Welcome to DSpace BU Repository
Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
Browsing MS (IS) (BUIC-E-8) by Title
-
Muhammad Umar Farooq, 01-247182-023
(Computer Sciences BUIC, 2021)
The art of securing and averting the network from unauthorized access is commonly known as network security. With the growth of internet technologies, network traffic needs to be made more protected. Modern technologies ...
-
Moiz Irfan, 01-247202-009
(Computer Sciences, 2023)
The growth of 5G-based networks is expanding in all fields. It will have a very important role in our daily life in the near future. It offers much higher speed than previous technology and connectivity. Because of its ...
-
Alina Khalid, 01-247212-002
(Computer Sciences, 2023)
In the growing world of technology, the frequency and magnitude of cyber attacks is increasing day by day. Most popular OS are most prone to these attacks. Android OS is sharing a major share in OS market therefore facing ...
-
Shahid Mahmud, 01-247182-015
(Computer Sciences BUIC, 2021)
People use a variety of internet applications, and often people prefer to reuse the same identity and password with different applications or services to make remembering them easier. While this type of handover activity ...
-
Luqman Shahzad, 01-247181-008
(Computer Sciences BUIC, 2021)
The rapid advancement in the area of Vehicular Ad-hoc Networks (VANET) has carried numerous comforts to individuals due to its capability to support vehicles with wireless data communication with the help of Road Side Units ...
-
Hassan Qadeer, 01-247182-002
(Computer Sciences BUIC, 2021)
Malware is becoming the greatest threat to computers and information systems around the globe. Threat actors carry out business frauds or steal personal information from genuine users. More than 1100 million global malware ...
-
Talha Azhar, 01-247172-021
(Bahria University Islamabad Campus, 2019)
Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different ...
-
Sami Ullah, 01-247201-013
(Computer Sciences BUIC, 2022)
Both the industrial and academic communities have emphasized sentiment analysis methodologies for detecting illegal and hateful content from social media sites such as Twitter, particularly when applied to tweets. Machine ...
-
Sidra Mahnoor, 01-247182-016
(Bahria University Islamabad Campus, 2020)
In this era, wearable devices play an active part in the health care area and a different monitoring system. Wearable tracker research has been vigorously centered around by the scholarly community, including chronic ...
-
Abrar Ahmed, 01-247172-031
(Bahria University Islamabad Campus, 2019)
Signature-based pattern matching is one of the most popular techniques used for detection of malwares. Malware signatures are stored in malware database which are used for pattern matching detection. However, similarity ...
-
M. Arslan Saleem Sandila, 01-247172-013
(Bahria University Islamabad Campus, 2021)
Internet of Vehicles (IoV) is deemed as a promising research field with huge potential of benefits. It shall streamline global traveling practices. The main objective of this chapter is to discuss the main research problem, ...
-
Sib Tul Hassan, 01-247202-020
(Computer Sciences, 2023)
With more sophisticated and integrated systems, the new trend of smart cities has transformed into more smart and intelligent services. Infrastructure for smart cities has adopted several new technologies for sustainability ...
-
Usama Ehsan Abbasi, 01-247202-021
(Computer Sciences, 2023)
Software Defined Networking (SDN) decouples the control and data plane. SDN approach enables the network administrator to respond quickly to the essential requirements from a centralized controller. SDN provides a novel ...
-
Shafaq Munir, 01-247182-014
(Bahria University Islamabad Campus, 2020)
Zero-day attacks are on the rise especially after the widespread availability of online services that can provide attackers a way to send malicious files over the internet. Honeypots are used to isolate malicious traffic ...
-
Zain Nawaz, 01-247212-017
(Computer Sciences, 2023)
Over the preceding years, the proliferation of malware on PC platforms, particularly on Windows OS, has become notably more severe. To counter the propagation of numerous malware variations, the implementation of ML ...
-
Anis Mustafa, 01-247182-001
(Bahria University Islamabad Campus, 2021)
With the growing economy of the shadow internet, malware is becoming the greatest threat to computers and information systems around the globe. Internet is being in use for personal communication, banking, shopping, ...
-
Javaid Wahab, 01-247201-007
(Computer Sciences BUIC, 2022)
The Domain names and URLs are the building block of the internet but are being misused by cybercriminals to spread malware and launch attacks. The malicious URLs and Domains can provide a macro image of malicious activities. ...
-
Zain Raza Hamid, 01-249211-017
(Computer Sciences, 2023)
Healthcare programs and insurance initiatives play a crucial role in ensuring that people have access to medical care. Countries as well as corporate companies around the world provide healthcare facilities to their citizen ...
-
Yasir Qadeer, 01-247191-014
(Computer Sciences BUIC, 2021)
Internet has resulted an enormous rise in number of online social network (OSNs) users and popularity of social media. Privacy and security of OSNs require evaluation from different angles. Online rating systems are broadly ...
-
Bushra Khalid, 01-247192-014
(Computer Sciences BUIC, 2021)
Over the recent decade, Wireless Sensor Network (WSN) has gained attention because of its vast variety of applications. The WSNs applications have play a major role in our daily life activities start from healthcare, ...