Performance analysis of PSK based advanced modulation formats for free space optical communication system / Sannia Bibi, M. Iram Baig and Farhan Qamar -- Volatile kernel rootkit hidden process detection view (VKRHPDV) approach for detection of malware in cloud computing environments / Danish, Hinna Hafeez, Farrah Taj and Zaib un Nisa -- Privacy preserved federated learning with optimized differential privacy (FLODP) / Maria Iqbal, Asadullah Tariq, Muhammad Adnan, Irfan Ud Din, and Tariq Qayyum -- Cyber physical systems having nodes/layers with trustworthy data : a review / Muhammad Ejaz Ul Ghaffar, Muhammad Arif, Arfan Jaffar and Ahmed Hassan -- Analysis of device-to-device communication in IOT system / Usman Nawaz, Faisal Rehman, Kainat Azmat Ullah, Usman Ahmed Raza, Hanan Sharif, Furqan Rafique, Abid Ali, Masood Ashiq and Junaid Iqbal -- Design and implementation of an on-board system for a spider robot / Nasir Nauman, Hirra Mustafa, Abrar Ashraf and Hisham Khalil -- Revolutionizing underwater sensor networks : a novel routing approach for efficient data collection with atom-inspired design / Muhammad Ahmad Pasha, Fatima Ijaz, Aleema Imran and Ahmad Shaf -- Extending WSN lifetime with cluster head election / Noroze Fatima, Danish Shehzad, Ali Imran, Ahsan Imtiaz and M. Arif -- A Parametric analysis of routing protocols in wireless sensor networks / Sajjad Abbas, Danish Irfan, M. Arfan Jaffar, Syed Asad Ali Naqvi, Naveed Ali Khan Kaim Khani and Muhammad Yousaf -- Implementation of IoT and WSN technologies for health monitoring / Tehseen Mazhar, Muhammad Iqbal, Muhammad Iqbal, Yazeed Yasin Ghadi, Ateeq Ur Rehman and Waseem Abbasi -- A survey on approximate hardware accelerator for error-tolerant applications / Sahibzada M. Waqas, Muhammad Zakwan, Muhammad Ashraf, Ghadah Naif AlWakid and Mamoona Humayun -- Virtual memory management techniques / Hajira Noor, Hamayun Khan, Irfan Ud din, Muhammad Imran Tarq, Muhammad Nabeel Amin and Mehak Fatima -- A comprehensive survey on software defined networking (SDN) security / Nouman Mabood, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- Access control techniques for cloud computing : review and recommendations / Mannan Javed, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- A jurisprudence for Pakistan's digital forensic investigation framework regarding cybersecurity / Ehtisham Ul Haque and Waseem Abbasi -- LockPath : logic locking technique based on longest path constraint for hardware security / Muhammad Younas, Haroon Waris, Ahsan Iqbal, Waqar Ahmad, Muhammad Yasir Qadri and Arif Zafar -- A review of the various methods of communication used in ad hoc networks / Ahmed Hassan, Muhammad Arif, Arfan Jaffer and Muhammad Ejazulghaffar -- Authentication of user data for enhancing privacy in cloud computing using security algorithms / Rashid Ali, Hamayun Khan, Muhammad Waleed Arif, Muhammad Imran Tariq, Irfan Ud din, Amna Afzal and Muhammad Azam Khan -- Big data issues in mobile cloud computing / Muhammad Jameel, Muhammad Waqas Nasir, Moodser Hussain, Naseer Ahmad, Mubasher Khalid, Taimoor Hassan Jabbar and Muhammad Waseem -- A comprehensive review on the role of blockchain in reinforcing security for industrial IoT / Shehla Afzal, Muhammad Ameer Hamza, Danish Shehzad, Irfan Ud Din, Muhammad Arif and Arfan Arshad -- Design & implementation role of middleware in shared network environments : a systematic review / Muddassar Ali, Hamayun Khan, Irfan Ud Din, Muhammad Imran Tariq and Aetsam Javed -- Challenges & frameworks in cloud security governance : a review / Farah Taj, Danish Shahzad, Faiqa Irum, Hinna Arqam and Zaib un Nisa -- LTE/Wi-Fi coexistence in unlicensed band / Irfan ud Din, Fatima Zahid, Uns Bin Younas, H. Umar Farooq and Ommair Hameed -- Evolution of next-generation firewall system for secure networks / Asim Noor, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- Security and performance comparison of Windows and Linux : a systematic literature review / Johar Mumtaz, Attiq ur Rehman, Hamayun Khan, Irfan Uddin and Imran Tariq