The University of Karachi holds a unique position in the country's educational system. As a respected research and reaching institution, it is committed to intellectual leadership, and to excellence in both developing knowledge and conveying that knowledge to its students. The University of Karachi meets the commitments to preserve knowledge through its instructional and research programs for higher level education.
The Department of Computer Science, University of Karachi, was established by a resolution of Academic Council in its meeting, held on November 27. 1984, and it began functioning in the academic year 1985-86 by offering a Degree Program in Master of Computer Science (MCS) and become one of first institutions in Karachi imparting education in Computer Science and Technology. The Department also offers evening program leading to Post Graduate Diploma (PGD) in Computer & Information Sciences. In the year 1995; Department started MCS evening program, on self-finance basis, to cater the growing demand of professionally skilled manpower in the field of Computer Science.
To further strengthen the discipline of Computer Science by producing high quality pro with sound fundamental knowledge. the department has started in the year 1996 and 2001 BS (Computer Science) in the morning and evening, a four year degree program leading to MS (Computer Science), a two year program after completing the BS. MS programs leads to PhD (Computer Science) program. The University of Karachi has excellent supporting faculty in the subjects of Mathematics, Statistics, Physics and other allied subjects for teaching these courses at BS (Computer Science) level. The first batch of BS (Computer Science) of the morning program passed in 1999.
The Department of Computer Science offers a wide range of courses at various levels. The purpose of these courses is to provide opportunities for advanced studies and research in the field of Computer Science and information Technology and related fields, and also to produce highly skilled computer personnel to cater the need of Computer professionals in the country and abroad. The Department maintains high standard of education through continuous assessment and with periodic tests, quizzes, seminars and field projects. The Department maintains close link with professional organizations at national and international levels, to enhance professional and academic standard of the faculty and as well as of the students.
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
The ICISCT 2020 event aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of INFORMATION SCIENCE and COMMUNICATION TECHNOLOGY. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of INFORMATION SCIENCE and COMMUNICATION TECHNOLOGY.
Recently the demand for Urban Areal Mobility (UAM) has skyrocketed. It envisions, connected, electric UAM Vehicles. UAM-Vehicles will operate in city center, suburban and rural regions to enhance passenger transportations and improve package delivery services. UAM-Vehicles will employ distributed control systems to optimize the UAM-Vehicles’ weight and several other systems. Communication Systems will play a vital role as they will not only provide the connectivity between a UAM-Vehicle and the ground network, but also among the components of distribution control systems. Thus UAM Vehicles demand a high level of cybersecurity for its internal and external communication channels. This talk focuses on the safe operation of not only today’s but future UAM-Vehicles. The talk is divided into four sections. Section 1 sets the stage by defining UAM system and its evolution, section 2 provides insight into Cyber Security landscape, including how security evolved into cybersecurity, and why security is such a big concern for UAM-Vehicles, section 3 provides cyberattack vectors, and section 4 possible types of attacks. T he talk will provide food for thought on how to explore innovative techniques and conduct Cyber Security related research. As such, it will be beneficial for the government policy makers, industry leaders, decision makers, corporate and academic researchers, professors, and students.
Dr. Raziq Yaqub is an Associate Professor in the Department of Electrical Engineering and Computer Science, Alabama A&M University (AAMU), USA. He earned a Ph.D. in Wireless Communication from Keio University, Japan, and an MBA in Marketing from Fairleigh Dickenson University, New Jersey, USA. He is an inventor of numerous technologies in Cybersecurity of Financial Technologies and Air Vehicles, Wireless Communications, Smart Grid, and Connected Electric Vehicles. He filed more than 50 patents. In 2009, he received Innovator Award and in 2014, “Inventor of the Year Award” both from the Governor of the State of New Jersey, USA, and thus he got inducted in Inventors Hall of Fame, New Jersey. In 2019, he received an award of “Excellence in Scholarship and Research” from the President, AAMU, an award of “Innovator Young Faculty” from the Dean, CETPS, Alabama A&M University, and an award of “Outstanding Educator” from IEEE. He remained an Executive Director of Toshiba America Research, New Jersey, USA, to lead 4G/LTE, Department head of NIKSUN University, Princeton, New Jersey, to lead Cybersecurity, and Director of Global R&D of Tecvox, Huntsville, AL, USA, to lead wireless charger and media hubs for the automotive industry. He also remained Sr. Consultant to the State of New Jersey, a spokesperson of Department of Homeland Security, in 3GPP on behalf USA”, an invited Researcher in NASA Research Center, Cleveland, Ohio, an inventor for Wells Fargo, and an Associate Professor at the University of Tennessee, Chattanooga. He also remained Chairman Academic Standards Committee, Chairman, and contributor in standards organizations such as 3GPP, IEEE, WiMAX, MWIF, OMA, Chair IEEE Membership Development, Vice Chairman of IEEE Southeast Conference 2019 that was attended by 1100 attendees, organizer of numerous international conferences, Invited/Keynote speaker/Panel Moderator/Resource Person in international events. He is a Senior Member of IEEE.
Analysis of social networks is, used to understand the behavior of nodes. Analysis of social network (SN) is quite challenging, because it is a multi-dimensional task due to multi-model & multi-link problem. Typically, graph theory measures like degree centrality; between-ness and closeness, centralities are frequently being applied to determine a node’s importance. The nice thing is that they are quite useful and history tells us that these measures have successfully being applied and obviously delivered the expected results. However, the problem of analysis becomes difficult as we implement this on Criminal, Terrorist and Covert Networks because some of these networks are modelled as leader & follower like construction. Therefore, it is possible mathematically, for these networks to determine individually the probability that can determine its importance. In this presentation we apply Bayes Probability Theory to calculate entropy of each node, so that we can report the vulnerability are strength of a given network.
Dr. D. M. Akbar Hussain is working as an associate professor in the department of Energy Technology, Aalborg University Denmark. He holds a PhD degree in Control Engineering from the Faculty of Engineering and Applied Sciences (EAPS), University of Sussex ENGLAND, more specifically, in the field of state estimation / Tracking and its implementation on multi-processor systems. The main focus of his research is related with computer and control engineering. He has made contributions in several energy related areas for example; PV integration with grid and security issues related with grid communication network, energy efficient hardware design and design of control to get maximum power from a wind turbine. He has the experience of working in three continents (ASIA, EUROPE and NORTH AMERICA) with different cultural heritage and feels proud in adapting to these environments adequately. He has multi-discipline/cross disciplined ability in teaching and he has have been teaching both core computer science and computer engineering subjects, for example Computer Architecture, Micro-controller Programming, Compiler Construction, Operating Systems, Software Engineering, Digital Signal Processing, Real Time and Embedded System Programming, Databases and Engineering Management. He is chief editor of a Springer Book CCIS series published in November 2008, 2013; he is also author of a contributory chapter in a book “Parallel Processing in Control System Environment, published by Prentice Hall UK, 1993, edited by Eric Rogers. He has over 100 publications in various fields of his interest and expertise which are published in refereed journals, Springer books and conference papers. He has been the Chief Editor of Journal of Software Engineering, Associate Editor of International Journal on Computer Engineering and Information Technology (IJCEIT), Editor of Advances in Computer Science and IT, Editor of International Journal of Computer Science and Software Technology (IJCSST) Editor Board Member of International Journal of Multidisciplinary Sciences and Engineering (IJMSE), Regional Editor for Journal of Computing & Applications, Editorial Board Member for ACRS International Journal on computing & ACRS Journal on Mathematics and Computer Science and Member of International Committee for IMECS. He has also reviewed books on filtering, management, computer science and actively involved in reviewing conference papers related with his research. He is external examiner, chairman of the evaluation committee and coordinator for over 30 PhD examinations. He is member of the E-study board of Aalborg University for many years which governs the education in electronics and computer engineering. He is coordinator for 3 different semesters, currently and in the past he has been active member of the department in connection with coordination, supervision, administration and curriculum review. He has formally obtained a certificate in management from the University of Toronto, CANADA, Adjunktpædagogikum ved Aalborg Universitet (University Pedagogy for Assistant Professors). He is the chair and one of the organizer for the series of these conferences http://www.icgcet.org/ , http://www.rtcse.org/ & http://icosat.org/ showcased in different parts of the world.
This research targets Network Security – an essential area of Computer Science, which has gained increasingly attention of researchers due to concerns and potential damages in various organizations. More specifically, it deals with Insider Threat that is more harmful than the External Threat. Software Agents have been used as a technology in this research that autonomously roam around network. Software Agents are diversified research area that covers Artificial Intelligence, Programming Abstraction and Distributed Computing.
During literature surveys of various agent platforms it was identified that FIPA and MASIF standards have many limitations and missing features like Security, Distributed events and Multicasting that are not well focused at all by both standards. The combination of both or another standard is proposed having all missing features necessary for a true Agent System.
Various milestones were set and bottom-up approach was used to achieve the overall task. A Vulnerability Assessment model based on Mobile Agents has been developed where practical results are showing that the Insider threat is more critical than the External threat. Many practical issues have been identified and appropriate solutions have been proposed. Agent platform-dependent and platform-independent approaches were used to achieve the task. The results of both approaches were qualitatively compared and a standardized agent framework was proposed.
Considering profiling as the major source of identifying Insider Threat, an Agent-based Profiling model has been developed that considers an individual’s personality profile to identify real personality in the cyberspace. Major indicators involving profile generation and personality identification have been argued and implemented. The model is implemented with JADE and .Net framework. Hence, the proposed solution of Profiling for Insider Threat will be integrated on the top of Agent technology to autonomously monitor and predict human behavior. As human behavior is difficult to predict, therefore monitoring through autonomous and intelligent behavior of agents is the key solution. The ACENET (Agent Collaborative Environment based on .NET), a FIPA-compliant agent framework for profiling, has been developed to achieve the task. The proposed Profiling Agent Framework allows identifying anomalies in user activities either online or offline. Online monitoring is carried out in real time that is used to catch the sensitive activity started by user against organization’s policy. Offline monitoring is carried out on daily, weekly and monthly basis and is based on the analysis of specified factors.
This dissertation focuses on high level security measures through profiling based agent system to detect the activities user is performing in the organization. The model also checks out that whether user-activities are in accordance with organization’s policy or not? The major developments are: Monitoring behavior either suspicious or normal, Certifying user’s authenticity to use resources, Checking limitations of the users, Monitoring that user comes into view from the assigned location or not, Analyzing the level of the destruction caused by user, etc.
The ACENET scores every user of the organization and maintains a detailed profile of whether a legitimate user is doing any malicious activity. ACENET is adaptable to deploy in any organization where agents are designed as service on the top layers of the model. The threats have been categorized in various classes and for each category, agents have been designed. Communication among agents takes place by message passing at upper level whereas internally socket based communication is underway. Considering privacy as a major concern, a matrix or grid of the trust levels ‘trust grid’ is designed where diverse access privileges are assigned to different level of the users to resolve conflict between users and organizations. The professional issues regarding privacy and activities monitoring, were studied and it is proposed that the organization may announce in advance what can be monitored and what cannot be monitored though a user monitoring policy.
The framework, ACENET, was tested on real data, obtained from the organizations, and the performance has also been evaluated on the basis of specified parameters. Framework’s results were analyzed to match with the targeted objectives. Finally future directions for the extension of the framework have been presented.
Dr Ghulam Ali Mallah is Professor & Chairman of Computer Science at Shah Abdul Latif University, Khairpur. He is HEC approved PhD Supervisor & ICT Master Trainer/Resource Person. Dr Mallah did his Master in Computer Science from Quaid-i-Azam University Islamabad in 1995, PhD in 2009 on HEC scholarship and Post-doctorate from Glasgow University through British Council’s Fellowship. He has about 40 journal research articles on his credit. He is supervising around 15 MS/PhD scholars. He presented his research work in many countries such as Iran, China, Malaysia, Japan, United Kingdom, Thailand, Greece, Italy, Malta & Pakistan. He has organized five International Conferences of Computer & Emerging Technologies at SALU Khairpur. He has received “Ideal ICT Excellence Award 2012” in the category of “IT Education”.
Dr. Shoab Ahmed Khan is Professor in college of Electrical & Mechanical Engineering, National University of Sciences & Technology. He is an inventor of 5 awarded US patents and has 260+ international publications. His book on Digital Design is published by John Wiley & Sons and is being followed in national and international universities. Dr. Shoab Ahmed Khan has more than 22 years of industrial experience in companies in USA and Pakistan. He has been awarded Tamgh-e-Imtiaz (Civil), National Education Award 2001 and NCR National Excellence Award in Engineering Education. He is the Chairman of Pakistan Association of Software Houses (P@SHA) and is a member of Board of Governance of many entities in the Ministry of IT and Commerce. He has also served as member of National Computing Council and National Curriculum Review Committee.
Industrial Revolution 4.0 (IR 4.0) is a newly terminology that touch on the revolution in industry. The term focused on the current trend of automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things, cloud computing and cognitive computing. Industry 4.0 is commonly referred to as the fourth industrial revolution. One of the building block that support towards the IR 4.0 is an Internet-of-things which one of the main concern application that supports cyber-physical system. The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data and creating prospects for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. Therefore, this talk will touch on the IR4.0 brief concepts and the IoT and discussed some recent projects on IoT done at our lab.
Mohd Helmy Abd Wahab is a senior lecturer and former head of Multimedia Engineering Lab at the Department of Computer Engineering, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia (UTHM). He is currently an associate researcher in IoT focused group from UTHM and associate research at Green ICT group at Unimap. He also an Industrial Advisory Panel for Diploma Program for Polytechnic Seberang Perai, Penang (2018 – 2020). He has actively involved in many academic activities such as being a keynote/invited speaker ICRITO2015, ICRITO2016, ICECC2016, FTNCT2018, several research grants, won several medals in research and innovation showcases and awarded several publication award and teaching awards. He has authored and co-authored 2 books in database system (2013) and this book received consolation prize by Society of Science and Mathematics Malaysia (PESAMA) in 2014 and WAP application (2009), published several both local and international book chapters (11), technical papers in conferences and peer-reviewed journals (>100) papers. He also involve in publishing articles in periodicals such as newspaper (Utusan Malaysia) and national magazine (Dewan Kosmik). He also served as guest editor for Special Issue in Wireless and Mobile Networks in International Journal of Advanced Computer Science and Applications (2011) and as Deputy Editor in Chief for Int. Journal of Software Engineering and Computing since 2009 and scholarly contributed as committee for conferences, editorial team and manuscript reviewers and also invited to be session chair in conferences. Latest, he also invited to be Advisory Committee for ICACM 2016 at Pune, India, and Track Chair for IEOM 2016 in Kuala Lumpur.
The Network Functions Virtualization (NFV) offers a new way to design, develop and deploy network functions in data center networks, clouds or on Customer Premises Equipment (CPE). Network functions like Network Address Translation (NAT), caches, firewalls, DNS, DHCP etc. can be implemented as a software instead of implementing on dedicated hardware middle-boxes like servers, switches, and routers. Large data-centers such as Google’s data-center have 2.5 million servers, it is difficult to guarantee network functions performance. An important performance parameter is to check the congestion caused by load of links to schedule internal NF or network state updates or competition for limited resource for scheduling the updates which can lead to operator’s performance degradation and service level agreement (SLA) violations. In this talk, I will explain the proposed algorithm to control congestion caused by load of links and competition for limited resources for better VNF’s performance. Further, I will discuss the mechanism for elastic VNFs upon node joining/leaving and resilient VNFs upon failure of any network node on which VNFs are hosted.
Dr. Ahmad Waqas is an Associate Professor in the Department of Computer Science. He Completed his Ph.D. at International Islamic University Malaysia. His teaching and research interests include Distributed Systems, Cloud Computing, Network Design, Security and Management, Algorithms and Data Structures and Theoretical computer science. Dr. Ahmad Waqas has published numerous research articles in renowned journals and conferences proceedings including WOS, Scopus, and IEEE. He is the Chief Editor of Sukkur IBA Journal of Computing and Mathematical Sciences (SJCMS). He also organized the 2017 International Conference on Computing and Mathematical Sciences and served as General Co-Chair. He has been serving as Editorial Board Member, Program Committee Member and Technical Program Committee Member of many journals and international conferences.
UBIT (UoK) Karachi – 75270, Pakistan
993261300-7 Ext: 2462
icisct@uok.edu.pk
msakhan@uok.edu.pk