MSIS: Recent submissions

  • Arif, Muhammad; Supervised by Dr. Imran Rashid. (MCS, 2018-05)
    Internet has folded the world since its inception in the 90’s. No one has ever imagined that it will gain such popularity. It is evident from statistics that IPv4 has been surpassed and 32 bit IP will not accommodate ...
  • Sahi, Muneeb Ahmed; Supervised by Dr. Imran Rashid (MCS, 2018-06)
    e-Healthcare promises to be the next big thing in healthcare. It offers all the advantages and benefits that can be imagined as possible by the patient as well as user: it allows for enhanced simplicity, efficiency, accuracy, ...
  • Asim, Muhammad; Supervised by Muhammad Faisal Amiad. (MCS, 2018-03)
    As the use of smart-phones increases day by day, people are getting more and more dependent on smart-phones for storing their personal and sensitive information. Web browsers are primarily intended for accessing information ...
  • Mehtab, Anam; Supervised by Muhammad Faisal Amjad. (MCS, 2017-12)
    Recent years have witnessed a huge growth in Android malware development. Factor contributing this enormous growth in malware propagation is open source development environment provided by Android. Colossal reliance on ...
  • Ahmed, Afsheen; Supervised by Dr. Rabia Latif. (MCS, 2017-12)
    The emergence of Internet of Things (IoTs) is introducing smart objects as the fundamental building blocks in order to develop a cyber-physical smart universal environment. The IoTs have innumerable daily life applications ...
  • Khan, Subas; Supervised by Dr.Imran Rashid. (MCS, 2017-08)
    Cloud based data sharing is very imminent these days due to various number of advantages associated with it but to attain these fruitful advantages its integrity is required to be ensured. To gain secure communication and ...
  • Khan, Rashid Masood; Supervised by Muhammad Faisal Amjad. (MCS, 2017-08)
    Recent years have seen tremendous increase in crime and terrorism all over the world which has necessitated continuous surveillance of public spaces, commercial entities and residential areas alike. CCTV cameras are an ...
  • Awan, Fazeel Ali; Supervised by Dr.Imran Rashid. (MCS, 2016-10)
    A datacenter is a multi-layered and centralized information technology services provisioning facility housing large number of complex servers, storage and network devices. Legacy datacenters are managed by system and network ...
  • Durrani, Amman; Supervised by Dr. Seemab Latif. (MCS, 2016-12)
    Smart technologies have seeped into every aspect of human communication. The increase in population has escalated the numbers of vehicles on road as well as probability of collision among them. The development of intelligent ...
  • Javaid, Muhammad Imran; Supervised by Dr.Imran Rashid. (MCS, 2016-08)
    Prologue (Page-1), Literature Review and Analysis (Page-14), Analysis of leading IT related risk management frameworks (Page-23), Analysis of leading IT related risk management Tools (Page-31), challenges for application ...
  • Raza, Nasir; Supervised by Dr. Imran Rashid. (MCS, 2016-06)
    Cloud Computing has achieved broad acceptance in the market and academia in a very short period of time, as evident from its broad deployment in the information technology industry. On the other hand, the service providers ...
  • Ishfaq, Hassan; Supervised by Baber Aslam. (MCS, 2017-07)
    Now a days, almost every device including computer, routers, switches, firewalls, software and services generate logs continuously. As number of devices in any large network are large and grow with every new installation, ...
  • Jalalzai, Muhammad Haseeb; Supervised by Baber Aslam. (MCS, 2017-08)
    Cyber attacks are evolving as a sophisticated challenge. Traditional signature based security devices (secure gateways, next generation firewalls, antivirus, IPS etc.) are not sufficient to learn attack’s taxonomy. Although ...
  • Sohail, Sidra; Supervised by Baber Aslam. (MCS, 2017-08)
    evidence preservation. This thesis aims to forensically analyze the current state of Solid State Drives (SSD) and to provide forensic guidelines and procedures for investigators and first responder to deal with them in ...
  • Ali Shah, Syed Usman; Supervised by Baber Aslam. (MCS, 2017-08)
    As a human, we have been confronting with risks throughout our whole lives. The advent of internet has introduced a new set of risks that is risks in digital world. This new aspect brought forward a widespread debate and ...
  • Khan Sumbal, Muhammad Intisar Ullah; Supervised by Muhammad Faisal Amjad. (MCS, 2017-08)
    Virtual machine is a SWbased replica of a real machine, built on the underline hardware machine. Virtualization enables today X86 computers to run multiple operating systems and applications, making your infrastructure ...
  • Mumtaz, Zainub; Supervised by Dr.Mehreen Afzal. (MCS, 2017-08)
    Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques to evade detection by antiviruses. Metamorphic ...
  • Ali Shah, Syed Fawad; Supervised by Dr. Rabia Latif. (MCS, 2017-08)
    Virtualization is the foundational element of cloud computing. With the advancement in virtualization technology, virtual machines (VMs) are increasingly used by both; Data Centre and the end users, the data centres are ...
  • Akram, Sajjal; Supervised by Baber Aslam. (MCS, 2017-07)
    The IT security awareness is an ever increasing issue in today’s world. It is generally believed by the IT security professionals’ community that people are one of the weakest links in the process of systems and networks ...
  • Hafeez, Hafsa; Supervised by Baber Aslam. (MCS, 2017-07)
    Cyber threat environment has changed drastically over the past few years. Attacks are increasing in sophistication. Organizations use various security tools for keeping them secure. Still, many organizations face data ...

Search DSpace


Advanced Search

Browse

My Account