Machine Learning Method to Detect Phishing Attack
|
Abdul Basit; Maham Zafar; Abdul Rehman Javed; Zunera Jalil
|
IEEE International Conference on Multi Topic
|
National Cybercrime and Forensics Lab, Air University |
---
|
A comprehensive survey of AI-enabled phishing attacks detection techniques
|
Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil & Kashif Kifayat
|
Telecommunication Systems
|
National Cybercrime and Forensics Lab, Air University |
IF- 1.734
|
Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes
|
MUuhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen |
Wiley International Journal of Satellite Communications and Networking
|
Security Auditing and Evaluation Lab, NUST |
IF- 1.652
|
Quality of experience‐based optimization of satellite Internt using WAN accelerators
|
Asad Arfeen, Riaz Uddin |
Wiley International Journal of Satellite Communications and Networking
|
Security Auditing and Evaluation Lab, NUST |
IF- 1.652
|
Context - Oriented Trust Computational Modal for Malicious Node Avoidance Using Edge Intelligence in Industrial Internet of Things
|
A Altaf, H Abbas, F Iqbal, FA Khan, S Rubab |
Computer & Electrical Engineering
|
Security Auditing and Evaluation Lab |
IF- 2.663
|
Robust, Secure and Adaptive Trust-Based Service Selection in Smart Buildings in the Internet of Things (IoT)
|
Ayesha Altaf; Haider Abbas; Faiza Iqbal; Malik Muhammad Zaki Murtaza Khan; Mahmoud Daneshmand |
IEEE Internet of Things Journal.
|
Security Auditing and Evaluation Lab |
IF- 9.5
|
Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location
Coordinates for Privacy Enhancement
|
Anum Arshad; Haider Abbas; Waleed Bin Shahid; Anique Azhar |
WETICE 2020
|
Security Auditing and Evaluation Lab |
---
|
Towards Characterizing the COVID-19 Awareness on Twitter.
|
Muhammad Saad, Muhammad Hassan, Fareed Zaffar |
Arxiv
|
Internet security and privacy lab, LUMS |
IF- 1.128 |
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes
|
Waseem Iqbal; Haider Abbas; Pan Deng; Jiafu Wan; Bilal Rauf; Yawar Abbas; Imran Rashid |
IEEE Internet of Things Journal
|
Internet of things, UETL |
IF- 9.936
|
Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis |
Zafeer Ahmed; Ibrahim Nadir; Haroon Mahmood; Ali Hammad Akbar; Ghalib Asadullah Shah |
2020 International Conference on Cyber Warfare and Security (ICCWS)
|
Internet of things, UETL |
NEW |
IoT DoS and DDoS Attack Detection using ResNet
|
Faisal Hussain; Syed Ghazanfar Abbas; Muhammad Husnain; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah
|
IEEE International Multi Topic Conference
|
Internet of things, UETL |
C
|
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application
|
Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah
|
IEEE TrustCom / IWCSS
|
Internet of things, UETL |
A
|
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source |
Syed Ghazanfar Abbas; Shahzaib Zahid; Faisal Hussain; Ghalib A. Shah; Muhammad Husnain |
IEEE TrustCom/C4W
|
Internet of things, UETL |
A |
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case
|
IEEE Trustcom/BigDataSE
|
IEEE Trustcom/BigDataSE
|
Internet of things, UETL |
A |
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles |
Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu |
Transactions on Emerging Telecommunications Technologies, Wiley |
National Cybercrime and forensics Lab, AU |
IF- 1.59 |
Towards a Universal Features Set for IoT Botnet Attacks Detection |
Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali |
IEEE International Multi Topic Conference |
Internet of Things (IoT) Security Lab, UET-L |
C |
Web Server Attack Detection using Machine Learning |
Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq |
IEEE ICCWS 2020 |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
NEW |
Automatic YARA Rule Generation |
Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad |
IEEE ICCWS 2020 |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
NEW |
Towards Characterizing COVID-19 Awareness on Twitter |
Muhammad Saad, Muhammad Hassan, Fareed Zaffar |
Arxiv |
Internet Security and Privacy Lab, LUMS |
--- |
Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus |
Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli
Erica Barone, M. H. Alizai
|
SenSys '20 |
Internet Security and Privacy Lab, LUMS |
A* |
Intermittent Computing with Dynamic Voltage and Frequency Scaling |
Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
|
EWSN '20 |
Internet Security and Privacy Lab, LUMS |
A |
Analysis of File-less Malware and its Evasive Behavior |
Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
|
IEEE ICCWS 2020 |
Internet Security and Quantum Technology Lab, NED UET |
NEW |
Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection |
Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah
|
IEEE ICCWS 2020 |
Internet of Things (IoT) Security Lab, UET-L |
NEW |
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web |
Syed Suleman Ahmad , Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab Nithyanand
|
WWW '20 |
Internet Security and Privacy Lab, LUMS |
A* |
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks |
Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar
|
PETS |
Internet Security and Privacy Lab, LUMS |
B |
Using Application Layer Banner Data to Automatically Identify IoT Devices |
Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed
|
Internet Measurement Conference |
Internet Security and Privacy Lab, LUMS |
A |
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis |
Fatima Khalid, Ammar Masood |
IEEE ICCWS, 2020 |
Devices and Network Security Lab, AU |
NEW |
Role of User and Entity Behavior Analytics in Detecting Insider Attacks |
Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood |
IEEE ICCWS, 2020 |
Devices and Network Security Lab, AU |
NEW |
FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs |
Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad |
Transactions on Very Large Scale Integration (VLSI), IEEE |
Deep Packet Inspection (DPI) Lab, UET-T |
IF- 2.037 |
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques |
Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat |
IEEE Access |
Blockchain Security Lab, ITU-L |
IF- 3.47 |
Byte-Level Object Identification for Forensic Investigation of Digital Images |
Abdul Rehman Javed, Zunera Jalil |
IEEE ICCWS, 2020 |
National Cybercrime and forensics Lab, AU |
NEW |
Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM |
Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani
|
IEEE INMIC-2020 |
National Cybercrime and forensics Lab, AU |
Not Ranked |
A Generalized Machine Learning Based Model for Detection of DDoS Attacks |
Murk Marvi, Asad Arfeen, Riaz Uddin |
International Journal of Network Management, Wiley |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models |
Asad Arfeen, Khizar Ul Haq, Syed Muhammad Yasir |
International Journal of Network Management, Wiley |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models |
Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen |
Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 0.68 |
Analysis of achievable distances of BB84 and KMB09 QKD protocols |
Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz |
International Journal of Quantum Information, WORLD SCIENTIFIC |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.17 |
Systematic Review Analysis on SQLIA Detection and Prevention Approaches |
Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri |
Wireless Personal Communications |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 1.20 |
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks |
Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad |
Journal of Ambient Intelligence and Humanized Computing |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 4.59 |
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks |
Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon |
Neural Computing and Applications |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 4.68 |
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique |
Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan |
CMC-Computers, Materials & Continua, 64(1), 31–61s |
Innovative Secured Systems Lab, UET Peshawar |
IF- 4.68 |
Proposing Model for Security of IoT Devices in Smart Logistics: A Review |
Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan |
3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs |
Innovative Secured Systems Lab, UET Peshawar |
IF- A |
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks |
Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas |
IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 22.9 |
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security |
Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass |
IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 9.5 |
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis |
Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib |
Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 2.8 |
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices |
Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat |
IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 5.18 |
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices |
Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat |
Telecommunication Systems, Springer. |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 1.70 |
A Review of Web Browser Forensic Analysis Tools and Techniques |
Amir Rasool and Zunera Jalil |
Researchpedia Journal of Computing, Volume 1 |
National Cybercrime and Forensics Lab, Air |
--- |
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data |
Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan |
SCI Journal (Springer Multimedia Systems Journal ) |
Innovative Secured Systems Lab, UET Peshawar |
IF- 1.73 |
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things |
Gauhar Ali,Naveed Ahmad ,
Yue Cao,
Shahzad Khan,
Haitham Cruickshank
|
IEEE Access |
Innovative Secured Systems Lab, UET Peshawar |
IF- 3.47 |
IoT-Flock: An Open-source Framework for IoT Traffic Generation |
Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah |
IEEE International Conference on Emerging Trends in Smart Technologies |
Internet of Things (IoT) Security Lab, UET Lahore |
NEW |
Enterprise Mobile Device Management Requirements and Features |
Hina Batool ; Ammar Masood |
IEEE International Conferenceon Computer Communications -
|
Devices and Network Security Lab, Air |
NEW |
Towards an Efficient Intrusion Detection System for High Speed Networks |
Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam |
IEEE
|
Cyber Reconnaissance and Combat (CRC) Lab, Bahria |
Not Ranked |
Hardware Trojan Detection using FBHT in FPGAs |
Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik |
IEEE
|
Cyber Reconnaissance and Combat (CRC) Lab, Bahria |
Not Ranked |
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol |
Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn
|
IEEE
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
5.131 |
Distributed Fault Detection and Isolation in Second
Order Networked Systems in a Cyber-Physical
Environment
|
AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood
|
ISA Transactions/Elsevier
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
4.30 |
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach
|
MA Abbasi, AQ Khan, M Abid
|
Transactions of the Institute of Measurement and Control
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
1.97 |
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
|
Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ;
Guy Gogniat ;
Pascal Benoit
|
IEEE
|
Blockchain Security Lab, ITU Lahore |
3.47 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
|
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti
|
Information Systems, 2020
|
Blockchain Security Lab, ITU Lahore |
2.77 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
|
Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat
|
IEEE
|
Blockchain Security Lab, ITU Lahore |
--- |