MS: Recent submissions

  • Haris Javaid (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    The right to privacy and freedom of expression is the basic right of every human being. In the digital communication the same rights should also be provided. This thesis elaborates the proposed design and protocol of a ...
  • Muhammad Abdullah Abid (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    The field of software engineering nowadays is of high importance due to its financial and daily life implications. So attackers find them advantageous to analyze the executables dispatched by software creating companies. ...
  • Yumna Ghazi (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    The last couple of years have seen a radical shift in the cyber defense paradigm from reactive to proactive, and this change is marked by the steadily increas- ing trend of Cyber Threat Intelligence (CTI) sharing. ...
  • Zohaib Shahid (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    Passwords have always played a crucial role in cybersecurity. As known, al- phanumeric passwords are commonly used for authentication but they su er from issues of usability and shoulder-sur ng. By introducing new ...
  • Majid Amjad Hussain (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    Virtual currencies are being increasingly used around the globe. For this reason, the security of the Bitcoin wallets is also becoming a major concern for Bitcoin community. The security experts and developers are ...
  • Anila Ghazanfar (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Uniform Resource Locators (URLs) have been a basis of the Web since its origin. They are the reference point to any resource in the cyber space. Ac- cording to Verizon DBIR 2016 report, attacks on web applications are ...
  • Roha Zulqarnain (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Evidence is a proof of facts and can be legally presented at a trial to convince the judge about the facts. There are several types of proofs i.e. oral testimony of eyewitnesses, public records, written documents, objects, ...
  • Hafiza Mahwash Faryad (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    In the era of digital world, cyber security is a vital part of any computer system. Attack and defensive strategy have always remained struggling against each other. Regular efforts are required to assess security of already ...
  • Asma Majeed (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    The rapid revolution in technology has made the interaction among people easier through social media. Social media facilitates communication and provides easy way of reaching out to people. It has also given the business ...
  • Makhdoom Syed Muhammad Baqir Shah (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Evidence is the key to solve any crime. Evidence integrity needs to be protected in order to make it admissible in the court of law. Digital evidence is more revealing but it is fragile. It can easily be tampered or modified. ...
  • Farhat Zaman (SEECS, National University of Sciences and Technology, Islamabad, 2016)
    The advent of Internet of Things (IoT) has revolutionized networks by transforming legacy dumb devices into smart connected 'things'; observing, interacting and impacting the environment with minimal human intervention. These ...
  • Sara Khurshid (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Currently, a lot of service providers, provide the users with e cient atomic web services as per their requirement. But, owing to the increasing value of automation and complexity of requirements of users, there is a ...
  • Zeeshan Qaiser (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    Cloud computing is the most demanding technology and is widely used all over the world. It provides on-demand services to industries and individual consumers. It includes the capability of a cloud in providing infrastruc ...
  • Naima Mubariz (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Person re-identi cation is a complex computer vision task and plays a key role in providing authorities a great tool to maintain high level security. Human appearance is a critical part of information with high ...
  • Zia ur Rehman (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    In any forensic investigation involving the extraction of evidence from a computing device, the investigator looks into two major sources of information; the storage device and the computer memory. While the former involves ...
  • Noor Ul Ain (SEECS, National University of Sciences and Technology, Islamabad, 2017)
    Secret sharing, a building block of multiparty cryptography, ensures secure communication of any secret among a set of parties in a way that secret can only be revealed when all of the intended recipients come together and ...
  • Aiza Aqeel Abbasi (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    Advancement in technology allows people to access the data through smart phones regardless of the time and place. Because of widespread applications of users’ interest, the dependency on the mobile devices has increased. ...
  • Muhammad Obaid ur Rehman (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    Hadoop is a big-data processing framework which is widely used for data storage and processing. Now-a-days security is one of the major concerns in the digital world. Any system is only considered reliable when it provides ...
  • Hina Binte Haq (SEECS, National University of Sciences and Technology, Islamabad, 2018)
    We are in the amidst of another silent revolution: the blockchain. It is basi- cally a unique tamper-resistant data structure, that aggregates timestamped transactions, into sequential blocks on a distributed digital ...
  • Qamar, Sara (SEECS, National University of Science & Technology, 2016)
    Automated analytics of cyber threat knowledge is crucial for network threat isolation and risk mitigation. Consequently, there has been growing interest in implementing a proactive line of defense through threats pro ...

Search DSpace


Advanced Search

Browse

My Account