Follow
Narmeen Shafqat
Narmeen Shafqat
Northeastern University
Verified email at northeastern.edu
Title
Cited by
Cited by
Year
Comparative analysis of various national cyber security strategies
N Shafqat, A Masood
International Journal of Computer Science and Information Security 14 (1 …, 2016
1032016
Forensic investigation of user’s web activity on Google Chrome using various forensic tools
N Shafqat
IJCSNS Int. J. Comput. Sci. Netw. Secur 16 (9), 123-132, 2016
282016
Integrated security, safety, and privacy risk assessment framework for medical devices
T Yaqoob, H Abbas, N Shafqat
IEEE journal of biomedical and health informatics 24 (6), 1752-1761, 2019
252019
Framework for calculating return on security investment (ROSI) for security-oriented organizations
T Yaqoob, A Arshad, H Abbas, MF Amjad, N Shafqat
Future Generation Computer Systems 95, 754-763, 2019
222019
Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach
SBA Khaliq, MF Amjad, H Abbas, N Shafqat, H Afzal
Telecommunication Systems 70, 123-140, 2019
152019
A malware evasion technique for auditing android anti-malware solutions
S Mirza, H Abbas, WB Shahid, N Shafqat, M Fugini, Z Iqbal, Z Muhammad
2021 IEEE 30th International Conference on Enabling Technologies …, 2021
122021
Zleaks: Passive inference attacks on Zigbee based smart homes
N Shafqat, DJ Dubois, D Choffnes, A Schulman, D Bharadia, ...
International Conference on Applied Cryptography and Network Security, 105-125, 2022
102022
A survey on common criteria (CC) evaluating schemes for security assessment of IT products
M Fatima, H Abbas, T Yaqoob, N Shafqat, Z Ahmad, R Zeeshan, ...
PeerJ Computer Science 7, e701, 2021
102021
Feasibility analysis for deploying national healthcare information system (NHIS) for Pakistan
T Yaqoob, F Mir, H Abbas, WB Shahid, N Shafqat, MF Amjad
2017 IEEE 19th International Conference on e-Health Networking, Applications …, 2017
82017
Security Assessment and Evaluation of VPNs: A Comprehensive Survey
H Abbas, N Emmanuel, MF Amjad, T Yaqoob, M Atiquzzaman, Z Iqbal, ...
ACM Computing Surveys 55 (13s), 1-47, 2023
52023
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
N Ashraf, A Masood, H Abbas, R Latif, N Shafqat
Telecommunication Systems 74, 379-403, 2020
42020
A framework to determine applications’ authenticity
RZ Naeem, H Abbas, N Shafqat, K Saleem, W Iqbal
Procedia Computer Science 155, 268-275, 2019
32019
Analysis of windows OS’s fragmented file carving techniques: A systematic literature review
NUA Ali, W Iqbal, N Shafqat
16th International Conference on Information Technology-New Generations …, 2019
32019
Forensic analysis of linkedin’s desktop application on windows 10 OS
S Bashir, H Abbas, N Shafqat, W Iqbal, K Saleem
16th International Conference on Information Technology-New Generations …, 2019
32019
Track You: A Deep Dive into Safety Alerts for Apple AirTags
N Shafqat, N Gerzon, M Van Nortwick, V Sun, A Mislove, A Ranganathan
Proceedings on Privacy Enhancing Technologies 4, 132-148, 2023
22023
Forensic analysis of image deletion applications
M Fatima, H Abbas, W Iqbal, N Shafqat
Multimedia Tools and Applications 81 (14), 19559-19586, 2022
22022
Crowdsourcing Cybercrimes through Online Resources
N Amir, R Latif, N Shafqat, S Latif
2020 13th International Conference on Developments in eSystems Engineering …, 2020
22020
Experience report on the challenges and opportunities in securing smartphones against zero-click attacks
N Shafqat, C Topcuoglu, E Kirda, A Ranganathan
arXiv preprint arXiv:2211.03015, 2022
12022
Profiling vulnerabilities threatening dual persona in Android framework
K Siddiquie, N Shafqat, A Masood, H Abbas, W bin Shahid
2019 International Conference on Advances in the Emerging Computing …, 2020
12020
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks
N Shafqat, C Topcuoglu, E Kirda, A Ranganathan
2024
The system can't perform the operation now. Try again later.
Articles 1–20