Research & Collaborations

2020

A Malware Evasion Technique for Auditing Android
Title Author Journal/ Conference Lab Impact Factor
Fault-Tolerant Robust Model Predictive Control of Uncertain Time-Delay Systems Subject to Disturbances Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad IEEE Transactions on Industrial Electronics Critical Infrastructure Protection & Malware Analysis, PIEAS W
Attack Detection From Network Traffic using Machine Learning Maryum Nawaz, Muhammad Arsalan Paracha, Abdul Majid, Hanif Durad VFAST Transactions on Software Engineering Critical Infrastructure Protection & Malware Analysis, PIEAS X
Identification of Malware Families for Creating Generic Signatures : Using Dynamic Analysis and Clustering Methods Umm-e-Hani, M. Ali, M. Ismail, A. Khan and H. Durad International Symposium on Recent Advances in Electrical Engineering & Computer Sciences  Critical Infrastructure Protection & Malware Analysis, PIEAS W
Separation Principle with Secure State Estimation and Lyapunov Stability of Cyber-Physical System under Sensor Attack Maryam Khan, Naeem Iqbal, Abdul Qayyum Khan IEEE Conference on Recent Advances in Electrical Engineering Critical Infrastructure Protection & Malware Analysis, PIEAS ---
A Novel Ensemble Machine Learning Method to Detect Phishing Attack Abdul Basit; Maham Zafar; Abdul Rehman Javed; Zunera Jalil IEEE International Conference on Multi Topic National Cybercrime and Forensics Lab, Air University ---
A comprehensive survey of AI-enabled phishing attacks detection techniques Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil & Kashif Kifayat Telecommunication Systems National Cybercrime and Forensics Lab, Air University IF- 1.734
Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes MUuhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen Wiley International Journal of Satellite Communications and Networking Security Auditing and Evaluation Lab, NUST IF- 1.652
Quality of experience‐based optimization of satellite Internt using WAN accelerators Asad Arfeen, Riaz Uddin Wiley International Journal of Satellite Communications and Networking Security Auditing and Evaluation Lab, NUST IF- 1.652
Context - Oriented Trust Computational Modal for Malicious Node Avoidance Using Edge Intelligence in Industrial Internet of Things A Altaf, H Abbas, F Iqbal, FA Khan, S Rubab Computer & Electrical Engineering Security Auditing and Evaluation Lab IF- 2.663
Robust, Secure and Adaptive Trust-Based Service Selection in Smart Buildings in the Internet of Things (IoT) Ayesha Altaf; Haider Abbas; Faiza Iqbal; Malik Muhammad Zaki Murtaza Khan; Mahmoud Daneshmand IEEE Internet of Things Journal. Security Auditing and Evaluation Lab IF- 9.5
Deceiving Eavesdroppers by Real Time Persistent Spoofing of Android Users’ Location Coordinates for Privacy Enhancement Anum Arshad; Haider Abbas; Waleed Bin Shahid; Anique Azhar WETICE 2020 Security Auditing and Evaluation Lab ---
Towards Characterizing the COVID-19 Awareness on Twitter. Muhammad Saad, Muhammad Hassan, Fareed Zaffar Arxiv Internet security and privacy lab, LUMS IF- 1.128
ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes Waseem Iqbal; Haider Abbas; Pan Deng; Jiafu Wan; Bilal Rauf; Yawar Abbas; Imran Rashid IEEE Internet of Things Journal Internet of things, UETL IF- 9.936
Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis Zafeer Ahmed; Ibrahim Nadir; Haroon Mahmood; Ali Hammad Akbar; Ghalib Asadullah Shah 2020 International Conference on Cyber Warfare and Security (ICCWS) Internet of things, UETL NEW
IoT DoS and DDoS Attack Detection using ResNet Faisal Hussain; Syed Ghazanfar Abbas; Muhammad Husnain; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah IEEE International Multi Topic Conference Internet of things, UETL C
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application Syed Ghazanfar Abbas; Fabiha Hashmat; Ghalib A. Shah IEEE TrustCom / IWCSS Internet of things, UETL A
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source Syed Ghazanfar Abbas; Shahzaib Zahid; Faisal Hussain; Ghalib A. Shah; Muhammad Husnain IEEE TrustCom/C4W Internet of things, UETL A
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case IEEE Trustcom/BigDataSE IEEE Trustcom/BigDataSE Internet of things, UETL A
Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu Transactions on Emerging Telecommunications Technologies, Wiley National Cybercrime and forensics Lab, AU IF- 1.59
Towards a Universal Features Set for IoT Botnet Attacks Detection Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali IEEE International Multi Topic Conference Internet of Things (IoT) Security Lab, UET-L C
Web Server Attack Detection using Machine Learning Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq IEEE ICCWS 2020 Critical Infrastructure Protection & Malware Analysis, PIEAS NEW
Automatic YARA Rule Generation Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad IEEE ICCWS 2020 Critical Infrastructure Protection & Malware Analysis, PIEAS NEW
Towards Characterizing COVID-19 Awareness on Twitter Muhammad Saad, Muhammad Hassan, Fareed Zaffar Arxiv Internet Security and Privacy Lab, LUMS ---
Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli Erica Barone, M. H. Alizai SenSys '20 Internet Security and Privacy Lab, LUMS A*
Intermittent Computing with Dynamic Voltage and Frequency Scaling Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai EWSN '20 Internet Security and Privacy Lab, LUMS A
Analysis of File-less Malware and its Evasive Behavior Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai IEEE ICCWS 2020 Internet Security and Quantum Technology Lab, NED UET NEW
Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah IEEE ICCWS 2020 Internet of Things (IoT) Security Lab, UET-L NEW
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web Syed Suleman Ahmad , Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab Nithyanand WWW '20 Internet Security and Privacy Lab, LUMS A*
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar PETS Internet Security and Privacy Lab, LUMS B
Using Application Layer Banner Data to Automatically Identify IoT Devices Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed Internet Measurement Conference Internet Security and Privacy Lab, LUMS A
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis Fatima Khalid, Ammar Masood IEEE ICCWS, 2020 Devices and Network Security Lab, AU NEW
Role of User and Entity Behavior Analytics in Detecting Insider Attacks Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood IEEE ICCWS, 2020 Devices and Network Security Lab, AU NEW
FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad Transactions on Very Large Scale Integration (VLSI), IEEE Deep Packet Inspection (DPI) Lab, UET-T IF- 2.037
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat IEEE Access Blockchain Security Lab, ITU-L IF- 3.47
Byte-Level Object Identification for Forensic Investigation of Digital Images Abdul Rehman Javed, Zunera Jalil IEEE ICCWS, 2020 National Cybercrime and forensics Lab, AU NEW
Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani IEEE INMIC-2020 National Cybercrime and forensics Lab, AU Not Ranked
A Generalized Machine Learning Based Model for Detection of DDoS Attacks Murk Marvi, Asad Arfeen, Riaz Uddin International Journal of Network Management, Wiley Internet Security and Quantum Technology Lab, NED-UET IF- 1.66
Application layer classification of Internet traffic using ensemble learning models Asad Arfeen, Khizar Ul Haq, Syed Muhammad Yasir International Journal of Network Management, Wiley Internet Security and Quantum Technology Lab, NED-UET IF- 1.66
Application layer classification of Internet traffic using ensemble learning models Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK Internet Security and Quantum Technology Lab, NED-UET IF- 0.68
Analysis of achievable distances of BB84 and KMB09 QKD protocols Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz International Journal of Quantum Information, WORLD SCIENTIFIC Internet Security and Quantum Technology Lab, NED-UET IF- 1.17
Systematic Review Analysis on SQLIA Detection and Prevention Approaches Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri Wireless Personal Communications Cyber Reconnaissance and Combat Lab, Bahria University IF- 1.20
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad Journal of Ambient Intelligence and Humanized Computing Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.59
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon Neural Computing and Applications Cyber Reconnaissance and Combat Lab, Bahria University IF- 4.68
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan CMC-Computers, Materials & Continua, 64(1), 31–61s Innovative Secured Systems Lab, UET Peshawar IF- 4.68
Proposing Model for Security of IoT Devices in Smart Logistics: A Review Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs Innovative Secured Systems Lab, UET Peshawar IF- A
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 22.9
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 9.5
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 2.8
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 National Cyber Security Auditing And Evaluation Lab, NUST IF- 5.18
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat Telecommunication Systems, Springer. National Cyber Security Auditing And Evaluation Lab, NUST IF- 1.70
A Review of Web Browser Forensic Analysis Tools and Techniques Amir Rasool and Zunera Jalil Researchpedia Journal of Computing, Volume 1 National Cybercrime and Forensics Lab, Air ---
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan SCI Journal (Springer Multimedia Systems Journal ) Innovative Secured Systems Lab, UET Peshawar IF- 1.73
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things Gauhar Ali,Naveed Ahmad , Yue Cao, Shahzad Khan, Haitham Cruickshank IEEE Access Innovative Secured Systems Lab, UET Peshawar IF- 3.47
IoT-Flock: An Open-source Framework for IoT Traffic Generation Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah IEEE International Conference on Emerging Trends in Smart Technologies Internet of Things (IoT) Security Lab, UET Lahore NEW
Enterprise Mobile Device Management Requirements and Features Hina Batool ; Ammar Masood IEEE International Conferenceon Computer Communications - Devices and Network Security Lab, Air NEW
Towards an Efficient Intrusion Detection System for High Speed Networks Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
Hardware Trojan Detection using FBHT in FPGAs Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik IEEE Cyber Reconnaissance and Combat (CRC) Lab, Bahria Not Ranked
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn IEEE Critical Infrastructure Protection & Malware Analysis, PIEAS 5.131
Distributed Fault Detection and Isolation in Second Order Networked Systems in a Cyber-Physical Environment AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood ISA Transactions/Elsevier Critical Infrastructure Protection & Malware Analysis, PIEAS 4.30
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach MA Abbasi, AQ Khan, M Abid Transactions of the Institute of Measurement and Control Critical Infrastructure Protection & Malware Analysis, PIEAS 1.97
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ; Guy Gogniat ; Pascal Benoit IEEE Blockchain Security Lab, ITU Lahore 3.47
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti Information Systems, 2020 Blockchain Security Lab, ITU Lahore 2.77
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat IEEE Blockchain Security Lab, ITU Lahore ---