Sr. # |
|
1 |
T. Naqash, M. Hassam, etal “Statistical Analysis Based Intrusion Detection for Software Defined Network” published in 5th IEEE Smart Com Conference, Las Vegas, Nevada, USA 2021 |
2 |
T. Naqash and Z. Abideen, “Review on Safe Reversible Image Data Hiding” Accepted in IEEE International Conference on Knowledge Innovation and Invention South Korea 2018 |
3 |
T. Naqash and Z. Abideen, “Encryption and Decryption of Mobile Security Using AES and GOST Algorithms” Accepted in IEEE International Conference on Knowledge Innovation and Invention South Korea 2018 |
4 |
T. Naqash, Z. Abideen, H. A. Tariq “Android Apps Management System to Ensure Mobile Security” Accepted in IEEE International Conference on Knowledge Innovation and Invention South Korea 2018 |
5 |
T. Naqash and I. Assad, “Statistical Analysis Based Intrusion Detection and Prevention System for Software Defined Network” Accepted in IEEE 4Th International Conference on Advances in Computing and Communication Engineering (ICACCE) 2018 France |
6 |
T. Naqash,,U. Farooq, M.Abubakar, H.A.Tariq, M. Haris “ Elliptical Curve Based Encryption Scheme Analysis of Symmetric Traffic in SDN” Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) |
7 |
T. Naqash and H. Waraich, “Techniques for Reduction of False Alarms in Signature-Based Intrusion Detection Systems”, Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) |
8 |
T. Naqash and M. Abubakar, “Malicious Switch Detection Technique by Using Machine Learning Techniques for Software Defined Network”, Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) |
9 |
Shahid and T. Naqash, “Android (Nougats) Security Issues and Solutions”, 4thIEEE International Conference on Applied System Innovation, Japan 2018 |
10 |
S.Osama and T. Naqash, “Anti-Theft Cloud Apps for Android Operating System”, 4th IEEE International Conference on Applied System Innovation, Japan 2018 |
11 |
M. Hamza, T. Arshad, T. Naqash, “Game Predictor Technique by Using Machine Learning Technology” Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) China. |
12 |
U. Farooq, M. Abubakar T.Naqash,”Facial Recognition Security and Privacy Issues in Android OS” Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) |
13 |
W. Ahmed, H. A. Tariq and T. Naqash “Modeling and Systematic Investigation: Efficiency Enhancement of CdTe Solar Cell using SCAPS 1D Software” Accepted in IEEE 13th International Forum on Strategic Technology (IFOST 2018) |
14 |
A. Ishfaq, T.Naqash, U. Mujahid, N. Islam Efficient Implementation of 1024-bit Symmetric Encryption and Decryption Algorithm for Real Time Communication Systems , IEEE, Student Conference on Research and Development 2012 Malaysia |
15 |
A. Jahngeer and T. Naqash “Efficient Implementation of 1024-Bit Symmetric Encryption Protocol for Low Range Devices”, IEEE International Conference on Computing, Mathematics and Engineering Technologies – iCoMET 2018 |
16 |
T.Naqash, A. Ishfaq and F. Hadi, “Secure DNS From Amplification Attack By Using Modified Bloom Filters”. IEEE, 8th International Conference on Digital Information Management 2013 |
17 |
T. Naqash and M. Amjad, “Handover Mechanism for Mobile User and Femtocell for LTE Network”, 3rd IEEE International Conference on Computer, Control & Communication; 2013 |
18 |
T.Naqash, U. Mujahid, N. Islam, “Mutual Authentication Protocol for LTE Based Mobile Networks”.,IEEE, International Conference on Open source System and technology 2012 |
19 |
T.Naqash, U. Mujahid, N. Islam, “A Novel Mutual Authentication Protocol for H(e)NB and Mobile Devices Using S8 S-Box”; IEEE, International Conference on Open source System and technology 2012 |
20 |
T.Naqash, U. Mujahid, N. Islam, “Protecting DNS from Cache Poisoning Attack by Using Secure Proxy”.IEEE, 8th International Conference on Emerging Technologies 2012 |
21 |
T.Naqash, I. Shafi “Edge Sharpening in Grayscale Images using Modified Sobel Technique” IEEE, 14th International Multi topic Conference (INMIC), 2011 |