Entity

Time filter

Source Type

Islamabad, Pakistan

Ahmad M.B.,Center for Advanced Studies in Engineering | Saeed-Ur-Rehman,Center for Advanced Studies in Engineering | Akram A.,University of Engineering & Technology, Taxila | Asif M.,Muhammad Ali Jinnah University
Proceedings - 12th International Conference on Frontiers of Information Technology, FIT 2014 | Year: 2014

The problem of insider threats is not new to organizations and research community. Organization cannot afford any kinds of attacks on their confidential information and resources either from insiders or out-siders. The damage done by insiders is more severe than that of external attackers due to their knowledge about the system and potential targets. It has been observed by studying previous case studies of insider attacks that insiders usually get involve in some unusual or suspicious activities prior to launching actual attacks. So observing these kinds of activities and taking proper actions in time may help to avoid such kinds of attacks. In this paper a risk assessment methodology has been presented to compute the threat levels of insiders. Appropriate actions may be taken by knowing about the threat level of each user in order to avoid actual attacks. The methodology not only incorporates technical measures but also some psychological indicators to detect insiders. The difference of this methodology from the previous ones is that it provides a practical way of quantization of risks for insider threats. The methodology is simulated in a test network against different scenarios and results showed that it efficiently categorized users according to their threat level. So it provides a base to deploy non uniform security policies among the users thus reducing overall processing overheads. © 2014 IEEE.


Khan C.,Institute of Management Sciences | Anwar S.,Institute of Management Sciences | Bashir S.,Muhammad Ali Jinnah University | Rauf A.,Imam Muhammad ibn Saud Islamic University | Amin A.,Institute of Management Sciences
Journal of Intelligent and Fuzzy Systems | Year: 2015

Suitable site selection for a specific purpose is a crucial activity, and of the greatest importance to a project manager. Several methods have been proposed by the research community for effective site selection, but all proposed methods incur high costs. This study explores the combination of a rough set theory approach (RSTA) with Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for suitable site selection for food distribution. This method provides a set of rules to determine different sites, which ultimately can help management develop strategies for suitable site selection. A set of rules for suitable site selection are derived from information related to a practical case, Pakistan Red Crescent Society (PRCS), to demonstrate the prediction ability of RSTA. The results clearly demonstrate that the RSTA model can be a valuable tool for site identification. Rough set theory also assists management in making appropriate decisions based on their objectives while avoiding unnecessary costs. However, while RSTA provides rules to determine the best sites for food distribution, it does not pinpoint the best sites for food distribution. To be more precise and accurate, this work is extended to another multi-criteria decision-making technique solution: the TOPSIS method. By using this method, this study provides the best top priority site for food distribution of PRCS. © 2015 - IOS Press and the authors. All rights reserved.


Ajab M.,Muhammad Ali Jinnah University | Taj I.A.,Muhammad Ali Jinnah University | Khan N.A.,Federal Urdu University
Metrology and Measurement Systems | Year: 2012

Gabor Wigner Transform (GWT) is a composition of two time-frequency planes (Gabor Transform (GT) and Wigner Distribution (WD)), and hence GWT takes the advantages of both transforms (high resolution of WD and cross-terms free GT). In multi-component signal analysis where GWT fails to extract auto-components, the marriage of signal processing and image processing techniques proved their potential to extract autocomponents. The proposed algorithm maintained the resolution of auto-components. This work also shows that the Fractional Fourier Transform (FRFT) domain is a powerful tool for signal analysis. Performance analysis of modified fractional GWT reveals that it provides a solution of cross-terms of WD and blurring of GT. © 2012 Polish Academy of Sciences.


Bin Ahmad M.,Center for Advanced Studies in Engineering | Akram A.,University of Engineering and Technology | Asif M.,Muhammad Ali Jinnah University | Ur-Rehman S.,Center for Advanced Studies in Engineering
Mathematical Problems in Engineering | Year: 2014

Insider threats detection problem has always been one of the most difficult challenges for organizations and research community. Effective behavioral categorization of users plays a vital role for the success of any detection mechanisms. It also helps to reduce false alarms in case of insider threats. In order to achieve this, a fuzzy classifier has been implemented along with genetic algorithm (GA) to enhance the efficiency of a fuzzy classifier. It also enhances the functionality of all other modules to achieve better results in terms of false alarms. A scenario driven approach along with mathematical evaluation verifies the effectiveness of the modified framework. It has been tested for the enterprises having critical nature of business. Other organizations can adopt it in accordance with their specific nature of business, need, and operational processes. The results prove that accurate classification and detection of users were achieved by adopting the modified framework which in turn minimizes false alarms. © 2014 Maaz Bin Ahmad et al.


Ali Khan N.,Muhammad Ali Jinnah University | Ahmad Taj I.,Muhammad Ali Jinnah University | Noman Jaffri M.,Federal Urdu University
Signal Processing | Year: 2011

An efficient method based on 2D signal processing techniques and fractional Fourier transform is presented to suppress interference terms of Wigner distribution (WD). The proposed technique computes Gabor transform (GT) of a multi-component signal to obtain a blurred timefrequency (tf) image. Signal components in GT image are segmented using connected component segmentation and are filtered out using precise application of fractional Fourier transform. A crisp tf representation is then obtained by computing the sum of products of WD and GT of the isolated signal components. The efficacy of the proposed technique is demonstrated using examples of synthetic signals and real-life bat signals. Proposed scheme gives satisfactory performance even when cross-terms of WD overlap auto-terms and computational cost analysis shows that it is more efficient than recent interference suppression techniques of comparable performance. Moreover, the proposed technique does not require any prior info regarding the nature of signal. © 2010 Elsevier B.V. All rights reserved.

Discover hidden collaborations