1Noor-Ul-Qamar ,- (2020) "Various Security Techniques to Control Threats to Database Software’s and Comparative Analysis of Techniques" "LGURJCSIT",ISSN: , Volume: VOL 1, Issue: Issue No.1, Pages: 13,
2Noor-Ul-Qamar ,Kamran Mustafa2, Eisha-Tur-Rehman3, Shan-e-Zahra4 (2019) "An Overview on Cyber Attacks and its Types for Enhancing Data Security in Business World " "LGURJCSIT",ISSN: , Volume: 3, Issue: 2, Pages: 11,
3Noor-Ul-Qamar ,- (2019) "AN ORGANIZATIONAL LEVEL ADVANCEMENT OF MIS AND ITS SECURITY MILESTONES IN TECHNOLOGICAL ERA" "LGURJCSIT",ISSN: -, Volume: 2, Issue: 1, Pages: 8,
4Noor-Ul-Qamar ,PA (2019) "Voice Based Email for Blind" "LGURJCSIT",ISSN: , Volume: 3, Issue: 3, Pages: 10,
5Noor-Ul-Qamar ,PA (2018) "EVM and BVS- A source of bringing Electoral Reforms in Pakistan" "LGURJCSIT",ISSN: -, Volume: 2, Issue: 1, Pages: 9,
6Noor-Ul-Qamar , Kamran Mustafa ,PA (2017) "Biometric covert acquisition protection by enhancing sweat glands and cryptography " "IJAAS",ISSN: 2 3 1 3 - 6 2 6 X , Volume: 5, Issue: 1, Pages: 6,
7Noor-Ul-Qamar ,Ramesha Rehman, Muhammad Akhlaq Younas, Khadim Hussain,, Mohsin Riaz, Tahir Alyas, Shazia Saqib ( January 2020 ) "Drift Analysis for MPSO based MUD" "IJCSNS International Journal of Computer Science and Network Security",ISSN: 1738-7906, Volume: VOL.20 , Issue: Issue No.1, Pages: 13,
1Taimoor Hassan,Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Zaka Ullah, Noor-ul Qamar , Quantitative Based Mechanism for Resolving Goals Conflicts in Goal Oriented Requirement Engineering , 2019 International Conference on Intelligent Technologies and Applications INTAP 2018: Intelligent Technologies and Applications pp 822-831
2Noor-ul-Qamar, Muhammad Habib, Waseem Ahmad, Taimoor Hassan , Crash-Resilient Synthesizer in Logic Optimization Paradigm for Sustainable Hardware Design of ASIC and Digital Systems , 2020 International Conference on Intelligent Technologies and Applications INTAP 2019: Intelligent Technologies and Applications pp 641-650
3Noor-Ul-Qamar , Self-Healing System’s Remediation for Fault Mitigation Models by Positioning ASIC Technique , 2016 University of South Asia
4Noor-Ul-Qamar , Various Security Techniques to Control Threats to Database Software’s and Comparative Analysis of Techniques , 2020 LGU CS Conference
1MCS , LGU , Pakistan.
1Desiganation: ERP Support Officer 2016 to CONTINUE ,Department: ERP , LGU .
2Desiganation: Content Writer jan 2016 to july 2016 ,Department: writing , RA content writers .
3Desiganation: Freelance Content Writer jan 2016 to march 2016 ,Department: writin , Nationwide Cars LLC Ltd, ebestcars.co.uk .
1 Event Name: Attended Unity Gaming Workshop Description: How games can be created using unity software
2 Event Name: Visited OZI TECHNOLOGY and ARFA KARIM CENTER Description: details about the organization, working environment, job opportunities
3 Event Name: Attended Microsoft Azure Workshop Description: Working of Azure
4 Event Name: AlmusNet & Microsoft, Campus on Cloud Workshop Description: Limitations and benefits of Cloud