Publications

2022

Sr. No. Journal/Conference. Paper Title Domain (Sub-Lab)
1. Khan, Waseem Ullah, Safdar Nawaz Khan Marwat, and Salman Ahmed. "Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol." Comput. Syst. Sci. Eng. 43, no. 3 (2022): 1297-1313. Secured IoT Devices
2. Sarwar, Asima, Salva Hasan, Waseem Ullah Khan, Salman Ahmed, and Safdar Nawaz Khan Marwat. "Design of an Advance Intrusion Detection System for IoT Networks." In 2022 2nd International Conference on Artificial Intelligence (ICAI), pp. 46-51. IEEE, 2022. Secured IoT Devices

2021

Sr. No. Journal/Conference. Paper Title Domain (Sub-Lab)
1. Khattak, Sana, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud, and Fazal Qudus Khan. "An effective security assessment approach for Internet banking services via deep analysis of multimedia data." Multimedia Systems 27,no. 4 (2021): 733-751. Security Testing
2. Jan, Sadeeq, O. Bin Tauqeer, Fazal Qudus Khan, George Tsaramirsis, Awais Ahmad, Iftikhar Ahmad, Imran Maqsood, and Niamat Ullah. "A framework for systematic classification of assets for security testing." Comput. Mater. Contin. 66, no. 1 (2021): 631-645. Security Testing
3. Asher, Syeda Warda, Sadeeq Jan, George Tsaramirsis, Fazal Qudus Khan, Abdullah Khalil, and Muhammad Obaidullah. "Reverse Engineering of Mobile Banking Applications." Comput. Syst. Sci. Eng. 38, no. 3 (2021): 265-278. Security Testing
4. Tauqeer, Omer Bin, Sadeeq Jan, Alaa Omar Khadidos, Adil Omar Khadidos, Fazal Qudus Khan, and Sana Khattak. "Analysis of Security Testing Techniques." Intelligent Automation & Soft Computing 29, no. 1 (2021): 291-306. Security Testing
5. Hasan, Salva, Salman Ahmed, and Safdar Nawaz Khan Marwat. "Realization of a Novel, Lightweight and Secured CoAP Based Monitoring System in Smart Logistics." In 2021 6th International Multi-Topic ICT Conference (IMTIC), pp. 1-6. IEEE, 2021. Secured IoT Devices
6. Johar, Sumaira, N. Ahmad, A. Durrani, and Gauhar Ali. "Proof of pseudonym: Blockchain-based privacy preserving protocol for intelligent transport system." IEEE Access 9 (2021): 163625-163639. Blockchain Security
7. Johar, Sumaira, Naveed Ahmad, Warda Asher, Haitham Cruickshank, and Amad Durrani. "Research and applied perspective to blockchain technology: A comprehensive survey." Applied Sciences 11, no. 14 (2021): 6252. Blockchain Security

2020

Sr. No. Journal/Conference. Paper Title Domain (Sub-Lab)
1. Rahman, Shahid, Fahad Masood, W. Ullah Khan, Niamat Ullah, F. Qudus Khan, Georgios Tsaramirsis, Sadeeq Jan, and Majid Ashraf. "A novel approach of image steganography for secure communication based on LSB substitution technique." Comput. Mater. Contin 64, no. 1 (2020): 31-61. Security Testing
2. Abbas, Arbab Waseem, Safdar Nawaz Khan Marwat, Salman Ahmed, Abdul Hafeez, Khalil Ullah, and Ihsan Ullah Khan. "Proposing model for security of IoT devices in smart logistics: a review." In 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1-4. IEEE, 2020. Secured IoT Devices
3. Ali, Gauhar, Naveed Ahmad, Yue Cao, Shahzad Khan, Haitham Cruickshank, Ejaz Ali Qazi, and Azaz Ali. "xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things." IEEE Access 8 (2020): 58800-58816. Blockchain Security

2019

Sr. No. Journal/Conference. Paper Title Domain (Sub-Lab)
1. Jan, Sadeeq, Annibale Panichella, Andrea Arcuri, and Lionel Briand. "Search-based multi-vulnerability testing of XML injections in web applications." Empirical Software Engineering 24, no. 6 (2019): 3696-3729. Security Testing
2. Ali, Gauhar, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, and Haitham Cruickshank. "BCON: Blockchain based access CONtrol across multiple conflict of interest domains." Journal of Network and Computer Applications 147 (2019): 102440. Blockchain Security
3. Ali, Gauhar, Naveed Ahmad, Yue Cao, Muhammad Asif, Haitham Cruickshank, and Qazi Ejaz Ali. "Blockchain based permission delegation and access control in Internet of Things (BACI)." Computers & Security 86 (2019): 318-334. Blockchain Security
4. Ahmad, Naveed, Haitham Cruickshank, Yue Cao, Fakhri Alam Khan, Mohammad Asif, Awais Ahmad, and Gwanggil Jeon. "Privacy by architecture pseudonym framework for delay tolerant network." Future Generation Computer Systems 93 (2019): 979-992. Blockchain Security