Comparative analysis of various national cyber security strategies N Shafqat, A Masood International Journal of Computer Science and Information Security 14 (1 …, 2016 | 111 | 2016 |
Forensic investigation of user’s web activity on Google Chrome using various forensic tools N Shafqat IJCSNS Int. J. Comput. Sci. Netw. Secur 16 (9), 123-132, 2016 | 28 | 2016 |
Integrated security, safety, and privacy risk assessment framework for medical devices T Yaqoob, H Abbas, N Shafqat IEEE journal of biomedical and health informatics 24 (6), 1752-1761, 2019 | 26 | 2019 |
Framework for calculating return on security investment (ROSI) for security-oriented organizations T Yaqoob, A Arshad, H Abbas, MF Amjad, N Shafqat Future Generation Computer Systems 95, 754-763, 2019 | 22 | 2019 |
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach SBA Khaliq, MF Amjad, H Abbas, N Shafqat, H Afzal Telecommunication Systems 70, 123-140, 2019 | 18 | 2019 |
A malware evasion technique for auditing android anti-malware solutions S Mirza, H Abbas, WB Shahid, N Shafqat, M Fugini, Z Iqbal, Z Muhammad 2021 IEEE 30th International Conference on Enabling Technologies …, 2021 | 12 | 2021 |
Zleaks: Passive inference attacks on Zigbee based smart homes N Shafqat, DJ Dubois, D Choffnes, A Schulman, D Bharadia, ... International Conference on Applied Cryptography and Network Security, 105-125, 2022 | 10 | 2022 |
A survey on common criteria (CC) evaluating schemes for security assessment of IT products M Fatima, H Abbas, T Yaqoob, N Shafqat, Z Ahmad, R Zeeshan, ... PeerJ Computer Science 7, e701, 2021 | 10 | 2021 |
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan T Yaqoob, F Mir, H Abbas, WB Shahid, N Shafqat, MF Amjad 2017 IEEE 19th International Conference on e-Health Networking, Applications …, 2017 | 8 | 2017 |
Security Assessment and Evaluation of VPNs: A Comprehensive Survey H Abbas, N Emmanuel, MF Amjad, T Yaqoob, M Atiquzzaman, Z Iqbal, ... ACM Computing Surveys 55 (13s), 1-47, 2023 | 6 | 2023 |
Analytical study of hardware-rooted security standards and their implementation techniques in mobile N Ashraf, A Masood, H Abbas, R Latif, N Shafqat Telecommunication Systems 74, 379-403, 2020 | 5 | 2020 |
A framework to determine applications’ authenticity RZ Naeem, H Abbas, N Shafqat, K Saleem, W Iqbal Procedia Computer Science 155, 268-275, 2019 | 3 | 2019 |
Analysis of windows OS’s fragmented file carving techniques: A systematic literature review NUA Ali, W Iqbal, N Shafqat 16th International Conference on Information Technology-New Generations …, 2019 | 3 | 2019 |
Forensic analysis of linkedin’s desktop application on windows 10 OS S Bashir, H Abbas, N Shafqat, W Iqbal, K Saleem 16th International Conference on Information Technology-New Generations …, 2019 | 3 | 2019 |
Track You: A Deep Dive into Safety Alerts for Apple AirTags N Shafqat, N Gerzon, M Van Nortwick, V Sun, A Mislove, A Ranganathan Proceedings on Privacy Enhancing Technologies 4, 132-148, 2023 | 2 | 2023 |
Forensic analysis of image deletion applications M Fatima, H Abbas, W Iqbal, N Shafqat Multimedia Tools and Applications 81 (14), 19559-19586, 2022 | 2 | 2022 |
Crowdsourcing Cybercrimes through Online Resources N Amir, R Latif, N Shafqat, S Latif 2020 13th International Conference on Developments in eSystems Engineering …, 2020 | 2 | 2020 |
Experience report on the challenges and opportunities in securing smartphones against zero-click attacks N Shafqat, C Topcuoglu, E Kirda, A Ranganathan arXiv preprint arXiv:2211.03015, 2022 | 1 | 2022 |
Profiling vulnerabilities threatening dual persona in Android framework K Siddiquie, N Shafqat, A Masood, H Abbas, W bin Shahid 2019 International Conference on Advances in the Emerging Computing …, 2020 | 1 | 2020 |
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks N Shafqat, C Topcuoglu, E Kirda, A Ranganathan | | 2024 |