Mehreen Afzal
Orcid: 0000-0002-2179-9259
  According to our database1,
  Mehreen Afzal
  authored at least 26 papers
  between 2007 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
SLF-ADM: Securing Linux frontiers: Advanced persistent threat (APT) detection using machine learning.
    
  
    Neural Comput. Appl., July, 2025
    
  
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices.
    
  
    Clust. Comput., April, 2025
    
  
  2024
    J. Inf. Secur. Appl., February, 2024
    
  
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems.
    
  
    Internet Things, 2024
    
  
  2023
    Neural Comput. Appl., September, 2023
    
  
A systematic threat analysis and defense strategies for the metaverse and extended reality systems.
    
  
    Comput. Secur., May, 2023
    
  
  2022
    Inf. Comput. Secur., 2022
    
  
    IEEE Access, 2022
    
  
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis.
    
  
    Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
    
  
  2021
    IEEE Access, 2021
    
  
    IEEE Access, 2021
    
  
    Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
    
  
  2020
On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages.
    
  
    Future Gener. Comput. Syst., 2020
    
  
    IEEE Access, 2020
    
  
  2018
    Future Gener. Comput. Syst., 2018
    
  
  2017
  2014
    Proceedings of the 5th International Conference on Information, 2014
    
  
  2013
    Proceedings of the Security Engineering and Intelligence Informatics, 2013
    
  
  2011
  2010
    Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
    
  
  2009
    Int. J. Electron. Secur. Digit. Forensics, 2009
    
  
  2008
    Int. J. Electron. Secur. Digit. Forensics, 2008
    
  
    Proceedings of the Information and Communications Security, 10th International Conference, 2008
    
  
  2007
Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator.
  
    Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
    
  
A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers.
  
    Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007