MS: Recent submissions

  • Anwar, Hafiza Rabbia (School of Electrical Engineering and Computer Science NUST SEECS, 2019)
    Information security consists of technical views for securing the Information like security protocols, cryptographic tools, firewalls, intrusion detection and protection systems as well as information security management ...
  • Nasir, Hadeeqa (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    Due to the advancement in connected car technology, the toll calculation methods have been evolved to the electronic toll collection. As the toll collection methods evolved to be electronic, they are also exposed to ...
  • Chaudhry Imran Ali, Chaudhry Imran (School of Electrical Engineering and Computer Science NUST SEECS, 2019)
    Supply chains today generally face many complex challenges when focusing on traceability, provenance, trust and integrity. When applied to gem industry, users’ requirement for originality of produce and its worth, ...
  • Gauher, Abeer (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    The advancement in technology along with the increase in the network bandwidth has not only given people the opportunity to be interconnected but devices as well. These devices that can now communicate with each other are ...
  • Ahmad, Abeer (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    In today’s digital world, cyber security plays a vital part in every organization having IT infrastructure. Offensive and defensive strategy have always struggling against each other. Regular efforts are required to ...
  • Malik, Abdul Saboor (School of Electrical Engineering and Computer Science NUST SEECS, 2022)
    Today, webmail is being deployed in many organizations for all kinds of normal and importantcommunications. Several cyber threats involving phishing, malicious insider, and ransomware attacks are primarily targeted through ...
  • Hussain, Aatqa (School of Electrical Engineering and Computer Science NUST SEECS, 2020)
    IPFS is web3.0, it maps content to a specific hash address. IPFS bases search engines are hosting data in the form of CIDs which is also carrying dark web traffic. Dark web is a topic of serious concern because it has ...
  • Khan, Fakiha (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    Wireless sensor networks (WSNs) have revolutionized surveillance and monitoring applications by offering remote control and regulation capabilities. In most applications, networks utilize mobile nodes and rely on ...
  • Aziz, Ayesha Binte (School of Electrical Engineering and Computer Science (SEECS), NUST, 2023)
    Smartphones and Social media applications are particularly prominent in their usage and are often utilized for criminal purposes. Although several mobile forensic tools are available for investigation, it becomes ...
  • Mahboob Ur Rehman (School of Electrical Engineering and Computer Science (SEECS), NUST, 2023)
    Smartphones are essential and useful tools that make daily tasks easier and hassle-free. A large storage capacity is a key feature required in mobile phones. However, once a phone is lost or damaged, data retrieval is ...
  • Akram, Muhammad Zeeshan (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    Solar energy is embracing wide adoption as an alternative, cost effective and clean source of energy. Solar inverter is a core component of solar energy solutions. Modern inverters provide various user programmable ...
  • Abideen, Muhammad Zain ul (School of Electrical Engineering and Computer Science (SEECS), NUST, 2021)
    Recently the use of secure protocols on web such as HTTPS (Hyper Text Transfer Protocol Secure), instead of HTTP (Hyper Text Transfer Protocol), has increased widely. HTTPS provides confidentiality of information between ...
  • Riaz, Arslan (School of Electrical Engineering and Computer Science (SEECS), NUST, 2022)
    In this modern age, Internet of Things (IoT) is becoming part of our lives incautiously. The ease of monitoring and performing our tasks remotely has made this technology inescapable. Accessing IoT devices over the ...
  • Cheema, Muhammad Usman (School of Electrical Engineering and Computer Sciences (SEECS), NUST, 2023)
    Digital technology has advanced rapidly over a couple of decades and people globally have now easy access to the internet and digital devices for communication. Private and personal information is now significantly higher ...
  • Amin, Amir (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    Enhancement in technology is rapidly increasing the usage of computer devices. With the increase in usage and due to the popularity of Microsoft Windows, more than 80% of computer users work on windows operating system ...
  • Zaid, Muhammad (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    Web application uses a remote web server to stores its wide range of data. The data could be financial records, news, stock prices, weather forecast or medical record of patients. So, a web application is totally ...
  • Saleem, Asim (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    MEMS devices have gained importance during last few decades in different areas. These devices have been used in modern communication systems, radar technologies, imaging technologies and medical instruments. MEMS devices ...
  • Rastee, Iqra (School of Electrical Engineering and Computer Science (SEECS), NUST, 2019)
    C language is commonly used to develop embedded systems that are often being used in domains that have critical safety requirements, like transportation and medicine. These systems require rigorous analysis to ensure ...
  • Bilal Ahmed, Bilal (School of Electrical Engineering and Computer Science (SEECS), NUST, 2021)
    Purpose – This research work aims to develop a framework which should be able to couple the location privacy with safety so that the safety and privacy tradeoff could be minimized without sacrificing the reliability of ...
  • Shahid, Abdul Samad Bin (School of Electrical Engineering and Computer Science (SEECS), NUST, 2020)
    LoRaWAN is a very popular globally adopted protocol for IOT networks. Despite many security measures introduced, there are still some flaws one of which is replay attacks. These attacks are a serious threat for the ...

Search DSpace


Advanced Search

Browse

My Account