About

Dr. Mehreen Afzal is working as Associate Professor of Practice in the Military College of Signals . Dr. Mehreen Afzal has a PhD in Information Security . Dr. Mehreen Afzal has published 24 research articles & conference papers having a citation count of 319 , carried out 0 projects and filed 0 intellectual property.

Research Tags

Research Projects

0

Industry Projects

0

Amount Granted

0.0 M

Publications

24

Citations

319

Intellectual Property

0
Publication Types
Project Types
Publications by Year
Projects by Year

Education

PhD Information Security 2007- 2010
NUST, Islamabad , Pakistan
MS Information Security 2003- 2007
NUST, Islamabad , Pakistan
MSc Applied Mathematics 1993- 1995
Quaid-i-Azam University , Pakistan

Experience

Associate Professor of Practice 2023- Present
Military College of Signals , NUST
Associate Professor of Practice 2022- 2023
Military College of Signals , NUST
Adjunct Faculty 2020- 2020
Military College of Signals , NUST
Adjunct Faculty 2018- 2020
Military College of Signals , NUST
Chair Cyber Security Department 2021- 2022
Air Univ , Islamabad ,
GM 2001- 2021
NESCOM , Islamabad ,
Lecturer 1999- 2001
Govt College Chakwal , Chakwal ,
Lecturer 1995- 1999
Army Public College , Jhelum ,

Awards

Memberships

No project records found for this faculty member
15
Research Articles
8
Conference Proceedings
0
Books
0
Book Chapters
0
Editorial Activities
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems 2024
KH
Khwaja Mansoor
SH
Shynar Zhenisbekovna (Al-Farabi Kazkhstan University)
AB
Abdellah Chehri (Royal Military College of Canada)
Journal: Internet of Things, Volume:27, Article Number: 101228
Impact Factor: 6.0 Citations: 19 Quartile: 1
SDG 3
Correlation power analysis of modes of encryption in AES and its countermeasures 2018
SH
Shah Fahd (-)
SA
Salman Waheed (International Islamic University)
Journal: Future Generation Computer Systems, NULL
Impact Factor: 5.768 Citations: 23 Quartile: 1
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages 2020
Journal: Future Generation Computer Systems, Volume:104, Page:43-59
Impact Factor: 7.187 Citations: 10 Quartile: 1
Algebraic analysis of Trivium and Trivium/128 2008
Journal: International Journal of Electronic Security and Digital Forensics, Volume:1, Issue:4, Page:344-352
Impact Factor: 0 Citations: 0 Quartile: N/A
SDG 9
Algebraic Side Channel Attack on Trivium and Grain Ciphers 2017
AS
ASIF RAZA KAZMI (-)
XI
XIAODONG YANG (Xidian University)
Journal: IEEE Access, Volume 5, Pages 23958-23968
Impact Factor: 3.557 Citations: 14 Quartile: 1
The reality of backdoored S-Boxes—An eye opener 2024
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
IJ
Ijaz Khalid (Quaid-i-Azam University)
Journal: Journal of Information Security and Applications, Volume 80, Article Number 103674
Impact Factor: 5.6 Citations: 5 Quartile: 2
SDG 9
A game model design using test bed for Malware analysis training 2022
Journal: Information and Computer Security, Volume 23, Issue 1, Pages 1-18
Impact Factor: N/A Citations: 1 Quartile: N/A
SDG 9
Enhanced Metamorphic Techniques-A Case Study Against Havex Malware 2021
ZA
Zainab Mumtaz (-)
WA
Waqas Aman (Sultan Qaboos University)
Journal: IEEE Access, Volume 9, Pages 112069-112080
Impact Factor: 3.476 Citations: 6 Quartile: 2
Encryption and Re-Randomization Techniques for Malware Propagation 2021
AH
Ahsan Rasheed Abbasi
SH
Shynar Mussiraliyeva (Al-Farabi Kazakh National University)
A
Awais Ur Rehman (University of South Asia)
Journal: IEEE Access, Volume 9, Pages 132522-132532
Impact Factor: 3.367 Citations: 2 Quartile: 2
SDG 9
Behavioral Based Insider Threat Detection Using Deep Learning 2021
RA
Rabia Latif (Prince Sultan University)
RI
Rida Nasir
Journal: IEEE Access, Volume 9, Pages 143266-143274
Impact Factor: 3.367 Citations: 65 Quartile: 2
SDG 9
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs 2022
ZE
Zeeshan Zulkifl
A
Abdul Rehman
S
Saqib Saeed (Imam Abdulrahman Bin Faisal University)
A
Abdullah M. Almuhaideb (Imam Abdulrahman Bin Faisal University)
Journal: IEEE Access, Volume 10, Pages 15644-15656
Impact Factor: 3.367 Citations: 63 Quartile: 2
SDG 3 SDG 9
Detection of non-trivial preservable quotient spaces in S-Box(es) 2023
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
Journal: Neural Computing and Applications, Pages 1-13
Impact Factor: 6.0 Citations: 0 Quartile: 2
SDG 9
A systematic threat analysis and defense strategies for the metaverse and extended reality systems 2023
SA
Sara Qamar
ZA
Zahid Anwar (North Dakota State University)
Journal: Computers and Security, Volume 128, Article Number:103127
Impact Factor: 5.105 Citations: 96 Quartile: 2
SDG 9
SLF-ADM: Securing Linux frontiers: Advanced persistent threat (APT) detection using machine learning 2025
DA
Dawood Al Abri (Sultan Qaboos University)
YA
Yawar Abbas (Sunway University)
S
S Sohaib Karim
Journal: Neural Computing and Applications, Pages 1-20
Impact Factor: N/A Citations: 0 Quartile: N/A
SDG 9
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols 2020
AN
Anum Sajjad (-)
RA
Rabia Latif (Prince Sultan University)
R
Rana Aamir Raza (Bahauddin Zakariya University)
Journal: IEEE Access, Volume 8, Pages 139903-139917
Impact Factor: 3.367 Citations: 8 Quartile: 2
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis
SH
Shah Fahd
DA
Dawood Shah (Quaid-i-Azam University)
AT
Atiya Hai (University of Surrey)
Conference: 15th International Symposium on Foundations & Practice of Security (FPS – 2022)
Citations: N/A
Think before your LFSRs jump
MU
Mujahid Mohsin
AR
Arif Wahla
Conference: 2010 10th IEEE International Conference on Computer and Information Technology
Citations: N/A
An ICMetric based key generation scheme for controlled group communication
MU
Muhammad Tahir (HITEC University)
Conference: IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications
Citations: N/A
Is Blockchain Overrated?
AS
Asif Raza Kazmi
AB
Abdul Rauf
Conference: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC)
Citations: N/A
On generating algebraic equations for A5-type key stream generator
Conference: Lecture Notes in Electrical Engineering
Citations: N/A
A Compact S-Box Design for SMS4 Block Cipher
IM
Imran Abbasi
Conference: International Conference on Intelligent Robotics, Automations, Telecommunication Facilities, and Applications, IRoA
Citations: N/A
On the security of LBlock against the cube attack and side channel cube attack
SA
Saad Islam
AD
Adnan Rashdi
Conference: 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense
Citations: N/A
Smart Secure USB SSU-256
MU
Muhammad Ehsan ul Haq
ZE
Zeeshan Ali
MU
Muhammad Taimoor Ali
RU
Ruqiya Fazal
Conference: ICGS3 2021 : 13th International Conference on Global Security, Safety & Sustainability
Citations: N/A
No IP records found for this faculty member
No training records found for this faculty member
0
Total Supervisions
0
PhD Supervisions
0
MS Supervisions
Loading...

Loading PhD supervisions...

Loading...

Loading MS supervisions...