The rise of blockchain and smart contracts is expected to revolutionize traditional digital
applications, such as identity management, banking, supply chain management and
finance by transforming them into Decentralized ...
Hameed, Muhammad Atif(School of Electrical Engineering and Computer Science (SEECS) NUST, 2024)
This research thesis aims to critically analyze the shifting landscape of information security
within firms of financial institutions in United States, Europe and Pakistan. The study has
identified significant discrepancies ...
Ashraf, Muhammad Mohsin(School of Electrical Engineering and Computer Science (SEECS) NUST, 2024)
The rapid growth of Internet of Things (IoT) networks has brought significant advancements in sectors such as healthcare, smart homes, and industrial automation. However, this expansion also presents critical security ...
Sibtain, Muhammad(School of Electrical Engineering and Computer Science, (SEECS) NUST, 2024)
Ransomware detection on Android platforms is increasingly challenging due to
the evolving techniques used by attackers and the diverse behaviors of applications.
Traditional methods like static and dynamic analysis face ...
Aconstantly evolving regulatory and technology landscape requires the rapidly growing
organizations to adopt an integrated approach that automates their risk and compli
ance related activities and ensure the implementation ...
In the field of forensic science, professionals are tasked with extraction of significant artifacts
from the devices acquired from crime scenes. These devices often deviate from conventional
design norms, offering minimal ...
Khan, Umair(School of Electrical Engineering and Computer Science, (SEECS), NUST, 2024)
Web browsers are widely used in our digital world for different activities including, accessing websites, retrieving information, online shopping, and banking. Due to security reasons, these web browsers have adequate ...
In today’s digital landscape, an online presence is essential but exposes businesses to
cyber threats. Despite Open Web Application Security Project (OWASP) and Com mon Weakness Enumeration (CWE) guidelines, web application ...
Asif, Fatima(School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2024)
Security is an important consideration when delivering information-aware messages
to vehicles that are far away from the current location of the information-sending
vehicle. This information helps the receiver to save ...
Zain ul Abidin(School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2024)
In the current digital environment, the prevalence of phishing attacks, which use social
engineering to unlawfully obtain sensitive data like user credentials and personal information, is
on the rise. This increase ...
Rashid, Abdur(NUST School of Electrical Engineering and Computer Science (NUST SEECS), 2024)
The widespread use of the internet has brought immense convenience, but it has also led to a
rise in cyber crimes. Attackers are using various tactics and techniques to compromise the
security of information systems. ...
Hameed, Amna(School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
Extensive usage of the Internet is increasing the risk of malware attacks on smart devices.
Implementing security controls in these devices is challenging due to their limited processing
and computation power. Different ...
Karim, Misha(School of Electrical Engineering and Computer Science (SEECS), NUST, 2023)
Human Action Recognition (HAR) is an important aspect of Computer Vision, because
it enables the identification and classification of human actions using various sensors
and cameras. This technology has extensive ...