If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Naila Mukhtar is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Outputs

  • 9 Citations
  • 2 h-Index
  • 4 Conference proceeding contribution
  • 1 Article

Machine-learning-based side-channel evaluation of elliptic-curve cryptographic FPGA processor

Mukhtar, N., Mehrabi, M. A., Kong, Y. & Anjum, A., 1 Jan 2019, In : Applied Sciences (Switzerland). 9, 1, p. 1-20 20 p., 64.

Research output: Contribution to journalArticle

Open Access
File
  • 4 Citations (Scopus)
    8 Downloads (Pure)

    Hyper-parameter optimization for machine-learning based electromagnetic side-channel analysis

    Mukhtar, N. & Kong, Y., 2018, 2018 IEEE ICSENG proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-7 7 p. 79

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

  • 1 Citation (Scopus)

    On features suitable for power analysis - filtering the contributing features for symmetric key recovery

    Mukhtar, N. & Kong, Y., 2018, 6th International Symposium on Digital Forensic and Security: proceeding. Varol, A., Karabatak, M. & Varol, C. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 265-270 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

  • 2 Citations (Scopus)

    Secret key classification based on electromagnetic analysis and feature extraction using machine-learning approach

    Mukhtar, N. & Kong, Y., 2018, Future network systems and security: 4th International Conference, FNSS 2018 Paris, France, July 9–11, 2018 proceedings. Doss, R., Piramuthu, S. & Zhou, W. (eds.). Cham: Springer, Springer Nature, p. 80-92 13 p. (Communications in Computer and Information Science; vol. 878).

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

  • 2 Citations (Scopus)

    Improved trust based key management for end-to-end secure communication in cellular networks

    Mukhtar, N., Baig, M. S. & Khan, L. A., 2015, Proceedings of the 8th International Conference on Security of Information and Networks. Makarevich, O., Babenko, L., Anikeev, M., Poet, R., Elçi, A., Gaur, M. S. & Orgun, M. (eds.). New York: Association for Computing Machinery, p. 68-75 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution