Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Narmeen Shafqat"'
Autor:
Maheen Fatima, Haider Abbas, Tahreem Yaqoob, Narmeen Shafqat, Zarmeen Ahmad, Raja Zeeshan, Zia Muhammad, Tauseef Rana, Shynar Mussiraliyeva
Publikováno v:
PeerJ Computer Science, Vol 7, p e701 (2021)
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorti
Externí odkaz:
https://doaj.org/article/4ffe5981de3840b789149f7623c56354
Autor:
Haider Abbas, Naina Emmanuel, Muhammad Faisal Amjad, Tahreem Yaqoob, Muhammad Atiquzzaman, Zafar Iqbal, Narmeen Shafqat, Waleed bin Shahid, Ali Tanveer, Umer Ashfaq
Publikováno v:
ACM Computing Surveys.
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to provide confidentiality and anonymity to communication. Despite this enormous and ubiquitous usage, VPNs come with various security, misconfiguration and perf
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
Publikováno v:
Telecommunication Systems. 74:379-403
Security of information in computers is of paramount importance. Considering the software security as inadequate, hardware rooted security standards were developed as Trusted Platform Module (TPM) 1.0 in 2003 and subsequently as TPM 2.0 in 2012. Whil
Autor:
Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa0d00e9a674ea0b5256e9a074c464f4
https://doi.org/10.1007/978-3-031-09234-3_6
https://doi.org/10.1007/978-3-031-09234-3_6
Publikováno v:
Future Generation Computer Systems. 95:754-763
Today’s business environment is extremely dynamic and reliant on innovative Information Technology (IT). Such dependence upon technology leads to an increased rate of successful cyber-attacks whose impact is greater than ever. Due to the exponentia
Publikováno v:
Procedia Computer Science. 155:268-275
With the advancement in technology, the installation and usage of diverse applications and softwares on various Operating Systems (OS) have become a very common practice. Owing to technical flaws, misconfigurations, hidden vulnerabilities etc, these
Publikováno v:
DeSE
Cybercrime is referred to as aggressive, intentional act performed through electronic communications. In recent years, lack of awareness regarding technological advancements has paved the way for an intense increase in various types of aggressive cyb
Publikováno v:
2019 International Conference on Advances in the Emerging Computing Technologies (AECT).
Enterprises round the globe have been searching for a way to securely empower AndroidTM devices for work but have spurned away from the Android platform due to ongoing fragmentation and security concerns. Discrepant vulnerabilities have been reported
Publikováno v:
Telecommunication Systems. 70:123-140
Cognitive Radio (CR) is an emerging and promising communication technology geared towards improving vacant licensed band utilization, intended for unlicensed users. Security of Cognitive Radio Networks (CRN) is a highly challenging domain. At present
Autor:
Tauseef Rana, Maheen Fatima, Haider Abbas, Zarmeen Ahmad, Narmeen Shafqat, Shynar Mussiraliyeva, Raja Zeeshan, Zia Muhammad, Tahreem Yaqoob
Publikováno v:
PeerJ Computer Science, Vol 7, p e701 (2021)
PeerJ Computer Science
PeerJ Computer Science
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorti