CYBERSECURITY AT NUST
NUST TEAM MEMBERS
Human Factors and Cybersecurity Research at NUST
Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices - A review
Over the last few years, healthcare administrations have been digitizing their provision of care that led to an increased number of networked medical devices and…
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as controlling and monitoring of the connected smart…
Mitigating service-oriented attacks using context-based trust for smart cities in IoT networks
Smart City technology is an attempt to improve the quality of life of its citizens by providing promising smart solutions for multiple applications. These applications…
Forensic analysis of image deletion applications
With the increased use of smartphones over the years, an immense evolution in camera technology and image enhancement applications has been However, this associates significantly…
Forensic analysis of Tor browser: a case study for privacy and anonymity on the web
Web browsers are among the most commonly used applications to access the web from any platform nowadays. With recent digital incidents involving breach of data, users are becoming…
How to include users in the design and development of cyberinfrastructures?
Cyberinfrastructures have reached their production level as far as their capability to serve researchers and connect big data is concerned. However, users face difficulties while they…
A software to capture mental models
Research shows that people construct mental models of concepts, situations and things, thus the theory of mental models is a well-established phenomenon in science. While people are given…