<?xml version='1.0' encoding='utf-8' ?>



<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[NUST Institutions Library Catalogue Search for '(su:&quot;MSIS-10&quot;)']]></title>
     <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22MSIS-10%22%29&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22MSIS-10%22%29&amp;sort_by=relevance_dsc&amp;format=atom"/>
     <description><![CDATA[ Search results for '(su:&quot;MSIS-10&quot;)' at NUST Institutions Library Catalogue]]></description>
     <opensearch:totalResults>12</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Mitigation technique against primary user emulation attack in cognitive radio networks






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216218</link>
        
       <description><![CDATA[









	   <p>By Naqvi, Syed Bila Haider (MSIS-10). 
	   Rawalpindi MCS (NUST)
                        . xi,76,p.;
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=216218">Place Hold on <em>Mitigation technique against primary user emulation attack in cognitive radio networks</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216218</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Detection of flooding distributed denial of service attacks in rule-based network intrusion detection systems 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216247</link>
        
       <description><![CDATA[









	   <p>By Saboor, Amtul (MSIS-10). 
	   Rwp MCS 2014
                        
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=216247">Place Hold on <em>Detection of flooding distributed denial of service attacks in rule-based network intrusion detection systems </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216247</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Defense Against Insider Attacks (Sybil Attack) Using Code Testing 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216265</link>
        
       <description><![CDATA[









	   <p>By Makhdoom, Imran (MSIS-10) . 
	   Rawalpindi MCS (NUST) 2015
                        . xiv, 127 p
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=216265">Place Hold on <em>Defense Against Insider Attacks (Sybil Attack) Using Code Testing </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=216265</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Discrete Fourier Transform Attack 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217076</link>
        
       <description><![CDATA[









	   <p>By Zulfiqar, Maj Rashid   (MSIS-10) . 
	   Rawalpindi MCS,NUST 2015
                        . xi, 69 p
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217076">Place Hold on <em>Discrete Fourier Transform Attack </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217076</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Forensic Analysis of Cloud Storage Service on Windows 8






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217181</link>
        
       <description><![CDATA[









	   <p>By Mehreen, Sidrat   (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . xiii, 119 p
                        , Introduction (Page-1), Literature Review (Page-6), Research Methodology (Page-10), Dropbox Analysis (Page-25), One Drive Analysis (Page-43), Google Drive Analysis (Page-73), Results and Discussions (Page-106), Conclusion (Page-112),
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217181">Place Hold on <em>Forensic Analysis of Cloud Storage Service on Windows 8</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217181</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Automated Analysis of Malware-Semantics Based Approach 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217182</link>
        
       <description><![CDATA[









	   <p>By Noor, Muzzamil   (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . xi, 78 p
                        , Introduction (Page-1), Literature Review (Page-10), Semantics Based Model for Malware Behavior (Page-30), Evasion Countermeasure (Page-44), Evaluation (Page-55), Conclusion and Future Work (Page-69),
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217182">Place Hold on <em>Automated Analysis of Malware-Semantics Based Approach </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217182</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Complex Network Model of Loss of Privacy in Social Network Contagion 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217184</link>
        
       <description><![CDATA[









	   <p>By Batool, Komal  (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . ix, 124 p
                        , Introduction (Page-1), Background (Page-12), Methodology (Page-21), A Tamper-Evident Model Network (Page-37), Results and Discussions (Page-47), Conclusion (Page-88),
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217184">Place Hold on <em>Complex Network Model of Loss of Privacy in Social Network Contagion </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217184</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Attacks and Countermeasures of Hash Chain Based Password Authentication Schemes 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217185</link>
        
       <description><![CDATA[









	   <p>By Jan, Muhammad Shahzad  (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . xii, 77 p
                        , Introduction (Page-1), Literature Review and Background of Study (Page-6), Proposed Frame work (Page-20), Analysis and Comparisons of  Renowned Protocols (Page-29), Proposed Scheme (Page-54), Frame Work Scrutiny of Proposed Scheme (Page-64), Conclusion and Future Work (Page70),
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217185">Place Hold on <em>Attacks and Countermeasures of Hash Chain Based Password Authentication Schemes </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217185</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Data Integrity Validation of Open Source Idevice Forensic Tools with Reference to Commercial Tool






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217186</link>
        
       <description><![CDATA[









	   <p>By Ahmed, Maryam Jalees  (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . ix, 61 p 
                        , Introduction (Page-1), Literature Review (Page-6), Research Methodology (Page-9), Test Result for Mobile Devices Acquisition (Page-19), iPad Forensics Using Commercial Tool (Page-29), iPad Forensic Using OS Utilities and Freeware (Page-36), Comparison of Results and Discussion (Page-44), Conclusion and Future Work (Page70)
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217186">Place Hold on <em>Data Integrity Validation of Open Source Idevice Forensic Tools with Reference to Commercial Tool</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217186</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Detection of Advance Persistent Threat (APT)






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217187</link>
        
       <description><![CDATA[









	   <p>By Ahmad, Farhan Habib  (MSIS-10). 
	   Rawalpindi MCS,NUST 2015
                        . x, 121 p
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217187">Place Hold on <em>Detection of Advance Persistent Threat (APT)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217187</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Implementation of Automated Security Focused Configuration Management in an Academic Organization Through Scap (NIST)/






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217188</link>
        
       <description><![CDATA[









	   <p>By Shahzad, Sumayya  . 
	   Rawalpindi MCS,NUST 2015
                        . x, 119 p
                        , Introduction (Page-1), Literature Review (Page-7), Research Methodology and Analysis (Page-34), Implementation and Testing (Page-76), 
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217188">Place Hold on <em>Implementation of Automated Security Focused Configuration Management in an Academic Organization Through Scap (NIST)/</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217188</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Design and Implementation of Scalable Ethnic Threats Archive With Customized Signatures Generation Competence 






</title>
       <dc:identifier>ISBN:</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217266</link>
        
       <description><![CDATA[









	   <p>By Awais, Muhammad. (MSIS-10) . 
	   rawalpindi MCS,NUST 2015
                        . xi,102p.
                        
                        
                        
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217266">Place Hold on <em>Design and Implementation of Scalable Ethnic Threats Archive With Customized Signatures Generation Competence </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217266</guid>
     </item>
	 
   </channel>
</rss>





