List of Research Projects:

  • Sehrish Ajmal On Variant of Flame Malware
  • Azhar Javed Automated Malware Analysis to Identify Data Espionage and Backdoor Creation
  • Muhammad Tariq Establishing CSIRT for Heterogeneous Academic Environment
  • Sumayya Shahzad Implementation of Automated Security Focused Configuration Management in an Academic Organization through SCAP (NIST)
  • Muzzamil Noor Usability Evaluation for Smartphone Platforms and Development of Dlearn (Device Learning) Application
  • Nadia Mumtaz Generic Information Security Policy Framework For Academic Institutes
  • Huma Rehman Implementing International Best Practices (ISMS) in Academic Institutions
  • Umair Ahmed Determining the Efficacy of ISO 27001 Controls in Academic Institutions and Methodologies to Find the Vulnerabilities
  • Waleed Bin Shahid Analysis of Malicious Applications in Smart Phones Running Android Operating System
  • Sana Ul Haq A solution for the Detection and Prevention of Wormhole Attack in Manets
  • Muhammad Qasim Saeed Security Analysis of Pakistan-e- Passport System
  • Samin Jan Khan A Technique to Discourage the Relay Attack on CAPTCHA
  • Muzammil Khan Policy Driven Military Security Architecture
  • Adnan Abbas Defining Wireless Network Security Policy for Defense Organization and Integrating BLP Model in the Policy for Access Control
  • Muhammad Tariq Saeed Performance Enhancement of Signature-based Network Intrusion Detection System
  • Muhammad Aslam Enhancement of security framework of Mobile Agent Based intrusion detection system
  • Juniad Miraj Internet Cookies Threats to Privacy Consequences and Their Remedial Measures
  • Muhammad Luqman Dar Role Based Access control modeling in an educational environment (Using the CODIS frame work)
  • Abu Baker Ilyas Analysis and Simulation of DoS Attack Detection Algorithm using Dependency and Correlation



  • M. Tariq, B. Aslam, I. Rashid, A. Waqar, “Cyber threats and incident response capability – a case study of Pakistan,” in  2nd National Conference on Information Assurance (NCIA), Dec 11-12, 2013.


  • Faraz Hameed, Abbas Haider, Louise Yngström, “Analyzing Opportunities and Constraints for Deploying a Centralized Information Exchange Infrastructure in Pakistan, Proceedings of SIG GlobDev Fifth Annual Workshop, Orlando, USA December 16, 2012


  • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “Addressing Dynamic Issues in Information Security Management”, Accepted for publication to Journal of Information Management & Computer Security (IMCS), Emerald Group Publishing Limited, UK, 2011.


  • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “Architectural Description of an Automated System for Uncertainty Issues Management in Information Security”, International Journal of Computer Science and Information Security, USA, Vol. 8 No. 3, June 2010, pages 59-67
  • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms”, in Proceedings of IEEE International Workshop on Education Technology and Computer Science (ETCS 2010), March 6-7, 2010, Wuhan, China, pages 149-153
  • B. Aslam, L. Wu and C. C. Zou, “PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks”, In IEEE  International Symposium on Network Computing and Applications (NCA), Cambridge, MA, July 15 -17, 2010


  • Abbas, Haider, Louise Yngström, Ahmed Hemani, “Adaptability infrastructure for bridging IT security evaluation and options theory”, in Proceedings of 2nd IEEE/ACM International Conference on Security of Information and Networks (SIN 2009) October 6-10, 2009, North Cyprus, pages 39-45
  • Abbas Haider, Louise Yngström, Ahmed Hemani, “Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory”, in Proceedings of IEEE Eastern European Regional Conference on the Engineering of Computer Based Systems, September 7th-8th 2009, Novi Sad, Serbia, pages 134-141
  • Abbas Haider, Louise Yngström, Ahmed Hemani, “Empowering Security Evaluation of IT Products by Real Options Theory”, 30th IEEE Symposium on Security & Privacy, May 17- 20, 2009, Oakland, California, USA
  • Asad Raza, Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Characterization for Evaluation of Software Architectures using A T AM”, in Proceedings of Third  IEEE         International Conference on Information & Communication Technologies (ICICT2009), August 15-16 2009, Karachi, Pakistan, pages 241-246
  • Abbas Haider, Louise Yngström, Ahmed Hemani, “Analyzing IT Security Evaluation Methodologies for Developing Countries”, 2009 IPID Annual workshop, Orebro, Sweden
  • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “ROA Based Agile Security Evaluation of IT Products for Developing Countries”, 4th Annual IPID Symposium 2009, September 11th & 12th, London, UK
  • M. Qasim Saeed, Ashraf Masood, Firdous Kausar Securing ePassport system: A proposed Anti-Cloning and Anti-Skimming Protocol 17th International Conference on Software, Telecommunications & Computer Networks, 2009. SoftCOM 2009.  24-26 Sep 2009 Hvar, Croatia


  • Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Evaluation of IT Products: Bridging the Gap between Common Criteria (CC) and Real Option Thinking”, in Proceedings of the World Congress on Engineering and Computer Science 2008, October 22-24, 2008, San Francisco, USA, pages 530- 533
  • Asad Raza, Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Evaluation of ESAM Architecture using ATAM”, in Proceedings of 3rd Annual ICT4D Postgraduate Symposium, September 8-9 2008, Joensuu, Finland