Information Security

 

Collections in this community

Recent Submissions

  • Haider, Raja Zeeshan (MCS, 2025-02-20)
    The information age has been revolutionizing the world by bringing a plethora of opportunities with associated challenges. Cyber threats are eminent due to the increased dependence on the internet and the information ...
  • AKHTAR, SYED IMRAN (MCS, 2025-02-18)
    Cloud computing is one of the most adopted technologies of the 21st century. Prospects of cloud computing as a technology that optimizes resources, reduces complexity, and provides cost-effective solutions to its ...
  • Farooq, Ammar; Kumar, Staish; Ali, Hasnain; Talha, Muhammad; Supervised by Associate Prof Dr. Shahzaib Tahir (MCS, 2025-02-10)
  • KHAN, SHAHZEB; MUMTAZ, MEHROZ; BUTT, SALMAN KHALIL (MCS, 2025-02-10)
    The goal of the Advanced Password Manager (APM) project is to create a state-of-the-art application that will tackle the difficulties involved in managing passwords. It's critical to give consumers a safe and convenient ...
  • Usman, M. Umar; Satti, M. Yawar Naseem; Sultan, Saad; Supervised by Asst Prof Bilal Ahmed (MCS, 2025-02-10)
    The "BreachBuster AI Pentesting Assistant" is a pioneering project aimed at revolutionizing the field of cybersecurity and penetration testing. This project introduces an innovative chatbot solution powered by the NLTK ...
  • Raza, Ali; Ahmed, Afzaal; Sallah, Abdullah; Supervised by: Prof Dr. Faisal Amjad (MCS, 2025-02-10)
    In an era characterized by digital warfare, organizations around the world are engaged in a never ending conflict with constantly changing cyber threats. A hidden area of internet known as the dark web, has become a ...
  • QR SHIELD 
    Mehmood, Muhammad Bilal; Aftab, Sheikh Hamza; Munawar, Suleman; Supervised by Asst Prof Bilal Ahmed (MCS, 2025-02-10)
    QR Shield is an innovative Android application designed to fortify cybersecurity defenses against QR code-based cyber threats, ultimately fostering a safer and more vigilant society. At its core, QR Shield empowers ...
  • SHAH, SAFIULLAH; TARAR, USAMA HAMEED; SAEED, KAMRAN; Asst Prof. AMMAR HASSAN (MCS, 2025-02-10)
    In today's digital age, since cellphones are now considered essential personal and business data storage devices in the digital age, data loss is a major problem for consumers everywhere. This problem is made worse by ...
  • Shahid, Muhammad Osama; Munir, Danyal; Janjua, Muhammad Ibrahim; Ashfaq, Rizwan; Supervised by: Asst Prof Aimen Aakif (MCS, 2025-02-10)
    In the current cybersecurity environment, the threat of malware is on the rise and this highlights the need for effective malware analysis solutions. Various malware analysis solution exits but these solutions come ...
  • Masood, Asphand Yar; Chatha, Abdullah; Khan, Hamza; Hassan, Aitzaz Ul; Supervised by: Assoc. Prof. Dr Shahzaib Tahir (MCS, 2024-06)
    Direct Messaging eXchange (DMX), a pioneering mobile chat application designed to address the security and privacy requirements of military communication. In response to organizational policies restricting the use of ...
  • Haider, Bilal (MCS, 2025-02-06)
    Quantum computing provides computational advantage by encompassing principles of superposition, entanglement and interference. Organizations use simulators and combination of hardware and software components as quantum ...
  • Khan, Shahzad (MCS, 2025-01-22)
    The ongoing integration of the Internet of Things (IoT) with evolving wireless communica-tion technology leads to the generation of multimodal data. The rising popularity of cloud computing is instrumental in providing ...
  • Rashid, Aqsa (MCS, 2024-12-30)
    Security services are essential for organizations, enterprises, and individuals to protect their network, data, resources, services, privileges, databases, cloud and web access, and administrative tasks. These services ...
  • Zahra, Masooma (MCS, 16-12-20)
    Tremendous influx of novel technologies to enhance the global connectivity leads to vulnerability to security breaches by organized malicious actors. Hence, the need of a secure future communication system is becoming ...
  • Ali, Najaf (MCS, 2024-12-12)
    The crucial privacy issues surrounding Brain-Computer Interfaces (BCIs), which translate brain activity into commands for assistive technology, are prevalent in Human- Computer Interaction (HCI). Maintaining trust and ...
  • Ahsan, Jaudet (MCS, 2024-11-18)
    Deepfake technology is a growing threat due to its strength to produce extremely realistic manipulated videos, often used maliciously to disseminate misinformation or explicit content. Destroying reputations and lives. ...
  • Pervez, Rabia (MCS, 2024-11-04)
    The continuous evolution of malware threats demands more advanced detection techniques, and artificial intelligence (AI) has emerged as a powerful tool in this area. Traditional security methods often fall short in ...
  • Mudassar, Bakhtawar (MCS, 28-10-28)
    Protecting patient privacy in the era of digital health records is a major challenge while allowing healthcare data to be useful. The study of differential privacy as a strong privacy-preserving method for medical data is ...
  • Batool, Hania (MCS, 2024-10-28)
    This paper introduces a Quantum-Resistant HKMS which addresses the needs of patients who want to have more control over their cryptography keys to mitigate the insider dangers. The KMS traditionally refers to centralized ...
  • Amin, Mariya (MCS, 2024-10-29)
    Advantages of Cloud Computing include its flexibility, scalability, cost savings, and around-the-clock availability with the latest features. It’s a cloud-based remote access paradigm that allows users to access computer ...

View more