MS: Recent submissions

  • Kamal, Muhammad Muqeet (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    The ever-increasing trend of discovery of new vulnerabilities has created a challenge enterprise and organization to secure themselves from the associated threats. The past few years alone have witnessed many such ...
  • Kanwal, Nazish (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    The way energy is provided by electricity providers is changed because of various upgrades in power grid. Advanced Metering Infrastructure (AMI) is one of the main reasons to modernise the the electricity grid. There ...
  • Khan, Muhammad Waleed (School of Electrical Engineering and Computer Science (SEECS), NUST, 2021)
    Turn-by-Turn Navigation Services have seen a rise in the number of active users. These services help users navigate from one geographical location to another. These services rely on the use of real-time data and also ...
  • UMRANI, ALIA (School of Electrical Engineering and Computer Science, (SEECS), NUST, 2020)
    With the rapid technological advancement, the usage of social media applications has increased resulting in major security concerns. From leisure activities to business management, a social media application is frequently ...
  • ASHRAF, MUHAMMAD GHUFRAN (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    We are living in the time of data innovation, where every IT setup, office, home and client needs to impart and share data. This requirement for correspondence and sharing of data has resulted in an exponential increase ...
  • Mehdi, Mubarak (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    Conventional cryptography relies on keys stored in the device. Whenever the key is needed for use in a cryptographic service, a stored key or template is used. The problem with stored keys is that they can be stolen; ...
  • Zahid, Muaaz Bin (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    The comprehensive digitalization of the economic structure and manufac turing systems aka Industry 4.0 has added values in terms of effectiveness, efficiency, quality, and enhanced performance but with the consequences ...
  • Mustafa, Adeel (School of Electrical Engineering and Computer Science, (SEECS), NUST, 2019)
    Recent advancements in wireless communication technology allowed rapid growth of wireless sensor networks (WSNs). WSN contains minute electronic devices that are called sensor nodes(SN). WSNs covers many areas like health ...
  • Hassan, Fatima (School of Electrical Engineering & Computer Science (SEECS), NUST, 2019)
    Smart phones and applications are being extensively used because smart phones not only provide feasible and instant connectivity, navigation, 24/7 internet access, data collection and data transfer, customizability, smart ...
  • NASIR, SAMRA (School of Electrical Engineering and computer Science (SEECS), NUST, 2020)
    The Internet of Things (IoT) is a network of billions of smart devices that gather and share data, and communicate with each other over the network without human interaction. Normally, the data is stored on the cloud ...
  • Riaz, Ayesha (School of Electrical Engineering and computer Science (SEECS), NUST, 2019)
    Biometric authentication has garnered considerable attention from researchers in the past two decades. A biometric system is vulnerable to variety of attacks compromising the integrity of the process. One of the major ...
  • Akram, Muhammad Waheed (School of Electrical Engineering and computer Science (SEECS), NUST, 2019)
    In this modern age, we are marching towards automation, data centralization in every field of life. We are dependent on databases for storage of data from applications like medical, banking, and stock exchange. Integrity ...
  • Hassan, Muhammad Sohaib (School of Electrical Engineering and computer Science (SEECS), NUST, 2021)
    Organizations are handling huge amounts of data on daily basis. This data includes passenger name records (PNR), patient’s medical information, financial statements, State level secrets i.e. watch list of terrorist/spy, ...
  • Khan, Rabia Amin (School of Electrical Engineering and computer Science (SEECS), NUST, 2019)
    Quantum image representations are the models that are used to represent digital images on to the quantum computers. They also allow to perform various image processing operations on these images and to store on to the ...
  • Masood, Hafiz Syed Osama Bin (School of Electrical Engineering and computer Science (SEECS), NUST, 2020)
    WordPress is the most popular CMS (Content Management System) being used for building websites today. As of 2019, 33.6% of all the websites are built over it. Moreover, WordPress holds 60.5% market share among all ...
  • Mustafa, Muhammad (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    A phishing attack is an instance of social engineering in which the perpetrator deceives the user to gain access to sensitive information and/or personal data without authorization. This attack vector has become a ...
  • Javaid, Muhammad Nouman (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    Cyber-attacks involving social engineering techniques, aimed at stealing sensitive information from individuals or groups of people, such as user credentials, personal data, medical records, account details, or business ...
  • Khalid, Zainab (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    The phrase ‘seeing is believing’ has been validated to the point where any proposition to the contrary sounds bizarre. The boom of the digital camera, photography, and social media has drastically changed how humans ...
  • Taha, Muhammad (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    Conventional cryptographic algorithms have been depended on stored keys for providing the security services. Since the keys are stored on a device, it makes them vulnerable to key theft attacks. Increasing the key size ...
  • Jadoon, Iqra (School of Electrical Engineering and Computer Science NUST SEECS, 2021)
    The proliferation of IoT technology has transformed various businesses but at the same time, it has provided access to a huge number of physical devices deployed in the network. The IoT devices are susceptible to ...

Search DSpace


Advanced Search

Browse

My Account