Mukarram Baig

Learn More
In this paper we propose an automated approach for determining recently published vulnerabilities pertinent to the current network/system configuration using the information aggregated from different bug tracking communities. Such vulnerability assessment and indication mechanisms significantly alleviate the system administrator's burden of manual content(More)
Given the large number of vulnerability instances disclosed in various bug-tracking communities, system administrators face an up-hill task of protecting their system/ network against zero-day exploits. In order to safeguard against such exploits, the present challenges come in two-fold: (i) there exists a compelling need to assimilate configuration(More)
Latest 3G and 4G technologies have made it possible for mobile users to use real time applications anytime, anywhere. The use of real time applications like VoIP by mobile users is increasing day by day. To achieve uninterrupted and better service, mobile users should be able to maintain continuous and seamless connectivity with the corresponding node. In(More)
  • 1