Search Results - "Iqbal, Mian Muhammad Waseem"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    SS7 Vulnerabilities-A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks by Ullah, Kaleem, Rashid, Imran, Afzal, Hammad, Iqbal, Mian Muhammad Waseem, Bangash, Yawar Abbas, Abbas, Haider

    Published in IEEE Communications surveys and tutorials (01-01-2020)
    “…The Signalling System No. 7 (SS7) is used in GSM/UMTS telecommunication technologies for signalling and management of communication. It was designed on the…”
    Get full text
    Journal Article
  2. 2

    Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols by Sajjad, Anum, Afzal, Mehreen, Iqbal, Waseem, Abbas, Haider, Latif, Rabia, Raza, Rana Aamir

    Published in IEEE access (01-01-2020)
    “…Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and…”
    Get full text
    Journal Article
  3. 3

    A comprehensive people, process and technology (PPT) application model for Information Systems (IS) risk management in small/medium enterprises (SME) by Javaid, Muhammad Imran, Iqbal, Mian Muhammad Waseem

    “…With advent of modern era. Information Technology (IT) has turned out to be very critical in operations, management and growth of an enterprise. Now,…”
    Get full text
    Conference Proceeding
  4. 4

    Integrated model: Statistical features, memory analysis for scanner and printer forensics by Fahd, Shah, Iqbal, Mian Muhammad Waseem, Arif, Muhammad, Javed, Muhammad Imran

    “…Printer and scanner can be used in illegal activities varying from corporate office violation to criminal activities and gathering printer artifacts in this…”
    Get full text
    Conference Proceeding