Information Security: Recent submissions

  • Mumtaz, Zainub (MCS, National University of Sciences and Technology, 2017)
    Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques to evade detection by antiviruses. Metamorphic ...
  • Khan, Waqas Ali (MCS, National University of Sciences and Technology, 2012)
    iPhone is always under the scrutiny of mobile and computer hackers because of its popularity and the diverse set of tasks it is able to perform. However, the purpose of the scrutiny is always to reveal the internal ...
  • Kianee, Reeda Iftikhar (MCS, National University of Sciences and Technology, 2012)
    Tweakable ciphers are a relatively new and interesting area in the field of cryptology. It is a current subject and considerable researches have been carried out on the topic. It is a step further in the field of ...
  • Ashraf, Naveeda (MCS, National University of Sciences and Technology, 2017)
    In today’s world of advanced Internet, mobility is a key service. The use of smart phones, tablets and wearable devices is on the rise at fast pace. However, traditional software-based security solutions are unable to ...
  • Shaikh, Rizwan Ahmed; Supervised by Dr. Imran Rashid. (MCS, 2020-10)
    Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive ...
  • Malik, Wajahat Sultan; Supervised by Dr. Fawad Khan. (MCS, 2020-09)
    The information security requirements are increasing due to huge expansion of data in various fields. For the Clients with the limited resources, dealing with huge data is always been a significant problem. Cloud computing ...
  • Khan, Liaqat Ali; Supervised by Dr. Muhammad Shamim Baig (MCS, 2010-08-08)
    Speech is digitized, encrypted and sent between two parties in many situations. Digitized speech signals are generally considered as ordinary binary data streams as far as encryption is concerned. In this thesis, we present ...
  • Latif, Rabia; Supervised by Dr. Haider Abbas. (MCS, 2016-02)
    Distributed Denial of Service (DDoS) attack does not aims to disrupts or interfere with the real sensor data, rather they take advantage of disparity that exists between the network bandwidth and the limited resource ...
  • Mehfooz, Aamna; Supervised by Mian Muhammad Waseem Iqbal. (MCS, 2020-10)
    In this study reviewed the current Pakistan’s cyber threats landscape by focusing on the global rankings and among them standing of Pakistan as a developing country. Emerging threats, risks and behavioral and technical ...
  • Akhtar, Zahara Batool; Supervised by Mian Muhammad Waseem Iqbal. (MCS, 2020-09)
    Download managers have become a popular way of downloading content from the internet. These download managers are software applications or apps which provide fast and secure downloads. But not all apps are trustworthy. ...
  • Ghazanfar, Imama; Supervised by Dr. Haider Abbas. (MCS, 2020-08)
    With the growing usage of internet in Pakistan, Government of Pakistan is also utilizing the internet for communication and delivery of e-services to the people. Websites being one of the easiest ways of communication over ...
  • Pasha, Simmal; Supervised by Dr Abdul Ghafoor. (MCS, 2020-08)
    Digital watermarking is a method that prevents unauthorized distribution of copyrighted material by providing means of proving ownership of the material. This thesis introduces a watermarking technique based on lifting ...
  • Jamil, Zikrat; Supervised by Dr Muhammad Faisal Amjad. (MCS, 2020-09)
    As the list of Internet of Things’ (IoT) devices, and the advantages they offer, continues to grow, the security threats to these devices continue to flourish. Most dangerous and irrepressible among these threats is ...
  • Rafiq, Shahid; Supervised by Dr Mehreen Afzal. (MCS, 2020-09)
    HTTPS is used to secure the communication (transactions and other activities) over Internet using SSL. HTTPS enables entire encryption of the data to be kept confidential being transmitted from the client browser to the ...
  • Khan, Waqas Ajmal; Supervised by Dr. Fawad Khan. (MCS, 2020-09)
    Data deduplication performs a significant role in reducing the storage overhead of cloud service providers (CSP) and lowers the cost of end user packages. Besides deduplication, CSP and their respective clients are also ...
  • Hassan, Mehmood ul; Supervised by Dr. Shahzaib Tahir. (MCS, 2020-08)
    The rapid development in the field of cloud computing, big data, and machine learning, motivates individuals and enterprises to outsource their multimedia and image data to the cloud. Although, outsourcing reduces the ...
  • Ahmed, Bilal; Supervised by Dr.Imran Rashid. (MCS, 2020-09)
    In today’s world, state power is demonstrated in a number of ways in tangible domain, may it be sea, air, land or space. Domain of Internet, though intangible is no exception. Although geographical boundaries are not ...
  • Sultan, Ahmed Raheeq; Supervised by Dr.Imran Rashid. (MCS, 2020-07)
    We have numerous systems being used in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. Distance Bounding (DB) ...
  • Mirza, Samrah; Supervised by Dr Haider Abbas. (MCS, 2020-01)
    Mobile malware threats have become a real concern. Malware authors are coming up with smarter ways to build applications that can easily compromise confidentiality, integrity and availability of the user’s data and perform ...
  • Raza Khan, Abdur Rehman; Supervised by Dr Mehreen Afzal. (MCS, 2019-09)
    The rapid development of wireless sensor networks and RFID technologies is transform­ ing every aspect of human life ranging from personal fitness companions to goods tracking in the supply chain industry. The sensitive ...

Search DSpace


Advanced Search

Browse

My Account