Welcome to DSpace BU Repository
Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
Browsing MS (IS) (BUIC-E-8) by Issue Date
-
Abrar Ahmed, 01-247172-031
(Bahria University Islamabad Campus, 2019)
Signature-based pattern matching is one of the most popular techniques used for detection of malwares. Malware signatures are stored in malware database which are used for pattern matching detection. However, similarity ...
-
Rosheen Qazi, 01-247172-018
(Bahria University Islamabad Campus, 2019)
Information security broadly refers to the state of protection against unsanctioned access of information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design ...
-
Ejaz Ahmad, 01-247181-003
(Bahria University Islamabad Campus, 2019)
Network Functions Virtualization (NFV) includes the performance of system capacities, for instance, firewalls and switches, as Software applications that can keep running on universally useful servers. In present-day ...
-
Talha Azhar, 01-247172-021
(Bahria University Islamabad Campus, 2019)
Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different ...
-
Anum Hasan, 01-247172-002
(Bahria University Islamabad Campus, 2019)
The proliferation of malware and the increased availability of computation devices has made malware detection an important task. Large quantities of malware belonging to various families are produced every day. Modern ...
-
Shafaq Munir, 01-247182-014
(Bahria University Islamabad Campus, 2020)
Zero-day attacks are on the rise especially after the widespread availability of online services that can provide attackers a way to send malicious files over the internet. Honeypots are used to isolate malicious traffic ...
-
Muhammad Khurram Hameed, 01-247182-022
(Bahria University Islamabad Campus, 2020)
Hardware-based implementations of stream ciphers and ring-learning with error lattice-based post-quantum cryptography (RLWE-LB-PQC) ciphers are requirements of resource constraint and modern computing environments with ...
-
Sidra Mahnoor, 01-247182-016
(Bahria University Islamabad Campus, 2020)
In this era, wearable devices play an active part in the health care area and a different monitoring system. Wearable tracker research has been vigorously centered around by the scholarly community, including chronic ...
-
Moin Uddin, 01-247182-005
(Bahria University Islamabad Campus, 2020)
Internet of things is widely used in current era for collecting data from sensors and performing certain tasks through processing according to requirement. IoT is developing and will acquire some features from Blockchain ...
-
Anis Mustafa, 01-247182-001
(Bahria University Islamabad Campus, 2021)
With the growing economy of the shadow internet, malware is becoming the greatest threat to computers and information systems around the globe. Internet is being in use for personal communication, banking, shopping, ...
-
Fawad Ahmad Shahzad, 01-247182-025
(Bahria University Islamabad Campus, 2021)
Living in the era of the computerized world and internet network security has become the main concern of users. One of the main threats to network security is DDoS attack. The DDoS attack is the type of attack in which the ...
-
M. Arslan Saleem Sandila, 01-247172-013
(Bahria University Islamabad Campus, 2021)
Internet of Vehicles (IoV) is deemed as a promising research field with huge potential of benefits. It shall streamline global traveling practices. The main objective of this chapter is to discuss the main research problem, ...
-
Muhammad Umar Farooq, 01-247182-023
(Computer Sciences BUIC, 2021)
The art of securing and averting the network from unauthorized access is commonly known as network security. With the growth of internet technologies, network traffic needs to be made more protected. Modern technologies ...
-
Hassan Qadeer, 01-247182-002
(Computer Sciences BUIC, 2021)
Malware is becoming the greatest threat to computers and information systems around the globe. Threat actors carry out business frauds or steal personal information from genuine users. More than 1100 million global malware ...
-
Luqman Shahzad, 01-247181-008
(Computer Sciences BUIC, 2021)
The rapid advancement in the area of Vehicular Ad-hoc Networks (VANET) has carried numerous comforts to individuals due to its capability to support vehicles with wireless data communication with the help of Road Side Units ...
-
Bushra Khalid, 01-247192-014
(Computer Sciences BUIC, 2021)
Over the recent decade, Wireless Sensor Network (WSN) has gained attention because of its vast variety of applications. The WSNs applications have play a major role in our daily life activities start from healthcare, ...
-
Syed Wasim Haidar, 01-247191-011
(Computer Sciences BUIC, 2021)
Internet of Vehicle (IoV) is one of the demanding and new area of research
based on Internet, cloud, edge and 5G services. However, these networks are
suffered with some congestion, routing and security issues especially ...
-
Shahid Mahmud, 01-247182-015
(Computer Sciences BUIC, 2021)
People use a variety of internet applications, and often people prefer to reuse the same identity and password with different applications or services to make remembering them easier. While this type of handover activity ...
-
Faisal Ajaib, 01-247172-023
(Bahria University Islamabad Campus, 2021)
New technologies and automation systems have changed the way of life. For every task in human life, infonnation technology plays a vital role. Preventive approaches are being applied under the umbrella of Information ...
-
Zeeshan Masood, 01-247182-017
(Computer Sciences BUIC, 2021)
Since the number of mobile phone users are also expected to increase in the coming years, this development shows a limitation in the implementation of centralized mobility management. In this paper, Therefore a distributed ...