Your search returned 26 results.

Not what you expected? Check for suggestions
Forensic Analysis Study of Android-based Airlines Applications / Urva Maryam

by Maryam, Urva | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2021Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Determining Essential Permissions for the Detection of Malicious Android Applications / Fahad Akbar

by Akbar, Fahad | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2021Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
A Forensic Analysis of Video Streaming Activities on Android Applications / Adil Ahmad

by Ahmad, Adil | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2022Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Digital Investigation of Tor browser on Windows 10 and Android 10 / Muhammad Raheel Arshad

by Arshad, Muhammad Raheel | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2022Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Analyzing the Security and Data Remnants of Android Freelancing Applications / Muhammad Zia Ur Rehman

by Rehman, Muhammad Zia Ur | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2022Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Enhancing Adult Learning using Mobile-Assisted Technology / Laiba Khaliq

by Khaliq, Laiba | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2022Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Comparative Forensics Analysis of Android Smartphones for Users Data Profiling / Yusra Afzal

by Afzal, Yusra | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2022Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Investigating Web Browser Lifecycles: A Comparative Analysis of Firefox, Chrome, and Edge on Windows 11/ Ahmed Raza

by Raza, Ahmed | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
An Efficient Phishing URLs Detection Approach Using Supervised Machine Learning/ Muhammad Mustafa,

by Mustafa, Muhammad | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
SECURE LOCALIZATION ALGORITHM TO DETECT SYBIL ATTACK IN WIRELESS SENSOR NETWORKS/ Fakiha Khan,

by Khan, Fakiha | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
TRACING DIGITAL TRACES: ANALYZING ANDROID-BASED CLOUD STORAGE APPLICATIONS/ Mahboob Ur Rehman

by Mahboob Ur Rehman | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
AN EXTENDED CFTT EVALUATION FRAMEWORK FOR FORENSIC TOOLS IN SOCIAL MEDIA INVESTIGATIONS/ Ayesha Binte Aziz,

by Aziz, Ayesha Binte | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
DETECTING WEB URL PHISHING: A LIGHTWEIGHT LEXICAL-BASED MACHINE LEARNING METHOD/ Muhammad Nouman Javaid,

by Javaid, Muhammad Nouman | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
An Efficient Phishing URLs Detection Approach Using Supervised Machine Learning/ Muhammad Mustafa,

by Mustafa, Muhammad | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad : SEECS, NUST, 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
RANSOMSHIELD: MITIGATING ANDROID RANSOMWARE ATTACKS THROUGH PERMISSIONBASED ANALYSIS USING MACHINE LEARNING/ Tatheer Ayesha

by Ayesha, Tatheer | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad, SEECS NUST 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
INCIDENT RESPONSE MODEL FOR PROACTIVE MALWARE DETECTION IN SMART DEVICES/ Amna Hameed,

by Hameed, Amna | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad, SEECS NUST; 2023Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
A Comparison Study of Android Browsers Forensics for Data Remnants / Umair Khan,

by Khan, Umair | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad; SEECS NUST; 2024Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Detection of Ransomware-Like Data Manipulation in Android Applications/ Muhammad Sibtain,

by Sibtain, Muhammad | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad; SEECS NUST, 2024Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
DAG Blockchain Based Solution for Data Feed from Oracle System/ Chaudhry, Usama Habib

by Usama Habib Chaudhry | Supervisor. Dr. Mehdi Hussain.

Material type: Text Text Islamabad SEECS NUST 2024Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
A Comprehensive Forensic Study of Client-Side Artifacts from Cloud Storage Applications in Windows 11 Environments/ Hajra Naeem

by Naeem, Hajra | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Analyzing Encrypted Traffic in VPN Applications Using Signature-Based Methods/  Hira Javed

by Javed, Hira | Supervisor: Dr Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Machine Learning Classification of 8-Bit S-Boxes: Differentiating Random and Algebraic Designs/ Usama Musadiq

by Musadiq, Usama | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Active Analysis of Encrypted Traffic Flows for Application Fingerprinting/ Shaher Bano,

by Bano, Shaher | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Enhanced S-Box Classification Using Machine Learning for Cryptographic Design Optimization/ Basit Ali,

by Ali, Basit | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Enhanced S-Box Classification Using Machine Learning for Cryptographic Design Optimization/ Basit Ali,

by Ali, Basit | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
Closing the Gate to Cyber Attacks: An Optimized Deep Reinforcement Learning Approach for Phishing Detection/ Afifa Maryam,

by Maryam, Afifa | Supervisor: Dr. Mehdi Hussain.

Material type: Text Text Islamabad: SEECS NUST. 2025Online access: Click here to access online Availability: Items available for loan: Central Library (CL)Call number: 200 (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.