The information age has been revolutionizing the world by bringing a plethora
of opportunities with associated challenges. Cyber threats are eminent due to
the increased dependence on the internet and the information ...
Cloud computing is one of the most adopted technologies of the 21st century. Prospects
of cloud computing as a technology that optimizes resources, reduces complexity, and provides
cost-effective solutions to its ...
KHAN, SHAHZEB; MUMTAZ, MEHROZ; BUTT, SALMAN KHALIL(MCS, 2025-02-10)
The goal of the Advanced Password Manager (APM) project is to create a state-of-the-art
application that will tackle the difficulties involved in managing passwords. It's critical to give
consumers a safe and convenient ...
Usman, M. Umar; Satti, M. Yawar Naseem; Sultan, Saad; Supervised by Asst Prof Bilal Ahmed(MCS, 2025-02-10)
The "BreachBuster AI Pentesting Assistant" is a pioneering project aimed at revolutionizing the
field of cybersecurity and penetration testing. This project introduces an innovative chatbot
solution powered by the NLTK ...
In an era characterized by digital warfare, organizations around the world are engaged in a never ending conflict with constantly changing cyber threats. A hidden area of internet known as the dark
web, has become a ...
Mehmood, Muhammad Bilal; Aftab, Sheikh Hamza; Munawar, Suleman; Supervised by Asst Prof Bilal Ahmed(MCS, 2025-02-10)
QR Shield is an innovative Android application designed to fortify cybersecurity defenses against
QR code-based cyber threats, ultimately fostering a safer and more vigilant society. At its core,
QR Shield empowers ...
In today's digital age, since cellphones are now considered essential personal and business data
storage devices in the digital age, data loss is a major problem for consumers everywhere. This
problem is made worse by ...
Shahid, Muhammad Osama; Munir, Danyal; Janjua, Muhammad Ibrahim; Ashfaq, Rizwan; Supervised by: Asst Prof Aimen Aakif(MCS, 2025-02-10)
In the current cybersecurity environment, the threat of malware is on the rise and this highlights the
need for effective malware analysis solutions. Various malware analysis solution exits but these
solutions come ...
Masood, Asphand Yar; Chatha, Abdullah; Khan, Hamza; Hassan, Aitzaz Ul; Supervised by: Assoc. Prof. Dr Shahzaib Tahir(MCS, 2024-06)
Direct Messaging eXchange (DMX), a pioneering mobile chat application designed to address the
security and privacy requirements of military communication. In response to organizational policies
restricting the use of ...
Quantum computing provides computational advantage by encompassing principles of
superposition, entanglement and interference. Organizations use simulators and combination
of hardware and software components as quantum ...
The ongoing integration of the Internet of Things (IoT) with evolving wireless communica-tion
technology leads to the generation of multimodal data. The rising popularity of cloud
computing is instrumental in providing ...
Security services are essential for organizations, enterprises, and individuals to protect
their network, data, resources, services, privileges, databases, cloud and web access, and
administrative tasks. These services ...
Tremendous influx of novel technologies to enhance the global connectivity leads to vulnerability to security breaches by organized malicious actors. Hence, the need of a secure future communication system is becoming ...
The crucial privacy issues surrounding Brain-Computer Interfaces (BCIs), which
translate brain activity into commands for assistive technology, are prevalent in Human-
Computer Interaction (HCI). Maintaining trust and ...
Deepfake technology is a growing threat due to its strength to produce extremely realistic
manipulated videos, often used maliciously to disseminate misinformation or explicit
content. Destroying reputations and lives. ...
The continuous evolution of malware threats demands more advanced detection
techniques, and artificial intelligence (AI) has emerged as a powerful tool in this area.
Traditional security methods often fall short in ...
Protecting patient privacy in the era of digital health records is a major challenge while allowing healthcare data to be useful. The study of differential privacy as a strong privacy-preserving method for medical data is ...
This paper introduces a Quantum-Resistant HKMS which addresses the needs of patients
who want to have more control over their cryptography keys to mitigate the
insider dangers. The KMS traditionally refers to centralized ...
Advantages of Cloud Computing include its flexibility, scalability, cost savings, and
around-the-clock availability with the latest features. It’s a cloud-based remote access
paradigm that allows users to access computer ...