Refine your search

Your search returned 1351 results.

Not what you expected? Check for suggestions
A Critical Analysis of Various Web Domains in Pakistan-Anomalies and Countermeasures / Sohaib Khan

by Khan, Sohaib | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Security Analysis of Recovered Data in Cloud based Hypervisor Virtual Machines / Syed Fawad Ali Shah

by Shah, Syed Fawad Ali | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Metamorphic Techniques and Their Application on Havex Malware /

by Mumtaz, Zainub | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
A Control Framework for Openid / Moeen Qaemi Mahmoodzadeh

by Mahmoodzadeh, Moeen Qaemi | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Sensors Date Acquisition and Transmission Protection in Ehealthcare System Muhammad Yaseen

by Yaseen, Muhammad | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Android Device Protection Through Machine Learning Technique (s) Anam Mehtab

by Mehtab, Anam | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Detection of Advance Persistent Threat (APT) Farhan Habib Ahmad

by Ahmad, Farhan Habib | Dr. Babar Aslam.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Analysis of In-Application Advertisements for Safeguarding Android users from Embedded Adware / Anum Javaid

by Javaid, Anum | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Detection of Distributed Denial of Service Attack on Vehicular Adhoc Networks using very fast Decision Tree Amman Durrani

by Durrani, Amman | Dr. Seemab Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
framework to Mitigate Security Vulnerability (Denial of Service(DOS) ) of Session Initiation Protocol / Voice over Internal Protocol (SIP/VOIP) / Saqib Khalid

by Khalid, Saqib | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Elliptic Curve based Signcryption and its Multiple Recipient Scheme for Firewall Implementation / Farhan Ahmad

by Ahmad, Farhan | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2011Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Control Framework for Openid Moeen Qaemi Mahmoodzadeh

by Mahmoodzadeh, Moeen Qaemi | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (1).
Automated Anaylsis of Malware-Semantic Based Approach Muzzamil Noor

by Noor, Muzzamil | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Forensic Analysis of Windows 10 Metro UI Apps for User Privacy and Data Integrity Violations /

by Jamali, Farhad Hussain | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Forensic Analysis of Drives Encrypted with Windows Bitlocker / Kunwar Sharoon Jiwan Mall

by Mall, Kunwar Sharoon Jiwan | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Cyber Security Sensitization: A Case Study of Adolescents in Pakistan /

by Shah, Syed Usman Ali | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Cyber Attack Trends analysis in Education Sector using Distributed Honeypots / Muhammad Haseeb Jalalzai

by Jalalzai, Muhammad Haseeb | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Forensic Analysis of IIS FTP Publishing Service (Version 7.5) /

by Khalid, Saneeha | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Determining the Efficacy of ISO Control in Academics Institutions and Finding the Vulnerabilities using Penetration Testing / Umair Ahmad

by Ahmad, Umair | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Detection of JAVASCRIPT based Malicious Extensions in MOZILA Firefox / Yaser Waseem

by Waseem, Yaser | Dr. Hammad Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Development of Cybersecurity Learning Platform for SMBs / Aasia Sana

by Sana, Aasia | Supervisor:Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (3).
Security Requirements Specification Framework for Government Sector Cloud Users for Cloud Computing Prctsojects Rida Naveed

by Naveed, Rida | Dr. Haider Abbas.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (1).
R - ELK Stack for Log Analysis Using Customized IDS Signatures /

by Ishfaq, Hassan | Dr. Baber Aslam.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
An Invisible Non-blind Color Image Watermarking Scheme / Ramsha Ahmed

by Ahmed, Ramsha | Dr. Abdul Ghafoor.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Implementing International best Practices in Academics Institutes / Huma Rehman

by Rehman, Huma | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2014Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Identity Based Encryption for Secure Email Sadia Sami

by Sami, Sadia | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS-NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Algebraic Side Channel Attack (ASCA) on Stream Ciphers /

by Kazmi, Asif Raza | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Defence Against PUE Attack in CRN: A Game Theoretic Approach /

by Khaliq, Saim Bin Abdul | Dr. Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Digital forensic analysis of IPhone / Waqas ali Khan.

by Khan, Waqas Ali | .

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Effects of primary user emulation attack on primary user activity / Ayesha Naeem.

by Naeem, Ayesha | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Pakistan's cyber space security: Critical Analysis and countermeasures / Narmeen Shafqat.

by Shafqat, Narmeen | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Android Malware Analysis / Faisal Nasim.

by Nasim, faisal | Dr. Babar Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2015Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Exploitation and assessment of web-application vulnerabilities against data stealth attack by web crawlers and scrappers / Jamal Ahmed.

by Ahmed, Jamal | Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
A state of the art anomaly IDS for hypervisor / Muhammad Intisar Ullah.

by Muhammad Intisar ullah Khan Sumbal | Muhammad Faisal Amjad.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
A Corporate Level Novel Methods of Decentralized Authentication for Secure Cloud Data Sharing / Subas Khan

by Khan, Subas | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 MCS (2).
Security Model for Android Smartphone Dual Persona / Khushboo Siddiquie

by Siddiquie, Khushboo | Dr. Ashraf Masood.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
On Variant of Flame Malware / Seharish Ajmal

by Ajmal, Seharish | Dr. Mehreen Afzal.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2016Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Key Management in Wimax Mesh Network / Usman Ahmad

by Ahmad, Usman | Dr. Faisal Bashir.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2012Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Handling Malicious Insiders in an IOT based on Cloud E-Healthcare Environment / Afsheen Ahmed

by Ahmed, Afsheen | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Analysis of Hardware Rooted Security System Implementation in Mobile Devices / Naveeda Ashraf

by Ashraf, Naveeda | Dr. Rabia Latif.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Impact of VM based Side Channel Attack on Depsky Multi Cloud Model / Haider Ali Khan Khattak

by Khattak, Haider Ali Khan | Dr. Imran Rashid.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Zero-Day Attack Detection using Security Information & Event Management (SIEM) / Natasha Arjumand Shoaib Mirza

by Mirza, Natasha Arjumand Shoaib.

Material type: Text Text Publisher: Islamabad : MCS - NUST, 2013Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
Intrusion detection in cloud computing / Adeel Rasheed Minhas.

by Minhas, Adeel Rasheed | Imran Rashid.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (1).
Forensic analysis of solid state drives / Sidra Sohail.

by Sohail, Sidra | Baber Aslam.

Material type: Text Text Publisher: Islamabad: MCS - NUST, 2017Availability: Items available for loan: Central Library (CL)Call number: 004 (2).
ERP Demystified / Alexis Leon

by Leon, Alexis.

Edition: 2nd editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw Hill, 2008Availability: Items available for loan: Central Library (CL)Call number: 658.4012 LEO (2).
Geographic information systems & science / Paul A. Longley ... [et al.].

by Maguire. David J | Longley, Paul.

Edition: 3rd ed.Material type: Text Text Publisher: Hoboken, NJ : Wiley, c2011Online access: Click here to access online Availability: Items available for loan: Military College of Engineering (MCE) Call number: 621.3678 MAG (1).
Raster imagery in geographic information systems / Stan Morain & Shirley López Baros, editors.

by Stan Morain , editor | Morain, Stanley A | López Baros, Shirley.

Edition: 1st ed.Material type: Text Text Publisher: Santa Fe, NM : OnWord Press, 1996Availability: Items available for loan: Military College of Engineering (MCE) Call number: 910.285 MOR (1).
Principles of geographical information systems / Peter A. Burrough and Rachael A. McDonnell.

by Burrough, P. A | Burrough, P. A | McDonnell, Rachael.

Edition: Repr. with corrections, 2000.Material type: Text Text Publisher: Oxford ; New York : Oxford University Press, [2000]Availability: Items available for loan: Military College of Engineering (MCE) Call number: 910.285 BUR (3).
An introduction to information theory.

by Reza, Fazlollah M.

Material type: Text Text Publisher: New York, McGraw-Hill, 1961Availability: Items available for loan: Military College of Engineering (MCE) Call number: 003.54 (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.