MSIS: Recent submissions

  • Samee, Rida; Supervised by Dr Abdul Ghafoor. (MCS, 2017-03)
    Visual content tends to engage readers’ attention, helps in better understanding of material and cling to their memories for a longer period of time. In todays world, smart phones, digital mobiles, camera phones and other ...
  • Khattak, Haider Ali Khan; Supervised by Dr. Imran Rashid. (MCS, 2017-02)
    The innovative model of cloud computing has been under keen observation by many organizational sectors like healthcare, financial, Telco’s, private and government, realizing the benefits that can be achieved in terms of ...
  • Ahmed, Ramsha; Supervised by Dr Abdul Ghafoor. (MCS, 2016-12)
    Watermarking in computer or information security, is a technique that embeds the copyright information of digital signals or digital identifier in the respective signals of the host to provide authenticity who the copyright ...
  • Chattha, Naveed Ashraf; Supervised by Dr. Imran Rashid. (MCS, 2017-02)
    Portable and mobile devices have already made their place in our society for private as well as public use. These devices are under continuous evolution and innovation and advancement in every aspect is being observed ...
  • Javaid, Anum; Supervised by Dr. Imran Rashid. (MCS, 2016-08)
    With hundreds of millions of Android phone users in around 190 countries, the global smartphone market has witnessed extraordinary and explosive growth of Android phone sales in recent years, which is escorted with the ...
  • Fahd, Shah; Supervised by Dr. Mehreen Afzal. (MCS, 2016-05)
    Over the past few years Development in the field of cryptanalysis revealed that compromising implementation of cryptographic algorithm is much easier than targeting algorithm separately. Side channel analysis (SCA) targets ...
  • Naeem, Ayesha; Supervised by Dr.Imran Rashid. (MCS, 2016-06)
    Cognitive radio technology helps to resolve the problem of static spectrum shortage by effectively utilizing the available spectrum. By using the technique of dynamic spectrum sensing secondary users utilize the available ...
  • Shafqat, Narmeen; Supervised by Dr.Ashraf Masood. (MCS, 2015-01)
    Introduction (Page-1), Literature review (Page-9), Comparative analysis of various national cyber security strategies (Page-28), Pakistan's x cyber threat landscape (Page-45), Domestic cyber laws and E-regulations in ...
  • Tahir, Shahzaib; Supervised by Dr.Imran Rashid. (MCS, 2015-04)
    Secure communication refers to successful and secure interaction among the participants having common intentions in one-to-one or group settings. One-to-one is termed as a decentralized communication environment where any ...
  • Ajmal, Seharish; Supervised by Dr. Mehreen Afzal. (MCS, 2016-07)
    The collision attack used by Flame Malware was found to be a variant of chosen prefix collision attack. The chosen prefix collision attack was first presented by Stevens, Lenstra and De Weger in 2007. Later on creation ...
  • Iqbal, Aemun; Supervised by Dr.Imran Rashid. (MCS, 2016-08)
    File system by-large stores a wealth of information. It possesses numerous areas where sensitive information can be hidden or encrypted by criminals related to their crime so that when they are caught there is no information ...
  • Rashid, Mujahid; Supervised by Dr.Imran Rashid. (MCS, 2016-08)
    Every new invention has somehow changed the world either in a good or bad way. Similarly RFID technology has a great impact on the world. RFID is a technology to identify objects or people automatically and has received ...
  • Ahmed, Waqas; Supervised by Dr. Baber Aslam. (MCS, 2016-05)
    Memory forensic analysis is an important component of digital forensic and plays critical role in investigation of any digital crime. Volatile memory contains wealth of important information regarding current state of ...
  • Khalid, Marium; Supervised by Dr. Mehreen Afzal. (MCS, 2016-05)
    Cyber space is considered as the fifth domain of warfare. Recently cyber space has evolved in to a war zone worldwide due to which it has become an important aspect for the military and government. As a matter of fact ...
  • Naseem, Raeesa; Supervised by Dr. Mehreen Afzal. (MCS, 2016-04)
    The eminence of third-party-foundry business practice saves a lot of cost by utilizing the economy of scale. While this practise saves a lot of cost by utilizing the economy of scale, it exposes these chips to various ...
  • Aijaz, Lubna; Supervised by Dr. Baber Aslam. (MCS, 2015-11)
    Academic Institutes are considered as a backbone of any country. Security of its information resources (academic and research) is of paramount importance. The statistics have shown that academic institutions are among ...
  • Javed, Azhar; Supervised by Dr. Baber Aslam (MCS, 2014-11)
    In the recent past, malwares have become a serious cyber security threat which has not only targeted individuals and organizations but has also threatened the cyber space of countries around the world. Amongst malware ...
  • Tariq, Muhammad; Supervised by Dr. Baber Aslam. (MCS, 2014-08)
    The tremendous growth of information technology has abruptly changed the world into a global village. It has caused the distances to shrink and information to instantly flow across the globe. At the same time it has also ...
  • Zareen, Muhammad Sharjeel; Supervised By : Dr. Baber Aslam. (MCS, 2014-08)
    The issue of validation of computer forensics tools (CFTs) plays a critical role in computer forensics. The National Institute of Standards and Technology (NIST) of USA is among the leading organizations dealing with ...
  • Awais, Muhammad; Supervised by Dr. Monis Akhlaq. (2015-05)
    Introduction (Page-1), Background and relate work (Page-11), Design and methodology (Page-23), Implementation and testing (Page-40), Conclusion and future direction (Page-59).

Search DSpace


Advanced Search

Browse

My Account