Machine Learning and Deep Learning Based Model for the Detection of Rootkits Using Memory Analysis
September 27, 2023
Basirah Noor, Sana Qadir,
Applied Sciences - Volume: 13, Issue: 19, Article Number:10730
An Evaluation Framework For Digital Image Forensics Tools
October 27, 2022
Zainab Khalid, Sana Qadir,
Journal of Digital Forensics Security and Law - Volume 17, Article Number 4
Forensic Analysis of Tor Browser on Windows 10 and Android 10 Operating Systems
October 22, 2021
Muhammad Raheel Arshad, Mehdi Hussain , Hasan Tahir , Sana Qadir , Faraz Iqbal Ahmed Memon, Yousra Javed,
IEEE Access - Volume 9, Pages 141273-141294
Analyzing and improving the performance and security of the Cryptographically Generated Address algorithm for Mobile IPv6 networks
September 30, 2015
Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb,
International Journal of Network Security - Volume 17(5), Pages 535-547.
An Investigation of the Merkle Signature Scheme for use in CGA Signatures
May 31, 2015
Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb,
International Journal of Network Security - Volume 17(3), Pages 311-321
Cryptographically Generated Addresses (CGAs): a survey and an analysis of performance for use in mobile environment
February 28, 2011
Sana Qadir, Mohammad Umar Siddiqi,
International Journal of Computer Science and Network Security - Volume 11(2), Pages 24-31
Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection
March 30, 2009
Sana Qadir, Mohammad Umar Siddiqi,
International Journal of Computer Science and Network Security - Volume 9(3), Pages 40-49