Security Assessment and Evaluation of VPNs: A Comprehensive Survey
July 13, 2023
ACM Computing Surveys - Volume 55, Issue 13s
Forensic analysis of image deletion applications
February 16, 2022
Multimedia Tools and Applications - Pages 1-28
A survey on Common Criteria (CC) evaluating schemes for security assessment of IT products
October 26, 2021
PeerJ Computer Science - Volume 7, Article Number e701
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
July 01, 2020
Telecommunication Systems - Volume 74, Pages 379-403
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices
June 01, 2020
IEEE Journal of Biomedical and Health Informatics - Volume: 24 , Issue: 6 , Pages 1752-1761
Framework for Calculating Return on Security Investment (ROSI) for Security Oriented Organizations
June 01, 2019
Future Generation Computer Systems - Volume 95, Pages 754-763
Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach
May 29, 2018
Telecommunication Systems - Volume: 70 Issue: 1 Pages: 123-140 Published: JAN 2019
Forensic Investigation of User's Web Activity on Google Chrome using various Forensic Tools
September 30, 2016
International Journal of Computer Science and Network Security - Volume: 16, Issue: 9, Pages123-132
Cyber Security: An Essential Element of National Security
January 02, 2013
Pakistan Army Green Book - Pages 1-26