MSIS: Recent submissions

  • Basit, Abdul; Supervised by Dr Mehreen Afzal. (MCS, 2019-09)
    Chaos is a mathematical branch which focuses on dynamic systems and studies their behavior. It is a theory that is interdisciplinary and describes that there are some patterns, self- similarities, repetitions, feedback ...
  • Haleem, Fahad; Supervised by Dr Mehreen Afzal. (MCS, 2019-10)
    The most widely and cheap mode of transmission over short distances is by using Bluetooth device. Bluetooth is most common mode to transmission between mobile phones. To make data secure for both sides of transmission, it ...
  • Zulkifl, Zeeshan; Supervised by Dr Mehreen Afzal. (MCS, 2019-10)
    Authentication, Authorization and Audit Logs are soul features of Network Security. These services are achieved in legacy systems through application of Access Control mechanisms like MAC, DAC, RBAC et cetera, coupled with ...
  • ullah Khan, Muhammad Ehsan; Supervised by Dr.Imran Rashid. (MCS, 2019-10)
    Blockchain has caught the attention of both researchers and industrialists because of its widespread growth in the last 10 years. What was started with decentralized immutable ledger has now paved its way to decentralized, ...
  • Shafeeq, Hafiz Muhammad; Supervised by Dr.Imran Rashid. (MCS, 2019-10)
    In 1970s, roaming interconnection for cellular networks was designed for a few trusted parties without considering security as a major concern. Today same decades-old SS7 (Signalling System No 7) is a pillar for many roaming ...
  • Bhutta, Maheen Fatima; Supervised by Dr Haider Abbas. (MCS, 2019-04)
    With the increased usage of smart phones over the years, an immense evolution in camera technology and image enhancement applications has been observed. However, this associates greater security concerns with smart phones. ...
  • Naeem, Rida Zojaj; Supervised by Dr Haider Abbas. (MCS, 2019-03)
    Installation and usage of different applications and softwares on different Operating Systems (OS) is a very common practice nowadays. The reason being easy availability of applications easy availability in Information ...
  • Farooq, Ammad; Supervised by Waleed Bin Shahid. (MCS, 2020-06)
    While the use of Internet applications and the World Wide Web is increasing rapidly, many commercial, private and public sectors such as online banking, shopping, administration and social networks have made their services ...
  • Tariq, Saqiba; Supervised by Mian Muhammad Waseem Iqbal. (MCS, 2020-01)
    Social sites are a platform where colossal bulk of data is shared, individuals as well as organizations share their information on various online media platforms. Among these sites Facebook is a valuable source where ...
  • Abbasi, Ahsan Rasheed; Supervised by Dr Mehreen Afzal. (MCS, 2019-11)
    The dramatic growth in encrypted traffic changes the security landscape. As more organizations are becoming conscious of the need to protect their data, more devices, services and applications use encryption as the fundamental ...
  • Mir, Faiza; Supervised by Dr Haider Abbas. (MCS, 2019-10)
    With the advent of increasingly sophisticated and futuristic Electronic Health Record (EHR) systems with capabilities to enhance not only the process of caregiving but also taking part in medical research through provision ...
  • Kanwal, Arusa; Supervised by Dr Abdul Ghafoor. (MCS, 2019-07)
    Digital image forgery is quite an old issue in image forensic. We tend to live in digital era and its easy for anyone to access the data, process it and at the end share that data. This poses a major security challenge for ...
  • Jamil, Sara; Supervised by Abdul Ghafoor. (MCS, 2019-04)
    Protection of images nowadays is very difficult due to uncontrolled spread of images over internet and other various applications. Copy right protection and authentication of origin is very important. Images can be secured ...
  • Shah, Syed Adeel; Supervised by Dr. Haider Abbas. (MCS, 2019-04)
    Privacy preservation is one of the key roles from security perspective in any data security environment. The purpose of this thesis is to provide privacy aspect of security in such a way that it provides strong Patient ...
  • Tanveer, Ali; Supervised by Dr.Imran Rashid. (MCS, 2018-08)
    Cyber Security has become a significant concern in corporate web usage, which includes risks of both internal and external computer attacks. The purpose of this study is to introduce and investigate an application of the ...
  • Javed, Muhammad Haseeb; Supervised by Dr Mehreen Afzal. (MCS, 2018-11)
    Cryptographic algorithms are used in number of applications to provide different security services. Correctness of algorithm and their implementation is a question in the face of today's threat perspective. In the situation ...
  • Gerard, Akash; Supervised by Dr Haider Abbas. (MCS, 2018-11)
    The concept of federated cloud computing has reduced the computational cost of an individual user. On the other side, it has increased the security and privacy issues of the information of a cloud client. Users sharing ...
  • Arslan Maqsood, Hafiz Muhammad; Supervised by Dr Muhammad Faisal Amjad. (MCS, 2018-12)
    Android applications can bypass current security model of Android OS, when working together which is said to be application collusion. Android has no special check for inter application communication. These capabilities ...
  • Mehdi, Asad; Supervised by Dr Mehreen Afzal. (MCS, 2018-10)
    Simple Network Management Protocol(SNMP) is a renown network management protocol. In an IP network, it is used for gathering information from, and configuring network devices. Due to its extensive usage and presence in ...
  • Waqas, Muhammad; Supervised by Dr Mehreen Afzal. (2018-11)
    These days data security and communication are major concern for every organization/ individual and there are bundle of software available which uses cryptographic primitives to protect internal data and to secure ...

Search DSpace


Advanced Search

Browse

My Account