MS (IS) (BUIC-E-8): Recent submissions

  • Anis Mustafa, 01-247182-001 (Bahria University Islamabad Campus, 2021)
    With the growing economy of the shadow internet, malware is becoming the greatest threat to computers and information systems around the globe. Internet is being in use for personal communication, banking, shopping, ...
  • Fawad Ahmad Shahzad, 01-247182-025 (Bahria University Islamabad Campus, 2021)
    Living in the era of the computerized world and internet network security has become the main concern of users. One of the main threats to network security is DDoS attack. The DDoS attack is the type of attack in which the ...
  • Moin Uddin, 01-247182-005 (Bahria University Islamabad Campus, 2020)
    Internet of things is widely used in current era for collecting data from sensors and performing certain tasks through processing according to requirement. IoT is developing and will acquire some features from Blockchain ...
  • Sidra Mahnoor, 01-247182-016 (Bahria University Islamabad Campus, 2020)
    In this era, wearable devices play an active part in the health care area and a different monitoring system. Wearable tracker research has been vigorously centered around by the scholarly community, including chronic ...
  • Shafaq Munir, 01-247182-014 (Bahria University Islamabad Campus, 2020)
    Zero-day attacks are on the rise especially after the widespread availability of online services that can provide attackers a way to send malicious files over the internet. Honeypots are used to isolate malicious traffic ...
  • Anum Hasan, 01-247172-002 (Bahria University Islamabad Campus, 2019)
    The proliferation of malware and the increased availability of computation devices has made malware detection an important task. Large quantities of malware belonging to various families are produced every day. Modern ...
  • Rosheen Qazi, 01-247172-018 (Bahria University Islamabad Campus, 2019)
    Information security broadly refers to the state of protection against unsanctioned access of information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design ...
  • Ejaz Ahmad, 01-247181-003 (Bahria University Islamabad Campus, 2019)
    Network Functions Virtualization (NFV) includes the performance of system capacities, for instance, firewalls and switches, as Software applications that can keep running on universally useful servers. In present-day ...
  • Talha Azhar, 01-247172-021 (Bahria University Islamabad Campus, 2019)
    Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different ...
  • Abrar Ahmed, 01-247172-031 (Bahria University Islamabad Campus, 2019)
    Signature-based pattern matching is one of the most popular techniques used for detection of malwares. Malware signatures are stored in malware database which are used for pattern matching detection. However, similarity ...
  • Muhammad Khurram Hameed, 01-247182-022 (Bahria University Islamabad Campus, 2020)
    Hardware-based implementations of stream ciphers and ring-learning with error lattice-based post-quantum cryptography (RLWE-LB-PQC) ciphers are requirements of resource constraint and modern computing environments with ...

Search DSpace


Advanced Search

Browse

My Account