Ensemble Adaboost Classifier for Accurate and Fast detection of Botnet Attacks in Connected Vehicles |
Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu |
Transactions on Emerging Telecommunications Technologies, Wiley |
National Cybercrime and forensics Lab, AU |
IF- 1.59 |
Towards a Universal Features Set for IoT Botnet Attacks Detection |
Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali |
IEEE International Multi Topic Conference |
Internet of Things (IoT) Security Lab, UET-L |
C |
Web Server Attack Detection using Machine Learning |
Saima Saleem; Muhammad Sheeraz; Muhammad Hanif; Umar Farooq |
IEEE ICCWS 2020 |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
NEW |
Automatic YARA Rule Generation |
Myra Khalid, Maliha Ismail, Mureed Hussain, Muhammad Hanif Durad |
IEEE ICCWS 2020 |
Critical Infrastructure Protection & Malware Analysis, PIEAS |
NEW |
Towards Characterizing COVID-19 Awareness on Twitter |
Muhammad Saad, Muhammad Hassan, Fareed Zaffar |
Arxiv |
Internet Security and Privacy Lab, LUMS |
--- |
Battery-less Zero-maintenance Embedded Sensing at the Mithraeum of Circus Maximus |
Mikhail Afanasov,Naveed Anwar Bhatti,Dennis Campagna,Giacomo Caslini,Fabio Massimo Centonze,Koustabh Dolui,Andrea Maioli
Erica Barone, M. H. Alizai
|
SenSys '20 |
Internet Security and Privacy Lab, LUMS |
A* |
Intermittent Computing with Dynamic Voltage and Frequency Scaling |
Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
|
EWSN '20 |
Internet Security and Privacy Lab, LUMS |
A |
Analysis of File-less Malware and its Evasive Behavior |
Saad Ahmed,Qurat ul Ain,Junaid Haroon Siddiqui,Luca Mottola, Muhammad Hamad Alizai
|
IEEE ICCWS 2020 |
Internet Security and Quantum Technology Lab, NED UET |
NEW |
Cluster Analysis and Statistical Modelling : A machine learning based approach for Packet Inspection |
Zafeer Ahmed, Ibrahim Nadir, Haroon Mahmood, Ali Hammad Akbar, Ghalib Asadullah Shah
|
IEEE ICCWS 2020 |
Internet of Things (IoT) Security Lab, UET-L |
NEW |
Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web |
Syed Suleman Ahmad , Muhammad Daniyal Dar, Muhammad Fareed Zaffar, Narseo Vallina-Rodriguez , Rishab Nithyanand
|
WWW '20 |
Internet Security and Privacy Lab, LUMS |
A* |
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks |
Shehroze Farooqi , Maaz Musa , Zubair Shafiq , and Fareed Zaffar
|
PETS |
Internet Security and Privacy Lab, LUMS |
B |
Using Application Layer Banner Data to Automatically Identify IoT Devices |
Talha Javed, Muhammad Haseeb, Muhammad Abdullah, Mobin Javed
|
Internet Measurement Conference |
Internet Security and Privacy Lab, LUMS |
A |
Hardware-Assisted Isolation Technologies: Security Architecture and Vulnerability Analysis |
Fatima Khalid, Ammar Masood |
IEEE ICCWS, 2020 |
Devices and Network Security Lab, AU |
NEW |
Role of User and Entity Behavior Analytics in Detecting Insider Attacks |
Salman Khaliq, Zain Ul Abideen Tariq, Ammar Masood |
IEEE ICCWS, 2020 |
Devices and Network Security Lab, AU |
NEW |
FracTCAM: Fracturable LUT RAM based TCAM Emulation on Xilinx FPGAs |
Ali Zahir, Shadan Khan Khattak, Anees Ullah, Pedro Reviriego, Fahad Bin Muslim, Waleed Ahmad |
Transactions on Very Large Scale Integration (VLSI), IEEE |
Deep Packet Inspection (DPI) Lab, UET-T |
IF- 2.037 |
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques |
Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat |
IEEE Access |
Blockchain Security Lab, ITU-L |
IF- 3.47 |
Byte-Level Object Identification for Forensic Investigation of Digital Images |
Abdul Rehman Javed, Zunera Jalil |
IEEE ICCWS, 2020 |
National Cybercrime and forensics Lab, AU |
NEW |
Roman Urdu Multi-Class Offensive Text Detection using Hybrid Features and SVM |
Tauqeer Sajid, Mehdi Hassan, Mohsan Ali, Rabia Gillani
|
IEEE INMIC-2020 |
National Cybercrime and forensics Lab, AU |
Not Ranked |
A Generalized Machine Learning Based Model for Detection of DDoS Attacks |
Murk Marvi, Asad Arfeen, Riaz Uddin |
International Journal of Network Management, Wiley |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models |
Asad Arfeen, Khizar Ul Haq, Syed Muhammad Yasir |
International Journal of Network Management, Wiley |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.66 |
Application layer classification of Internet traffic using ensemble learning models |
Muhammad Kamran, Dr. Muhammad Mubashir Khan, Tahir Malik, Asad Arfeen |
Turkish Journal of Electrical Engineering And Computer Sciences, TUBITAK |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 0.68 |
Analysis of achievable distances of BB84 and KMB09 QKD protocols |
Muhammad Mubashir Khan, Asad Arfeen, Usama Ahsan, Saneeha Ahmed and Tahreem Mumtaz |
International Journal of Quantum Information, WORLD SCIENTIFIC |
Internet Security and Quantum Technology Lab, NED-UET |
IF- 1.17 |
Systematic Review Analysis on SQLIA Detection and Prevention Approaches |
Muhammad Saidu Aliero, Kashif Naseer Qureshi, Muhammad Fermi Pasha, Imran Ghani & Rufai Aliyu Yauri |
Wireless Personal Communications |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 1.20 |
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks |
Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal & Arsalan Arshad |
Journal of Ambient Intelligence and Humanized Computing |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 4.59 |
Nature-inspired algorithm-based secure data dissemination framework for Smart City Networks |
Kashif Naseer Qureshi, Awais Ahmad, Francesco Piccialli, Giampaolo Casolla & Gwanggil Jeon |
Neural Computing and Applications |
Cyber Reconnaissance and Combat Lab, Bahria University |
IF- 4.68 |
A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique |
Fazal Qudus Khan, George Tsaramirsis, Sadeeq Jan |
CMC-Computers, Materials & Continua, 64(1), 31–61s |
Innovative Secured Systems Lab, UET Peshawar |
IF- 4.68 |
Proposing Model for Security of IoT Devices in Smart Logistics: A Review |
Arbab Waseem Abbas , Safdar Nawaz Khan Marwat , Salman Ahmed , Abdul Hafeez , Khalil Ullah , Ihsan Ullah Khan |
3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEEs |
Innovative Secured Systems Lab, UET Peshawar |
IF- A |
SS7 Vulnerabilities -A Survey & Implementation of Machine Learning Vs Rule Based Filtering for Detection of SS7 Network Attacks |
Kaleem Ullah , Imran Rashid , Hammad Afzal , Mian Muhammad Waseem Iqbal , Yawar Abbas Bangas, Haider Abbas |
IEEE Communications Surveys & Tutorials. World’s Top Engg Journal, Ranked Q-1 |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 22.9 |
An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security |
Waseem Iqbal , Haider Abbas , Mahmoud Daneshmand , Bilal Rauf , Yawar Abbass |
IEEE Internet of Things Journal. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 9.5) |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 9.5 |
AdDroid: Rule Based Machine Learning Framework for Android Malware Analysis |
Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal & Malik Najmus Saqib |
Mobile Networks and Applications Springer. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 2.8) |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 2.8 |
Integrated Security, Safety, and Privacy Framework for Securing Medical Devices |
Tahreem Yaqoob , Haider Abbas , Narmeen Shafqat |
IEEE Journal of Biomedical and Health Informatics. World’s Top Engg Journal, Ranked Q-1 (Impact Factor 5.18) |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 5.18 |
Analytical Study of Hardware-Rooted Security Standards and their Implementation Techniques in Mobile Devices |
Naveeda Ashraf, Ashraf Masood, Haider Abbas, Rabia Latif & Narmeen Shafqat |
Telecommunication Systems, Springer. (Impact Factor 1.7) |
National Cyber Security Auditing And Evaluation Lab, NUST |
IF- 1.70 |
A Review of Web Browser Forensic Analysis Tools and Techniques |
Amir Rasool and Zunera Jalil |
Researchpedia Journal of Computing, Volume 1 |
National Cybercrime and Forensics Lab, Air |
--- |
An Effective Security Assessment Approach for Internet Banking Services via Deep Analysis of Multimedia Data |
Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud & Fazal Qudus Khan |
SCI Journal (Springer Multimedia Systems Journal ) |
Innovative Secured Systems Lab, UET Peshawar |
IF- 1.73 |
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things |
Gauhar Ali,Naveed Ahmad ,
Yue Cao,
Shahzad Khan,
Haitham Cruickshank
|
IEEE Access |
Innovative Secured Systems Lab, UET Peshawar |
IF- 3.47 |
IoT-Flock: An Open-source Framework for IoT Traffic Generation |
Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. Shah |
IEEE International Conference on Emerging Trends in Smart Technologies |
Internet of Things (IoT) Security Lab, UET Lahore |
NEW |
Enterprise Mobile Device Management Requirements and Features |
Hina Batool ; Ammar Masood |
IEEE International Conferenceon Computer Communications -
|
Devices and Network Security Lab, Air |
NEW |
Towards an Efficient Intrusion Detection System for High Speed Networks |
Hassan Qadeer ; Ammad Talat ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam |
IEEE
|
Cyber Reconnaissance and Combat (CRC) Lab, Bahria |
Not Ranked |
Hardware Trojan Detection using FBHT in FPGAs |
Sundus Qayyum ; Kashif Naseer Qureshi ; Faisal Bashir ; Najam Ul Islam ; Nazir Malik |
IEEE
|
Cyber Reconnaissance and Combat (CRC) Lab, Bahria |
Not Ranked |
LPV Scheme for Robust Adaptive Output Feedback Consensus of Lipschitz Multiagents Using Lipschitz Nonlinear Protocol |
Ateeq ur Rehman ; Muhammad Rehan ; Naeem Iqbal ; Choon Ki Ahn
|
IEEE
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
5.131 |
Distributed Fault Detection and Isolation in Second
Order Networked Systems in a Cyber-Physical
Environment
|
AS Khan, AQ Khan, N Iqbal, M Sarwar, A Mahmood
|
ISA Transactions/Elsevier
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
4.30 |
Parity-Based Robust Data-Driven Fault Detection for Nonlinear Systems using Just-in-Time Learning Approach
|
MA Abbasi, AQ Khan, M Abid
|
Transactions of the Institute of Measurement and Control
|
Critical Infrastructure Protection & Malware Analysis, PIEAS |
1.97 |
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
|
Maria Mushtaq ; Jeremy Bricq ; Muhammad Khurram Bhatti ; Ayaz Akram ; Vianney Lapotre ;
Guy Gogniat ;
Pascal Benoit
|
IEEE
|
Blockchain Security Lab, ITU Lahore |
3.47 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
|
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti
|
Information Systems, 2020
|
Blockchain Security Lab, ITU Lahore |
2.77 |
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
|
Ayaz Akram ; Maria Mushtaq ; Muhammad Khurram Bhatti ; Vianney Lapotre ; Guy Gogniat
|
IEEE
|
Blockchain Security Lab, ITU Lahore |
--- |