MS (IS) (BUIC-E-8): Recent submissions

  • Rosheen Qazi, 01-247172-018 (Bahria University Islamabad Campus, 2019)
    Information security broadly refers to the state of protection against unsanctioned access of information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design ...
  • Ejaz Ahmad, 01-247181-003 (Bahria University Islamabad Campus, 2019)
    Network Functions Virtualization (NFV) includes the performance of system capacities, for instance, firewalls and switches, as Software applications that can keep running on universally useful servers. In present-day ...
  • Talha Azhar, 01-247172-021 (Bahria University Islamabad Campus, 2019)
    Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other’s computers and manipulate personal and sensitive data. Many different ...
  • Abrar Ahmed, 01-247172-031 (Bahria University Islamabad Campus, 2019)
    Signature-based pattern matching is one of the most popular techniques used for detection of malwares. Malware signatures are stored in malware database which are used for pattern matching detection. However, similarity ...
  • Muhammad Khurram Hameed, 01-247182-022 (Bahria University Islamabad Campus, 2020)
    Hardware-based implementations of stream ciphers and ring-learning with error lattice-based post-quantum cryptography (RLWE-LB-PQC) ciphers are requirements of resource constraint and modern computing environments with ...

Search DSpace


Advanced Search

Browse

My Account