Conference & Journal Papers

  1. S. Shaheen, M. Yousaf, M. Jalil, "A Smart Card Oriented Secure Electronic Voting Machine Built on NTRU", International Arab Journal of Information Technology, Volume 17, Issue 3, 2020.
  2. Z. Ashraf, A. Sohail, M. Yousaf, "Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine", International Journal of Computer Network and Information Security, MECS Press, Volume 11, Issue 12, Pages 1-9, DOI: 10.5815/ijcnis.2019.12.01, December 12, 2019.
  3. Humaira Afzal, Muhammad Rafiq Mufti, Irfan Awan, Muhammad Yousaf, "Performance Analysis of Radio Spectrum for Cognitive Radio Wireless Networks using Discrete Time Markov Chain", Elsevier Journal of Systems and Software, ISSN: 0164-1212, Volume 151, May 2019, Pages 1-7, DOI: https://doi.org/10.1016/j.jss.2019.01.053, 2019. (Link)
  4. Zeeshan Ashraf, Muhammad Yousaf, "Optimized Convergence of OSPFv3 in Large Scale Hybrid IPv4-IPv6 Network", In Proceedings of the 14th IEEE International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, eISBN: 978-1-5386-8143-5, DOI: 10.1109/ICET.2018.8603633, November 21-22, 2018. (Link)
  5. Muhammad Zeeshan Sabir, Muhammad Yousaf, "Design and Implementation of an End-to-End Web based Trusted Email System", in Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2018), Leuven, Belgium, Elsevier Procedia Computer Science, Volume 141, Pages 231-238, DOI: https://doi.org/10.1016/j.procs.2018.10.176, November 5-8, 2018. (Link)
  6. Syed Muhammad Sajjad, Muhammad Yousaf, "UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets", in Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2018), eISBN: 978-1-5386-4388-4, Pages 1547-1550, DOI: 10.1109/TrustCom/BigDataSE.2018.00221, August 1-3, 2018, New York, USA. (Link)
  7. Tayyaba Zeb, Muhammad Yousaf, Humaira Afzal, and Muhammad Rafiq Mufti, "A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment", IEEE China Communications Journal, ISSN: 1673-5447, Volume 15, Issue 8, Pages 126-140, DOI: 10.1109/CC.2018.8438279, August 2018. (Link)
  8. Tariq Saraj, Muhammad Yousaf, "Design and Implementation of a Lightweight Privacy Extension of DNSSEC Protocol", In Proceedings of the 13th IEEE International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, eISBN: 978-1-5386-2260-5, DOI: 10.1109/ICET.2017.8281726, December 27-28, 2017. (Link)
  9. Safdar Hussain Shaheen, Muhammad Yousaf, Mudassar Jalil, "Temper Proof Data Distribution for Universal Verifiability and Accuracy in Electoral Process using Blockchain", In Proceedings of the 13th IEEE International Conference on Emerging Technologies (ICET), Islamabad, Pakistan, eISBN: 978-1-5386-2260-5, DOI: 10.1109/ICET.2017.8281747, December 27-28, 2017. (Link)
  10. H. Afzal, M. R. Mufti, M. Yousaf, W. Aslam, "Modeling of Collision Probability for Maximum Backoff Stages during Association Process in Wireless Regional Area Networks", Sindh University Research Journal-SURJ (Science Series), ISSN 1813-1743, Volume 49, Issue 3, Pages 659-664, September 22, 2017.
  11. Zeeshan Ashraf, Muhammad Yousaf, "Optimized Routing Information Exchange in Hybrid IPv4-IPv6 Network using OSPFv3 & EIGRPv6", International Journal of Advanced Computer Science and Applications, ISSN 2156-5570, Volume 8, Issue 4, Pages 220-229, May 2017.
  12. Syed Muhammad Sajjad, Muhammad Yousaf, "Security Analysis of Internet of Things Adaptation Layer", Science International Journal, Volume 28, Issue 4, Pages 3311-3317, July 2016.
  13. Syed Muhammad Sajjad, Muhammad Yousaf, "NeTMids: Neighbor Node Trust Management Based Anomaly Intrusion Detection System for Wireless Sensor Networks", International Journal of Computer Science and Information Security, Volume 14, Issue 7, Pages 176-183, July 2016.
  14. Zeeshan Ashraf, Muhammad Yousaf, "Secure Inter-VLAN IPv6 Routing: Implementation & Evaluation", Science International Journal, Volume 28, Issue 3, Pages 3007-3014, June 2016.
  15. Safdar Hussain Shaheen, Muhammad Yousaf, "Source Specific Centralized Secure Multicast Scheme based on IPSec", In Proceedings of the IEEE Conference on Information Assurance and Cyber Security (CIACS-2015), Rawalpindi, Pakistan, December 18, 2015. (Link)
  16. Tariq Saraj, Abdul hanan, Muhammad Sajad Akbar, Muhammad Yousaf, Amir Qayyum, Mudassir Tufail, "IPv6 Tunneling Protocols: Mathematical and Testbed Setup Performance Analysis", In Proceedings of the IEEE Conference on Information Assurance and Cyber Security (CIACS-2015), Rawalpindi, December 18, 2015. (Link)
  17. Safdar Hussain Shaheen, Muhammad Yousaf, Muhammad Younas Majeed, "Comparative Analysis of Internet Key Exchange Protocols", In Proceedings of the 6th International Conference on Information and Communication Technologies (ICICT-2015), Karachi, Pakistan, December 12-13, 2015. (Link)
  18. Syed Muhammad Sajjad, Safdar Hussain Bouk, Muhammad Yousaf, "Neighbor Node Trust based Intrusion Detection System for WSN", In Proceedings of the 6th IEEE International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2015), Berlin, Germany, Elsevier Procedia Computer Science, Volume 63, Pages 183-188, DOI: 10.1016/j.procs.2015.08.331, September 27-30, 2015. (Link)
  19. Shazia Afzal, Umer Waqas, Mubeen Akhtar Mir, Muhammad Yousaf, "Statistical Analysis of Key Schedule Algorithms of Different Block Ciphers", Science International Journal, Volume 27, Issue 3, Pages 1835-1839, May 2015.
  20. Safdar Hussain Shaheen, Muhammad Yousaf, "Structure Analysis of DTLS and its use to secure multicast Communication", The 12th IEEE International Conference on Frontiers of Information Technology (FIT-2014), Islamabad, Pakistan, Pages 165-169, ISBN: 978-1-4799-7504-4, DOI: 10.1109/FIT.2014.39, December 17-19, 2014. (Link)
  21. Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf, "Generation of AES like S-boxes by Replacing Affine Matrix", The 12th IEEE International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, Pages 159-164, ISBN: 978-1-4799-7504-4, DOI: 10.1109/FIT.2014.38, December 17-19, 2014. (Link)
  22. Tayyaba Zeb, Abdul Ghafoor, Awais Shibli, Muhammad Yousaf, "A Secure Architecture for Inter-Cloud Virtual Machine Migration", The 10th International Conference on Security and Privacy in Communication Networks (SecureComm-2014), Beijing, China, Springer LNICST, Volume 152, ISBN: 978-3-319-23829-6, Pages 24-35, DOI: 10.1007/978-3-319-23829-6_2, September 24-26, 2014. (Link)
  23. Syed Muhammad Sajjad, Muhammad Yousaf, "Security Analysis of IEEE 802.15.4 MAC in the Context of Internet of Things (IoT)", In Proceedings of IEEE Conference on Information Assurance and Cyber Security (CIACS-2014), Rawalpindi, Pakistan, Pages 9-14, ISBN: 978-1-4799-5851-1, DOI: 10.1109/CIACS.2014.6861324, June 12-13, 2014. (Link)
  24. Tariq Saraj, Muhammad Yousaf, Sajjad Akbar, Amir Qayyum, Mudassir Tufail, "ISP Independent Architecture (IIA) for IPv6 Packet Traversing and Inter-connectivity over Hybrid (IPv4/IPv6) Internet", The 4th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS-2014) in conjunction with ANT-2014, Hasselt, Belgium, Elsevier Procedia Computer Science, Volume 32, Pages 973–978, DOI: 10.1016/j.procs.2014.05.520, June 2-5, 2014. (Link)
  25. Muhammad Sajjad Akbar, Muhammad Saleem Khan, Kishwer Abdul Khaliq, Amir Qayyum, Muhammad Yousaf, "Evaluation of IEEE 802.11n for Multimedia Application in VANET", The 4th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS-2014) in conjunction with ANT-2014, Hasselt, Belgium, Elsevier Procedia Computer Science, Volume 32, Pages 953–958, DOI: 10.1016/j.procs.2014.05.517, June 2-5, 2014. (Link)
  26. Sheneela Naz, Tariq Saraj, Muhammad Sajjad Akbar, Muhammad Yousaf, Amir Qayyum, Mudassir Tufail, "Performance Analysis of IPv6 QoS for Multimedia Applications Using Real Testbed", The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014), Hasselt, Belgium, Elsevier Procedia Computer Science, Volume 32, Pages 182-189, DOI: 10.1016/j.procs. 2014.05.413, June 2-5, 2014. (Link)
  27. Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum and Halabi. B. Hasbullah, "Performance Comparison of End-to-End Mobility Management Protocols for TCP", Elsevier Journal of Network and Computer Applications (JNCA), ISSN: 1084-8045, Volume 35, Issue 6, pp. 1657-1673, DOI: 10.1016/j.jnca.2012.05.002, November 2012. (Link)
  28. M. Yousaf, A. Qayyum and S. A. Malik, "An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation", Springer Wireless Personal Communications (WPC) Journal, ISSN: 0929-6212, Volume 66, Issue 1, pp. 57-79, DOI: 10.1007/s11277-011-0326-3, September 2012. (Link)
  29. Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Halabi B Hasbullah "Effectiveness of Multi-homing and Parallel Transmission during and after the Vertical Handover", In Proceedings of IEEE International Conference on Computer & Information Sciences (ICCIS 2012), World Congress on Engineering, Science & Technology (ESTCON 2012), Kuala Lumpur, Malaysia, Pages 625-629, ISBN: 978-1-4673-1937-9, DOI: 10.1109/ICCISci.2012.6297105, June 12-14, 2012. (Link)
  30. Sadaf Yasmin, Muhammad Yousaf, and Amir Qayyum, "Security Issues Related with DNS Dynamic Updates for Mobile Nodes: A Survey", In Proceedings of ACM International Conference on Frontiers of Information Technology (FIT-10), Islamabad, Pakistan, ISBN: 978-1-4503-0342-2, DOI: 10.1145/ 1943628.1943645, December 21-23, 2010. (Link)
  31. E. Elahi, M. Yousaf, A. Sheikh, M. M. Rehan, O. M. Chughtai, and A. Qayyum, "On the Implementation of End-to-End Mobility Management Framework (EMF)", In Proceedings of 6th IEEE International Conference on Wireless and Mobile Computing (WiMob 2010), Niagra Falls, Canada, Pages 458-465, ISBN: 978-1-4244-7743-2, DOI: 10.1109/WIMOB.2010.5645028, October 11-13, 2010. (Link)
  32. Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, and Shahzad A. Malik, "An Analysis of Service Disruption Time for TCP Applications using End-to-End Mobility Management Protocols", In Proceedings of 7th ACM International Conference on Advances in Mobile Computing & Multimedia (MoMM 2009, ERPAS), KL, Malaysia, Pages 360-364, ISBN: 978-1-60558-659-5, DOI: 10.1145/1821748.1821817, December 14-16, 2009. (Link)
  33. Hafiz Muhammad Omer Chughtai, Shahzad A. Malik, and Muhammad Yousaf, "Performance Evaluation of Transport Layer Protocols for Video Traffic over WiMAX", In Proceedings of 13th IEEE International Multitopic Conference 2009 (INMIC 2009), Islamabad, ISBN: 978-1-4244-4872-2, DOI: 10.1109/INMIC.2009.5383117, December 14–15, 2009. (Link)
  34. M. Yousaf, Sohail Bhatti, Maaz Rehan, A. Qayyum, and S. A. Malik, "An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH", In Proceedings of 2009 International Conference on Intelligent Computing (ICIC 2009), Ulsan, Korea, Springer-Verlag Lecture Notes in Computer Sciences (LNCS), Volume 5754/2009, Pages 413-422, Print ISBN: 978-3-642-04069-6, DOI: 10.1007/978-3-642-04070-2_47, September 16–19, 2009. (Link)
  35. Maaz Rehan, Muhammad Yousaf, Amir Qayyum, and Shahzad Malik, "A Crosslayer User Centric Vertical Handover Decision Approach based on MIH Local Triggers", In Proceedings of Second Joint IFIP Wireless and Mobile Networking Conference (WMNC’2009), Gdańsk, Poland, Springer Wireless and Mobile Networking series, Volume 308/2009, Pages 359-369, Print ISBN: 978-3-642-03840-2, DOI: 10.1007/978-3-642-03841-9_3, September 9-11, 2009. (Link)
  36. Shah, P.A. Yousaf, M. ,"End-to-end mobility management solutions for TCP: An analysis", In Proceedings of IEEE 11th International Conference on Computer and Information Technology (ICCIT 2008), Khulna, Bangladesh, Pages 696-701, ISBN: 978-1-4244-2135-0, DOI: 10.1109/ICCITECHN.2008.4803068, December 24-27, 2008. (Link)
  37. Yousaf, M. Qayyum, A. ,"On End-to-End Mobility Management in 4G Heterogeneous Wireless Networks", In Proceedings of IEEE International Networking and Communications Conference (INCC 2008), Lahore, Pakistan, Pages 118-123, ISBN: 978-1-4244-2151-0, DOI: 10.1109/INCC.2008.4562703, May 1-3, 2008. (Link)