الأبحاث المنشورة في الدوريات
رقم | عنوان البحث | الباحثون | المجلة العلمية | الناشر | المجلد والعدد والتاريخ | عامل الأثر |
1 | An Approach to Establish a Center of Excellence in Information Security | Khaled Alghathbar | International Journal of Computer Science and Information Security | Inderscience | المجلد 8، العدد 3، مارس 2008 | n/a |
2 | Adapting and Accelerating The Stream Cipher algorithm RC4 Using Ultra Gridsec AndHiman and Use it to Secure Himan Data | Hisham A. Kholidy, Khaled S. Alghathbar | Journal of Information Assurance and Security | MIRLABS | المجلد 4، 2009 | n/a |
3 | Efficient Approach for Security Information Retrieval by Using Grid | Hameed Ullah Khan | Journal of Computer Science | Science publications | المجلد 5، العدد 12، 2009 | 0.300 |
4 | Generic-Point Parallel Scalar Multiplication Without Precomputations | Turki Faisal Al-Somani | IEICE Electronics Express | J-STAGE | المجلد 6، العدد 24، 2009 | 0.482 |
5 | The Use of Nmaca Approach in Building a Secure Message Authentication Code | Khaled S. Alghathbar And Alaaeldin M. Hafez | International Journal of Education and Information Technologies | NAUN | المجلد 3، العدد 3، 2009 | n/a |
6 | Block-Based Motion Estimation Analysis for Lip Reading User Authentication Systems | Khaled Alghathbar, Hanan A. Mahmoud | WSEAS Transactions on Information Science & Applications | WSEAS | المجلد 6، العدد 5، مايو 2009 | 0.545 |
7 | Face Detection And Counting in Color Images | Mona F.M. Mursi, Ghazy M.R. Assassa, Abeer Al-Humaimeedy , Khaled Alghathbar | WSEAS Transactions on Computers, Transactions Id | WSEAS | المجلد 6، العدد 5، مايو 2009 | 0.545 |
8 | Fingerprint Biometric-Based Self And Deniable Authentication Schemes for the Electronic World | Muhammad Khurram Khan, | IETE Technical Review | IETE | المجلد 26، العدد 3، مايو- يونيو 2009 | 0.724 |
9 | Information Sharing in Vehicular Adhoc Network | A. Rahim, Z.S Khan, Fahad B. Muhaya, M. Sher, Muhammad Khurram Khan | International Journal of Computers, Communications & Control | CCC Publications, R & D Agora. | المجلد 5، العدد 5، 2010 | 0.438 |
10 | Dynamic Weighted Discrimination Power Analysis: A Novel Approach for Face and Palmprint Recognition in DCT Domain | Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Khaled Alghathbar | International Journal of Physical Sciences | Academic journals | المجلد 5، العدد 17، 2010 | 0.554 |
11 | Sensor Based Framework for Secure Multimedia Communication in Vanet | Aneel Rahim, Zeeshan Shafi Khan, Fahad T. Bin Muhaya, Muhammad Sher, T.H Kim | Sensors | International Information Institute | المجلد 10، 2010 | 1.953 |
12 | A Quantum Evolutionary Algorithm for Data Clustering | Chafikaramdane, Souham Meshoul, Mohamed Batouche, Mohamed-Khireddinekholladi | International Journal of Data Mining, Modeling and Management | Inderscience | المجلد 2، العدد 2، 2010 | n/a |
13 | Cryptanalysis of A Handover Authentication Scheme Using Credentials Based on Chameleon Hashing | E.J Yoon, Muhammad Khurram Khan, K.Y Yoo | IEICE Transactions on Information and Systems | Maruzen Co., Ltd/Maruzen Kabushikikaisha | المجلد B93، العدد 11، 2010 | 0.218
|
14 | Improvement of the Efficient Secret Broadcast Scheme | E.J Yoon, Muhammad Khurram Khan, K.Y Yoo | IEICE Transactions on Information and Systems | Maruzen Co., Ltd/Maruzen Kabushikikaisha | المجلد B93، العدد 11، 2010 | 0.218
|
15 | Environment Recognition for Digital Audio Forensics Using Mpeg-7 and Mel Cepstral Features | Ghulam Muhammad, Khaled Alghathbar | International Arab Journal of Information Technology | Zarqa University | مارس 2010 | 0.390 |
16 | Utilizing Diacritic Marks for Arabic Text Steganography | Adnan A. Gutub, Lahourai M. Ghouti, Yousef S. Elarian, Sameh M. Awaiden, Aleem .Alvi | Kuwait Journal of Science & Engineering | University of Kuwait | المجلد 37، العدد 1، 2010 | 0.075 |
17 | Context-Aware Access Control Model for Pervasive Environments. | Al-Rwais S, Al-Muhtadi J. A | IETE Technical Review | IETE | المجلد 27، العدد 5، 2010 | 0.724 |
18 | Broadcast Authentication for Wireless Sensor Network Using Nested Hashing and Chinese Remainder Theorem | Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathabar, E.S Cho | Sensors | MDPI | المجلد 10، العدد 9، 2010 | 1.953 |
19 | Analytical Study of the Saudi Hackers | Khaled Alghathbar, | Information Studies | n/a | n/a | n/a |
20 | Information Flow Analysis of UCON | Mohammad Nauman, Tamleek Ali , Masoomalam, Muhammad Khurram Khan, Khaled Alghathbar | International Journal of the Physical Sciences | Academic journals | المجلد 5، العدد 6، ابريل 2010 | 0.554 |
21 | Biometrics and Identity Management for Homeland Security Applications of Saudi Arabia | Bilal Khan, Muhammad Khurram Khan, Khaled S. Alghathbar | African Journal of Business Management | Academic journals | المجلد 4، العدد 15، نوفمبر 2010 | 0.20 |
22 | Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks | Muhammad Khurram Khan, Khaled Alghathbar | Sensors | MDPI | المجلد 10، العدد 3، 2010 | 1.953 |
23 | Singular Points Detection Using Fingerprint Orientation Field Reliability | Mohammad. Sayim Khalil, D. Muhammad, Muhammad Khurram Khan, Khaled Alghathbar | International Journal of Physical Sciences | Academic journals | المجلد 5، العدد 4، 2010 | 0.554 |
24 | Arabic Domain Names: Analysis & Solution | Khaled Alghathbar, | Journal of Information Assurance and Security | MIRLABS | المجلد 5، 2010 | n/a |
25 | Fingerprint Verification Using Statistical Descriptors | Mohammad Sayim Khalil, Dzulkifli M, Muhammad Khurram Khan, Q Al-Nuzaili | Journal of Digital Signal Processing | Elsevier Science | المجلد20 ، العدد 4، يوليو 2010 | 1.918 |
26 | Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems | Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray- Shinerun,Rong-Jianchen, Jui-Lin Lai,Muhammad Khurram Khan, Kevin Octaviussentosa | Pattern Recognition | Elsevier Science | المجلد 43، العدد 5، مايو 2010 | 3.219 |
27 | Chaos-Based Secure Satellite Imagery Cryptosystem | Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee | Computer and Mathematics With Applications | Elsevier Science | المجلد 60، العدد 2، يوليو 2010 | 2.069 |
28 | Code Based Hashing Technique for Message Authentication Algorithms | K. Alghathbar, A | Journal of Information Assurance and Security | MIRLABS | المجلد 5، 2010 | n/a |
29 | Chaos and NDFT-Based Concealing of Fingerprint-Biometric Data into Audio Signals for Trustworthy Person Authentication | Muhammad Khurram Khan, Ling Xie, Jiashu Zhang | Journal of Digital Signal Processing | Elsevier Science | المجلد 20، 2010 | 1.918 |
30 | An Efficient Phishing Webpage Detector | Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shiine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 7، يوليو 2011 | 1.854 |
31 | An Improved Forecasting Model Based on The Weighted Fuzzy Relationship Matrix Combined With a PSO Adaptation For Enrolments | Yao-Lin Huang, Shin-Jinn Horng, Tzong-Wang Kao, Ray-Shine Runm Jui-Lin Lai, Rong-Jian Cheen, I-Hong Kuo And Muhammad Khurram Khan | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 7، العدد 7، يوليو 2011 | 1.667 |
32 | Application of Grey-Relational Analysis to Find the Most Suitable Watermarking Scheme | S.T Lin, S.J Horng, B.H Lee, P. Fan, Y. Pan, J.L Lai, R.J Chen, Muhammad Khurram Khan | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 7، العدد 9، سبتمبر 2011 | 1.667 |
33 | A Practical Hybrid Particle Swarm Optimization Algorithm for High-Dimensional Complex Engineering Problems | Dongli Jia, Guoxin Zheng, Bo Yang Qu, Muhammad Khurram Khan | Computers And Industrial Engineering | Elsevier Science | المجلد 61، العدد 4، نوفمبر 2011 | 1.589 |
34 | Steganalysis for Palette-Based Images Using Generalized Difference Image And Color Correlogram | Hong Zhao, Hongxia Wang, Muhammad Khurram Khan | Signal Processing | Elsevier Science | المجلد 91، العدد 11، نوفمبر 2011 | 1.851 |
35 | Electronic War- The Future War Science and Technology Section | Khaled Alghathbar | OIC Conference Journal | OIC | المجلد 17، ابريل 2011 | n/a |
36 | Vibrabt Color Image Stegnography Using Channel Differences and Secret Data Distribution | Muhammd Tanveer Parvez And Adnan Abdul Aziz Gutab | Kuwait Journal of Science & Engineering | University of Kuwait | المجلد 38، العدد 1B ابريل 2011 | 0.075 |
37 | Fingerprint Classification Using PCA, LDA, L-LDA and BPN | Mohammad Sayim Khalil, Muhammad Imran Razzak, Muhammad Khurram Khan | Information Journal | International Information Institute | المجلد 14، العدد 10، أكتوبر 2011 | 2.103 |
38 | An Effective Memetic Differential Evolution Algorithm Based on Chaotic Local Search | Donglijia, Guoxinzheng, Muhammad Khurram Khan | Information Sciences | Elsevier Science | المجلد 181، العدد 15، أغسطس 2011 | 3.643 |
39 | A Hybrid Forecasting Model for Enrollments Based on Aggregated Fuzzy Time Series And Particle Swarm Optimization | Y.L Huang, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, J.L Lai, I. H Kuo | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 7، يوليو 2011 | 1.854 |
40 | A Fast RFID Tag Identification Algorithm Based on Counter and Stack | M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 6، يونيو 2011 | 1.854 |
41 | Mutual Funds Trading Strategy Based on Particle Swarm Optimization | L.Y Hsu, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, R.S Run, J.L Lai, R. J Chen | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 6، يونيو 2011 | 1.854 |
42 | Real-Time Algorithmic Design for Silent Pass Lip Reading Authentication System | Khaled Alghathbar | International Journal of The Physical Sciences | Academic Journals | المجلد 6، العدد 7، ابريل 2011 | 0.554 |
43 | Cyber Security Using Arabic Captcha Scheme | Muhammad Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah Alkelabi, Abdulaziz Alajaji | International Arab Journal of Information Technology | Zarqa University | مارس، 2011 | 0.390 |
44 | A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards | Hanan Mahmoud, Khaled Alghathbar, Alaaeldin Hafez | Journal of Applied Sciences | Asian Network of Scientific Information | المجلد 11، العدد 6، 2011 | 0.350 |
45 | Secure Chaotic Map Based Block Cryptosystem With Application on Camera Sensor Networks | X. Guo, J. Zhang, Muhammad Khurram Khan, Khaled Alghathbar | Sensors | MDPI | المجلد 11، العدد 2، 2011 | 1.953 |
46 | 3D Block-Based Medial Axis Transform and Chessboard Distance Transform Based on Dominance | S.Y Lin, S.Jhorng, T.W Kao, C.S Fahn, P. Fan,Y.H Chen, Muhammad Khurram Khan, A. Bourgeois,T. Terano | Image and Vision Computing | Elsevier Science | المجلد 29، العدد 4، 2011 | 1.952 |
47 | An Extended Intrusion Detection and Prevention System for Next Generation Network Application | Zeeshan Shafi Khan, Khalid Rashid, Muhammad Khurram Khan, Muhammad Sher | Information Journal | International Information Institute | المجلد 14، العدد 1، 2011 | 2.103 |
48 | Multimodal Biometric Recognition Based on Fusion of Low Resolution Face and Finger Veins | Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyahyousaf | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 7، العدد 8، 2011 | 1.667 |
49 | Cancelable Palmcode Generated From Randomized Gabor Filters for Palmprint Template Protection | Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Ming Ji, Khaled Alghathbar | Scientific Research & Essays | Academic journals | المجلد 6، 2011 | 0.445 |
50 | Mtpso Algorithm for Solving Planar Graph Coloring Problem | L.Y Hsu, S.J Horng, P. Fan, Muhammad Khurram Khan, Y.R Wang, R.S Run, J.L Lai, R.J Chen | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 5، مايو 2011 | 1.854 |
51 | A Survey of Identity-Based Signcryption | Fagen Li, Muhammad Khurram Khan, | IETE Technical Review | IETE | المجلد 38، العدد 3، مايو 2011 | 0.724 |
52 | Privacy Versus Scalability in Radio Frequency Identification Systems | Basel Alomair, Radhapoovendran | Computer Communications | Elsevier Science | المجلد 33، 2010 | 1.227 |
53 | Handling Diacritical Marks for Online Arabic Script Based Languages Character Recognition Using Fuzzy C-Mean Clustering and Relative Position | Muhammad Imran Razzak, Syed Afaq Husain, Muhammad Khurram Khan, Muhammad Sher | Information journal | International Information Institute | المجلد 14، العدد 1، 2011 | 2.103 |
54 | An Extended Push to Multimedia Service for IP Multimedia Subsystem | Zeeshanshafi Khan, Nazishmunawar, Muhammad Sher, Khalid Rashid, Aneel Rahim, | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 7، العدد 6، 2011 | 1.667 |
55 | Challenge-Response Based Biometric Image Scrambling for Secure Personal Identification | Muhammad Khurram Khan, Z. Jiashu, Khaled S. Alghathbar, | Future Generation Computer Systems | Elsevier Science | المجلد 27، العدد 4، ابريل 2011 | 2.033 |
56 | Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication Scheme | Muhammad Khurram Khan, Khaled Alghathbar, J. Zhang | Telecommunication Systems | Springer-Verlag | المجلد47، العدد 3-4، أغسطس 2011 | 1.027 |
57 | Cryptanalysis and Security Enhancement of a ‘More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme’ | Muhammad Khurram Khan, S. Kim, Khaled Alghathbar | Computer Communications | Elsevier Science | المجلد 34، العدد 3، مارس 2011 | 1.079 |
58 | Statistical Analysis of Several Reversible Data Hiding Algorithms | Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan | Journal of Multimedia Tools And Applications | Springer-Verlag | المجلد 52، العدد 2-3 ، ابريل 2011 | 1.014
|
59 | Deep Text Mining for Automatic Keyphrase Extraction from Text Documents | Abulaish, M., Jahiruddin and Dey, L | Journal of Intelligent Systems | De Gruyter | المجلد 20، العدد 4، 2011 | n/a |
60 | Identity-Based Online/Offline Signcryption for Low Power Devices | Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi | Journal of Network and Computer Applications | Elsevier Science | المجلد 35، العدد 1 يناير 2012 | 1.467 |
61 | Securing the Smart Phones Against Malicious Exploits | M Zubair Rafique, Faraz Ahmed, Muddassar Farooq, Muhammad Khurram Khan | Information Journal | International Information Institute | المجلد 15، العدد 2 فبراير 2012 | 2.103 |
62 | Clustering Periodic Frequent Patterns Using Fuzzy Statistical Parameters | Fokrul Alom Mazarbhuiya And Muhammad Abulaish | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 8، العدد 3 مارس 2012 | 1.667 |
63 | New Robust Protocols for Remote User Authentication And Password Change | E.J Yoon, Muhammad Khurram Khan, K.Y Yoo | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 7، العدد 9 سبتمبر 2012 | 1.667 |
64 | An Efficient Wavelet-Tree-Based Watermarking Method | S.J Horng, W.H Lin, T.W Kao, P. Fan, Muhammad Khurram Khan | Expert Systems With Applications | Elsevier Science | المجلد 38، العدد 12، نوفمبر- ديسمبر 2012 | 1.854 |
65 | Statistical Authentication of Fingerprints | Mohammad Sayim Khalil, Muhammad Khurram Khan | The Imaging Science Journal | Academia | المجلد 59، العدد 5، مايو 2012 | 0.506 |
66 | Efficient Distributed Face Recognition in Wireless Sensor Network | Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan, Khaled Alghathbar | International Journal of Innovative Computing Information and Control | International Information Institute | المجلد 8، العدد 4، ابريل 2012 | 1.667 |
67 | Effectiveness of Information Security Awareness Methods Based on Psychological Theories | Bilal Khan, Khaled Alghathbar, S.I Nabi, Muhammad Khurram Khan | African Journal of Business Management | Academic Journals | المجلد 5، العدد 26، أكتوبر 2012 | 0.20 |
68 | Mobile-Otp: Two-Factor Authentication Using Mobile Phones. | M. Eldefrawy, M. K. Khan, K. Alghathbar, T. Kim, H. Elkamchouchi | Security and Communication Networks | John Wiley and Sons Inc. | المجلد 5، العدد 5، 2012 | 0.311 |
69 | Representing Access Control Policies in Use Cases | Khaled Alghathbar | International Arab Journal of Information Technology | Zarqa University | المجلد 9، العدد 3، مايو 2012 | 0.390 |
70 | Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation | Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah And Yazid Bin Idris | International Arab Journal of Information Technology | Zarqa University | المجلد 9، العدد 4، يوليو 2012 | 0.390 |
71 | Study on the Common Criteria Methodology for Secure Ubiquitous Environment Construction | S.Y Kang, J.H Park, Muhammad Khurram Khan, J. Kwak, | Journal of Intelligent Manufacturing | Springer-Verlag | المجلد23 ، العدد 4، أغسطس 2012 | 1.278 |
72 | A Blind Reversible Method for Watermarking Relational Databases Based on a Time-stamping Protocol | M. Farfoura, S.J Horng, J.L Lai, R.S Run, R.J Chen, Muhammad Khurram Khan | Expert Systems with Applications | Elsevier Science | المجلد 39، العدد 3، فبراير 2012 | 1.854 |
73 | Towards Secure VANETs: A Survey | Dr. Mohammad Moharrum | IETE Technical Review | IETE | المجلد 29، العدد 1، 2012 | 0.724 |
74 | An Efficient Copyright Protection Scheme for E-government Document Images | S.J Horng, D. Rosiyadi, P.Fan, W. Xian, Muhammad Khurram Khan, Y. Pan | IEEE Multimedia | IEEE | المجلد 19، العدد 3، 2012 | 0.984 |
75 | A biometric identity- based signcryption scheme | F.Li, Muhammad Khurram Khan | Future Generation Computer systems | Elsevier science | المجلد 28، العدد 1، 2012 | 2.033 |
76 | Analysis of existing remote attestation techniques | M. Alam, T. Ali, S. Khan, Muhammad Ali, M. Nauman, A. Hayat, Muhammad Khurram Khan, Khaled Alghathbar | Security and communication networks | Wiley- Blackwell | المجلد 5، العدد 9، سبتمبر 2012 | 0.311 |
77 | Adaptively weighted Sub- directional Two dimensional Linear Discriminant Analysis for Face recognition | L. Yan, J. S Pan, S. C Chu, Muhammad Khurram Khan, | Future Generation Computer systems | Elsevier science | المجلد 28، العدد 1، يناير 2012 | 2.033 |
78 | A Supervised Learning Approach for Automatic Keyphrase Extraction | Muhammad Abulaish and Tarique Anwar | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 8، العدد 11، 2012 | 1.667 |
79 | Interactive Artificial Bee Colony Supported Passive Continuous Authentication System | P.W Tsai, Muhammad Khurram Khan, J.S Pan, B.Y Liao | IEEE Systems Journal | IEEE | المجلد PP، العدد 99، أغسطس 2012 | 1.270 |
80 | Context-Adaptive Anisotropic Diffusion for Image Denoising | L. H Chao, P. Z Fan, Muhammad Khurram Khan | IET Electronics Letters | IEEE | المجلد 48، العدد 14، يوليو 2012 | 1.038 |
81 | Collaborative Security Measures to Counter Zero Day- Exploits Using Function Hooking
|
Haider Abbas, Natasha Arjumand Shoaib Mirza, Farrukh Aslam Khan | UCAWSN 13 – Case A Journal Special issue Submission for | n/a | n/a | n/a |
82 | Cryptanalysis And Improvement on a Parallel Keyed Hash Function Based on Chaotic Neural Network | X. Wang, W. Guo, W. Zhang, Muhammad Khurram Khan, Khaled Alghathbar | Telecommunication Systems | Springer-Verlag | المجلد 52، العدد 2، 2013 | 1.027 |
83 | Event Correlation, Extra Information and Merged Policies Approaches for Integrating Intrusion Detection and Access Control Systems | Waleed Halboob, Khaled Alghathbar, Ali Mamat, Ramlan mahmod | Information Journal | International information institute | المجلد 16، العدد 3، مارس 2013 | 2.103 |
84 | Attack Containment in Mobile Ad-Hoc Network Through Fair Distribution of Processing Resources | Zeeshanshafi Khan, Farzanaazam, Khaled Alghathbar, Muhammad Sher, Khalid Rashid, Muhammad Khurram Khan | Telecommunication Systems | Springer-Verlag | يوليو 2013 | 1.027 |
85 | Energy Efficient Distributed Face Recognition in Wireless Sensor Network | Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar | Wireless Personal Communications | Springer-Verlag | المجلد 60، العدد 3، أكتوبر 2013 | 0.428 |
86 | Designing User Profiling Prototype for Identification of Malicious Forums | Maqsood Mahmud, Muhammad Elmogy, Muhammad Khurram Khan, Khaled Alghathbar | Information Journal | International information institute | المجلد 16، العدد 3(A)، مارس 2013 | 2.103 |
87 | Dynamic Password Based Remote User Authentication without Time Stamping | M. H. Eldefrawy, M. K. Khan, K. Alghathbar | International Journal of Innovative Computing Information and Control | ICIC International | المجلد 9، العدد 1، 2013 | 1.667 |
88 | Presence Based Extended Secure Call Control System for IP Multimedia Subsystem | Z.S. Khan, M. Sher | Information journal | Information International Institute | المجلد 16، العدد 3(a)، مارس 2013 | 2.103 |
89 | A Novel Intrusion Detection Framework for Wireless Sensor Networks | Farrukh Aslam Khan,Ashfaq Hussain Farooqi, Jin Wang, Sungyoung Lee | Personal and Ubiquitous Computing | Springer-Verlag | المجلد 17، العدد 5، يوليو 2013 | 1.133 |
90 | A Framework for Preservation of Cloud Users’ Data Privacy using Dynamic Reconstruction of Metadata | Adeela Waqar, Asad Raza ,Haider Abbas, Muhammad Khurram Khan | Journal of Network and Computer Applications | Elsevier science | المجلد 36، العدد 1، يناير 2013 | 1.467 |
91 | Trust-based Scalable Access Control Model for Broadcast XML Documents | Waleed Halboob, Ali Mamat, Ramlan Mahmod, Khaled Alghathbar, Mohammed Khurram Khan | Information Journal | Information International Institute | المجلد 16، العدد 3(a)، مارس 2013 | 2.103 |
92 | Authentication of Fingerprint Biometrics Acquired using a Cellphone camera: A Review | Mhammed Sayim Khalil, Fajri Kurniawan, Kashif Saleem | International Journal of Wavelets, Multiresolution and Information Processing | World Scientific | المجلد 11، العدد 05، 2013 | n/a |
93 | A Temporal and Delegable Secure Access to the Broadcasted XML Documents | Waleed Halboob, Ali Mamat, Ramlan Mahmod, Mohammad Khurram Khan | Journal of Computer Science | Information International Institute | المجلد 16، العدد 3(a)، مارس 2013 | 0.300 |
94 | Review: Assessing Routing Strategies for Cognitive Radio Sensor Networks | Suleiman Zubair, Norsheila Fisal, Yakubu S. Baguda, Kashif Saleem | Sensors | MDPI | المجلد 13، العدد 10، 2013 | 1.953 |
95 | b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET | S.J Horng, S.F Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, | IEEE Transactions on Information Forensics and Security | IEEE | المجلد 8، العدد 11، نوفمبر2013 | 1.895 |
96 | Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks
|
D. He, N. Kumar, Muhammad Khurram Khan, J. H Lee | IEEE Transactions on Consumer Electronics | Inderscience | المجلد 59، العدد 4، نوفمبر2013 | n/a |
97 | On the Security of an Authentication Scheme for Multi-server Architecture | D. He, J. Chen, W. Shi, Muhammad Khurram Khan | International Journal of Electronic Security and Digital Forensics | Inderscience | المجلد 5، العدد 3/4، 2013 | n/a |
98 | Analysis of Correlation of 2DPalmHash Code and Orientation Range Suitable for Transposition
|
L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan | Neurocomputing | Elsevier science | قبلت للنشر في أكتوبر 2013 | 1.634 |
99 | Cryptanalysis of a Key Agreement Protocol based on Chaotic Hash | D. He, Muhammad Khurram Khan | International Journal of Electronic Security and Digital Forensics | Inderscience | المجلد 5، العدد 3/4، 2013 | n/a |
100 | More Secure Smart Card Based Remote User Password Authentication Scheme with User Anonymity | S. Kumari, Muhammad Khurram Khan | Security and Communication Networks | Wiley | سبتمبر 2013 | 0.311 |
101 | Lattice-based Signcryption | F. Li, M. Fahad, Muhammad Khurram Khan, T. Takagi | Concurrency and Computation: Practice and Experience | Wiley | المجلد 25، سبتمبر 2013 | 0.845 |
102 | An Improved Timestamp-based
Password Authentication Schemem: Comments, Cryptanalysis and Improvement |
S. Kumari, M.K Gupta, Muhammad Khurram Khan, X. Li | Security and Communication Networks | Wiley | سبتمبر 2013 | 0.311 |
103 | A Remote Cancelable Palmprint Authentication Protocol Based on Multi-directional Two-dimensional Palm Phasor-Fusion
|
L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, | Security and Communication Networks | Wiley | سبتمبر 2013 | 0.311 |
104 | A Blind Image Copyright Protection Scheme for e-government
|
S. J Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, Muhammad Khurram Khan | Journal of Visual Communication and Image Representation | Elsevier science | المجلد 24، العدد 7، أكتوبر 2013 | 1.195 |
105 | An Adaptive Watermarking Scheme for e-government Document Images Press
|
S. J Horng, D. Rosiyadi, P. Fan, X. Wang, Muhammad Khurram Khan | Multimedia Tools and Applications | Springer-Verlag | يوليو 2013 | 1.014
|
106 | Cryptanalysis and Improvement of a Robust Smart-Card-Based Remote User Password Authentication Scheme in | S. Kumari, Muhammad Khurram Khan | International Journal of Communication Systems | Wiley | نشرت اون لاين في يونيو 2013 | 0.712 |
107 | Using Sorted Switching Median Filter to Remove High-Density Impulse Noise
|
S.J Horng, L.Y Hsu, T. Li, S. Qiao, X. Gong, H.H Chou, Muhammad Khurram Khan | Journal of Visual Communication and Image Representation | Elsevier science | المجلد 24، العدد 7، أكتوبر 2013 | 1.195 |
108 | Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles
|
S.J Horng, S.F Tzeng, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan | KSII Transactions on Internet and Information Systems | Korea Society of Internet Information | المجلد 7، العدد 6، يونيو 2013 | 0.164 |
109 | Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical | S. Kumari, Muhammad Khurram Khan, R. Kumar | Journal of Medical Systems | Springer-Verlag | المجلد 37، العدد 4، مايو 2013 | 1.783 |
110 | Cryptanalysis of an ‘Efficient-Strong Authentication Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks | Muhammad Khurram Khan, S. Kumari, P. Singh | KSII Transactions on Internet and Information Systems | Korea Society of Internet Information | المجلد 7، العدد 5، مايو 2013 | 0.164 |
111 | More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device | Muhammad Khurram Khan, S. Kumari, M.K. Gupta | Computing | Springer-Verlag | فبراير 2013 | 0.807 |
112 | On the Security of a RSA-based Certificateless Signature Scheme | D. He, Muhammad Khurram Khan, S. Wu | International Journal of Network Security | National chung hsing university | المجلد 15، العدد 6، 2013 | n/a |
113 | A Keyphrase-Based Tag Cloud Generation Framework to Conceptualize Textual Data
|
Muhammad Abulaish, Tarique Anwar | International Journal of Adaptive, Resilient and Autonomic Systems
|
IGI Global | المجلد 4، العدد 2، 2013 | n/a |
114 | A Generic Statistical Approach for Spam Detection in Online Social Networks | Faraz Ahmed,
|
Computer Communications | Elsevier science | المجلد 36، العدد 10-11، 2013 | 1.079 |
115 | Web-Content Mining for Learning Generic Relations and their Associations from Textual Biological Data | Mourad Elloumi, Muhammad Abulaish | Biological Knowledge Discovery Handbook: Preprocessing, Mining and Post-processing of Biological Data
|
IGI Global | نشر اون لاين، 2013 | n/a |
116 | Energy-Efficient Cluster-Based Security Mechanism for Intra-WBAN and Inter-WBAN Communication for Healthcare Applications | Aftab Ali, Farrukh Aslam Khan | EURASIP Journal on Wireless Communications and Networking | Springer-Verlag | تم قبولها للنشر، 2013 | 0.540 |
117 | Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks
|
Hamid Ali, Farrukh Aslam Khan | Applied Soft Computing | Elsevier science | المجلد 13، العدد 9، 2013 | 2.140 |
118 | A Hybrid Security Mechanism for intra-WBAN and inter-WBAN Communication | Sarah Irum, Aftab Ali, Farrukh Aslam Khan, Haider Abbas | International Journal of Distributed Sensor Networks | المجلد (2013)، 2013 | 0.727 | |
119 | A Digsby Log Analysis Tool to Identify Forensic Artifacts | Muhammad Yasin, and Muhammad Abulaish |
Digital Investigation | Elsevier science | المجلد 9، العدد 3-4، فبراير 2013 | 0.630 |
120 | TC-enabled and Distributed Cloud Computing Access Control Model | Waleed Halboob, Khaled S.Alghathbar, Ramlan Mahmod, Ali Mamat | Journal of Applied Sciences | Asian Network of Scientific Information | نشرت اون لاين، 2014 | 0.350 |
121 | Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System
|
Z. Siddiqui, A.H Abdullah, Muhammad Khurram Khan, Abdullah S.G | Journal of Medical Systems | Springer-Verlag | المجلد 38، العدد 1، يناير2014 | 1.783 |
122 | A New Handover Authentication Protocol based on Bilinear Pairing Functions for Wireless Networks
|
H. Debiao, Muhammad Khurram Khan, N. Kumar | International Journal of Ad hoc and Ubiquitous Computing | Inderscience | قبلت للنشر في يناير 2014 | n/a |
123 | Namesake Alias Mining on the Web and its Role Towards Suspect Tracking | Tarique Anwar, Muhammad Abulaish
|
Information Sciences | Elsevier science | نشر اون لاين، 2014 | 3.643 |
124 | Empirical Studies of Bio-inspired Self-Organized Secure Autonomous Routing Protocol
|
Kashif Saleem, Norsheila Fisal, M. Ariff Baharudin | IEEE Sensors Journal | IEEE | تم قبولها للنشر، 2014 | 1.520 |
125 | Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: solutions and challenges
|
Abdelouahid, Miloud Bagaa Yacine Challaly Adlen Ksentiniz Nadjib Badache | IEEE Communications Surveys & Tutorials | IEEE | تم قبولها للنشر، 2014 | 4.818 |
127 | Current Trends and Future Directions of Privacy Preservation in Computer Forensics
|
Waleed Halboob,
Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullah, Ali Deghantanha
|
Computer Law and Security Review
|
Elsevier | تم قبولها للنشر، 2014 | 0.33 |
128 | An Ordered Selective Imaging and Distributed Analysis Computer Forensics Investigation Process for Better Imaging Efficiency and Analysis Scalability
|
Waleed Halboob,
Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullah, Ali Deghantanha |
Journal of Applied Sciences | ScienceAlert | تم قبولها للنشر، 2014 | 0.35 |
129 | Multivariate Correlation Analysis and Geometric Linear Similarity for Real-time Intrusion Detection Systems | Abdelouahid Derhab, Abdelghani Bouras | Security and Communication Networks
|
Wiley | تم قبولها للنشر، 2014 | 0.311 |
130 | Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks | Abdelouahid Derhab, Abdelghani Bouras | Ad Hoc & Sensor Wireless Networks | Old city publishing | تم قبولها للنشر، 2014 | 0.410 |
131 | Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks | Saifullah Khalid, Ashraf Masood, Faisal Bashir Hussain, Haider Abbas and Abdul Ghafoor | International Journal of Distributed Sensor Networks | Hindawi | نشر اون لاين، 2014 | 0.9 |
132 | Identifying An OpenID Anti-phishing Scheme for Cyberspace” (2014) Security and Communication Networks | Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan and Maruf Pasha | Security and Communication Networks | Wiley | نشر اون لاين، 2014 | 0.43 |
133 | Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review | Rabia Latif, Haider Abbas, Said Assar | Journal of Medical System | Springer-Verlag | تم قبولها للنشر، 2014 | |
134 | A Framework to Address Inconstant User Requirements in Cloud SLAS Management | Waleed Halboob, Haider Abbas, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha | Cluster computing | Springer-Verlag | المجلد 18، العدد 1، 2015 | 1.510 |
135 | A Broadcast-Based Key Agreement Scheme using Set Reconciliation for Wireless Body Area Networks | Aftab Ali, Farrukh Aslam Khan | Journal of Medical Systems | Springer-Verlag | المجلد 38، العدد 5، 2014 | 2.21 |
136 | Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks | Abdelouahid Derhab, Abdelghani Bouras, Mustapha Reda Senouci, Muhammad Imran | International Journal of Distributed Sensor Networks | Hindawi Publishing Cooperation | نشر اون لاين، 2014 | 0.665 |
137 | A Comprehensive Study of Email Spam Botnet Detection | W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao | IEEE Communications Surveys and Tutorials | IEEE | تم قبولها للنشر، 2015 | 6.49 |
138 | Securing the Software Defined Networks: Taxonomy, Requirements, and Open Issues | A. Akhanzada, E. Ahmed, A. Gani, Muhammad Khurram Khan, M. Imran, S. Guizani | IEEE Communications Magazine | IEEE | المجلد 53، العدد 4، 2015 | 4.46 |
139 | Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET | S.F Tzeng, S.J Horng, T. Li, X. Wang, P.H. Huang, Muhmmad Khurram Khan | IEEE Transactions on Vehicular Technology | IEEE | تم قبولها للنشر، 2015 | 2.64 |
140 | A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security | M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan | International Journal of Communication Systems | Wiley | تم قبولها للنشر، 2015 | 1.1 |
141 | An Enhanced Privacy Preserving Remote User Authentication Scheme with Provable Security | S. A Chaudhry, M.S Farash, H. Naqvi, S. Kumari, Muhammad Khurram Khan | Security and Communication Networks | Wiley | تم قبولها للنشر، 2015 | 0.43 |
142 | On the Security Enhancement of Integrated Electronic Patient Records Information Systems | Muhammad Khurram Khan, A. Chaturvedi, D. Mishra, Saru Kumari | Computer Science and Information Systems | ComSIS | تم قبولها للنشر، 2015 | 0.477 |
143 | Modified Artificial Bee Colony Optimization with Block Perturbation Strategy | J. Dongli, D. Xintao, Muhammad Khurram Khan | Engineering Optimization journal | Taylor & Francis | المجلد 47، العدد5، 2015 | 1.076 |
144 | User Authentication Schemes for Wireless Sensor Networks: A Review | S. Kumari, Muhammad Khurram Khan, M. Atiquzzaman | Ad Hoc Networks | Elsevier | المجلد 27، العدد5، 2015 | 1.53 |
145 | An Efficient Certificateless Aggregate Signature with Conditional Privacy-Preserving for Vehicular Sensor Networks | S.J Horng, S.F Tzeng, PH Huang, X. Wang, T. Li, Muhammad Khurram Khan | Information Sciences | Elsevier | تم قبولها للنشر، 2015 | 4.038 |
146 | Cryptanalysis and Improvement of ‘A Secure Authentication Scheme for Telecare Medical Information System’ with Nonce Verification | Z. Siddiqui, A. Hanan, Muhammad Khurram Khan, A. Alghamdi | Peer-to-Peer Networking and Applications | Springer-Verlag | تم قبولها للنشر، 2015 | 0.632 |
147 | A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems | W. Zhang, X. Wang, Muhammad Khurram Khan | Security & Communication Networks | Wiley | المجلد 8، العدد6، 2015 | 0.43 |
148 | Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges | E. Ahmed, A. Gani, Muhammad Khurram Khan, R. Buyya, SU Khan | Journal of Network & Computer Applications | Springer-Verlag | المجلد 52، 2015 | 2.229 |
149 | Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks using Extended Chaotic Maps | SKH Islam, Muhammad Khurram Khan, MS. Obaidat, Fahad Muhaya | Wireless Personal Communications | Springer-Verlag | نشر اون لاين، 2015 | 0.653 |
150 | A New Dynamic ID based User Authentication Scheme using Mobile Device: Cryptanalysis, the Principles and Design | X. Li, J. Liao, S. Kumari, W. Liang, F. Wu, Muhammad Khurram Khan | Wireless Personal Communications | Springer-Verlag | نشر اون لاين، 2015 | 0.653 |
151 | Man-At-The-End Attacks: Analysis, Taxonomy, Human Aspects, Motivation and Future Directions | A. Akhunzada, M. Sookhak, Nor Badrul Anuar, A. Gani, E. Ahmed, S. Furnell, A. Hyat, Muhammad Khurram Khan | Journal of Network and Computer Applications | Elsevier | المجلد 48، 2015 | 2.229 |
152 | An Efficient Remote User Authentication with Key Agreement Scheme using Elliptic Curve Cryptography | B. Huang, Muhammad Khurram Khan, L. Wu, F. B Muhaya, D. He | Wireless Personal Communications | Springer-Verlag | نشر اون لاين، 2015 | 0.653 |
153 | Geographic Wormhole Detection in Wireless Sensor Network | M. Sookhak, A. Akhunzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khurram Khan, L. Xiong, WX Ming | PLOS ONE | Public Library of Science | المجلد 10، العدد1 ، 2015 | 3.534 |
154 | An Anonymous Biometric Based Remote User Authenticated Key Agreement Scheme for Multimedia Systems | D. Mishra, S. Kumari, Muhammad Khurram Khan, S. Mukhopadhya | International Journal of Communication Systems | Wiley | نشر اون لاين، 2015 | 1.10 |
155 | Design and Analysis of a Chaotic Maps-based Three Party Authenticated Key Agreement Protocol | X Li, JW Niu, S Kumari, Muhammad Khurram Khan, JG Liao, W Liang | Nonlinear Dynamics | LI Multimedia Tools and Applications | تم قبولها للنشر، 2015 | 2.849 |
156 | A New Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks with User Anonymity | X. Li, J. Niu, S. Kumari, J.Liao, W. Liang, Muhammad Khurram Khan | Security and Communication Networks | Wiley | تم قبولها للنشر، 2015 | 0.43 |
157 | A More Secure Digital Rights Management Authentication Scheme Based on Smart Card | S. Kumari, Muhammad Khurram Khan, X., LI | Multimedia Tools and Applications | Springer-Verlag | تم قبولها للنشر، 2015 | 1.346 |
158 | A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security | M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan | International Journal of Communication Systems | Wiley | تم قبولها للنشر، 2015 | 1.1 |
159 | A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds | Q. Jiang, Muhammad Khurram Khan, X. Lu, J. Ma, D. He | The Journal of Supercomputing | Springer-Verlag | نشر اون لاين، 2016 | |
160 | Design of Anonymity Preserving Three-Factor Authenticated Key Exchange Protocol for Wireless Sensor Network | R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, L. Leng, N. Kumar | Computer Networks | Elsevier | نشر اون لاين، 2016 | |
161 | A Comprehensive Study of Email Spam Botnet Detection | W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao | IEEE Communications Surveys and Tutorials | IEEE | المجلد 17، العدد4 ، 2015 | |
162 | A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks | Mohammed Abazeed, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Norsheila Fisal, Jalal Al-Muhtadi, and Suleiman Zubair | International Journal of Distributed Sensor Networks | Hindawi | المجلد 2015(2015) | |
163 | Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks
|
ACM Transactions on Sensor Networks (TOSN) | ACM | المجلد 11، العدد3، 2015 | ||
164 | Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks | AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran and Abdelouahid Derhab | International Journal of Distributed Sensor Networks | Hindawi | المجلد 2015(2015) | |
165 | Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices | Abdelouahid Derhab, Kashif Saleem,
Mohamed Guerroum |
Arabian Journal for Science and Engineering | Springer-Verlag | المجلد 41، العدد 2، 2016 | |
166 | Secure transfer of environmental data to enhance human decision accuracy
|
Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Basit Shahzad, Mehmet A. Orgun | Computer in Human Behavior Journal | Elsevier | المجلد 51، الجزء ب2، 2015 | |
167 | Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience | Kashif Saleem ,
|
Computer in Human Behavior Journal | Elsevier | المجلد 51، الجزء ب2، 2015 | |
168 | Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society | Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Basit Shahzad | Computer in Human Behavior Journal | Elsevier | المجلد 51، الجزء ب، 2015 | |
169 | Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks | Abdelouahid Derhab, Abdelghani Bouras, Mustapha Reda Senouci, and Muhammad Imran | International Journal of Distributed Sensor Networks | Hindawi | المجلد 2014 (2014) | |
170 | Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN
|
Miloud Bagaaa, Mohamed Younisb, Abdelouahid Derhabc, Nadjib Badache | Computer Networks | Elsevier | المجلد 75، الجزء أ، 2014 | |
171 | Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices | Abdelouahid Derhab, Kashif Saleem, Jalal Al-Muhtadi, Mehmet A. Orgun | Computers in Human Behavior | Elsevier | المجلد 59، يونيو 2016 | |
172 | Mobile-health: A review of current state in 2015
|
Bruno M.C. Silvaa, 1, Joel J.P.C. Rodriguesa, b, Isabel de la Torre Díezc, Miguel López-Coronadoc, Kashif Saleemb, | Journal of Biomedical Informatics | Elsevier | المجلد 56، يونيو 2016 | |
173 | Energy Efficient Strategy for Throughput Improvement in Wireless Sensor Networks
|
Sohail Jabbar, Abid Ali Minhas, Muhammad Imran, Shehzad Khalid
and Kashif Saleem |
Sensors | MDPI | المجلد 15،الإصدار 2، 2015 | |
174 | Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone | Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan | Mathematical Problems in Engineering | Hindawi | المجلد 2015(2015) | |
175 | Reference point detection for camera-based fingerprint image based on wavelet transformation
|
Mohammed S Khalil
|
BioMedical Engineering OnLine | BioMedCentral | نشر اون لاين، 2015 | |
176 | Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art | Aftab Ali, Farrukh Aslam Khan | Journal of Medical Systems | Springer-Verlag | المجلد 38،الإصدار 10، 2015 | |
177 | Anomaly Detection in Wireless Sensor Networks Using Immune-based Bio-inspired Mechanism | Ramsha Rizwan, Farrukh Aslam Khan, Haider Abbas, Sajjad Hussain Chauhdary | International Journal of Distributed Sensor Networks | Hindawi | المجلد 2015(2015) | |
178 | Identifying An OpenID Anti-phishing Scheme for Cyberspace | Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha | Security and Communication Networks | Wiley | نشر اون لاين، 2015 | |
179 | EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network | Rabia Latif, Haider Abbas, Seemab Latif, and Ashraf Masood | Mobile Information Systems | Hindawi | المجلد 2015 (2015) | |
180 | A Framework for Cloud Forensics Analysis using Security Information and Event Management , Security and Communication Networks | Muhammad Irfan, Haider Abbas, Yinchuan Sun , Anam Sajid and Maruf Pasha | Security and Communication Networks | Wiley | تم قبولها للنشر | |
181 | BiSAL A Lexical Resource for Sentiment Analysis over English and Arabic Language Texts from Dark Web Forums | Digital Investigation | Elsevier | المجلد 14،الجزء c، 2015 | ||
182 | Smart Help at the Workplace for Persons with Disabilities (SHW-PWD) | Ghassan Kbar, Shady Aly, Ibrahim Alsharawy, Akshay Bhatia, Nur Alhasan, Ronaldo Enriquez
|
International Journal of Computer, Information, Systems and Control Engineering | |||
183 | Pixel Distribution-Based Features for Offline Arabic Handwritten Word Recognition | Qais Al-nuzaili, Siti Z. Mohd Hashim, Faisal Saeed, Mohammed S. Khalil, Dzulkifli Mohamad | International Journal of Computational Vision and Robotics
|
Inderscience | تم قبولها للنشر | |
184 | Cost-Effective Encryption-based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks | Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues, Mohammed Sayim Khalil, Adel Ali Ahmed | Sensors | |||
185 | Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges | Anam Sajid, Haider Abbas and Kashif Saleem | IEEE Access
|
IEEE | تم قبولها للنشر | |
الأبحاث المنشورة في المؤتمرات
رقم | عنوان البحث | الباحثون | المؤتمرات | الناشر | المجلد والعدد والتاريخ | ||||||
1 | Enhanced Ultra Gridsec: Enhancing High Performance Symmetric Key Cryptography Schema Using Pure Peer to Peer Computational Grid Middleware (HIMAN) | Kholidy, H.A. Azab, A.A. Deif, S.H. | 3rd International Conference on Pervasive Computing And Applications, Alexandria, Egypt. 6-8 Oct. 2008. | IEEE | الدورة الثالثة، 2008 | ||||||
2 | Most Known Vulnerabilities in Saudi Arabian Web Servers | Alghathbar.K.S, Mahmud.M, Ullah.H | 4th IEEE/IFIP International Conference on Internet (ICI 2008), 23-25 Sept. 2008. Uzbakistan. | IEEE | الدورة الرابعة، 2008 | ||||||
3 | A Thin Operating System | Khaled S. Alghathbar, Swooj | 2nd National Information Technology Symposium, 18-21 May, 2008. Riyadh, Saudi Arabia. | N/A | الدورة الثانية، 2008 | ||||||
4 | Biometric-Gaussian-Stream (BGS) Cipher With New Aspect of Image Encryption (Data Hiding) | Maqsood Mahmud, Hanif Ullah, Muhammad Khurram Khan, Khaled Alghathbar | International Conference on Bio-Science and Bio-Technology (BSBT 2009), December 10-12, 2009. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 56، 2009 | ||||||
5 | Acceptance And Applications of Smart Cards Technology in University Settings | Abdulrahman Mirza, Khaled Alghathbar | 8th International Conference On Pervasive Intelligence And Computing (Picom 2009), December 12-14, 2009, Chengdu, China | IEEE | الدورة الثامنة عشر، 2009 | ||||||
6 | Environment Recognition from Audio Using Mpeg-7 Features | Ghulam Muhammadand Khaled Alghathbar, | 4th International Conference On Embedded And Multimedia Computing (Em-Com), December, 2009. S. Korea. | IEEE | الدورة الرابعة، 2009 | ||||||
7 | Difference Histogram Analysis of Several Reversible Data Hiding Schemes | Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, | IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia’9). Shanghai, China, 2009. | IEEE | الدورة الأولى، 2009 | ||||||
8 | Low Power Design for Silent Pass Authentication System | Khaled Alghathbar, | 4th International Conference For Internet Technology And Secured Transactions. November 9-12, 2009, London, Uk | IEEE | الدورة الرابعة، 2009 | ||||||
9 | Framework For Identification of Power System Operating Security Regions | Mohamed A. El-Kady, Essam A. Al-Ammar, | 3rd International Conference On Network & System Security (NSS), October 2009, Australia. | IEEE | الدورة الثالثة، 2009 | ||||||
10 | A Context-Aware Access Control Model for Pervasive Environments | Sumayah Alrwais, Jalal Almuhtadi, | 3rd International Conference On Network & System Security (NSS), October 2009, Australia. | IEEE | الدورة الثالثة، 2009 | ||||||
11 | Enhancing the Security of a more Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme | Muhammad Khurram Khan, | 3rd International Conference On Network & System Security (NSS), October 2009, Australia. | IEEE | الدورة الثالثة، 2009 | ||||||
12 | Enhancement of Use Case Diagram to Capture Authorization Requirements | Khaled S. Alghathbar | 4th International Conference on Software Engineering Advances, September 20-25, 2009 – Porto, Portugal. | IEEE | الدورة الرابعة، 2009 | ||||||
13 | Bio-Chaotic Stream Cipher-Based Iris Image Encryption | Abdullah. Alghamdi, Hanif. Ullah, Maqsood. Mahmud, Muhammad Khurram Khan | 7th IEEE/IFIP International Conference on Embedded And Ubiquitous Computing (Euc-09), Canada, 2009. | IEEE | الدورة السابعة، 2009 | ||||||
14 | Environment Recognition for Digital Audio Forensics Using Mpeg-7 Features and Separate Modeling Technique | Ghulam Muhammad, Mubarak O. Al-Qahtani, And Khaled Alghathbar | 10th International Workshop On Information Security Application (WISA), Pp. 3-17, August 25-27, 2009, S. Korea. | N/A | الدورة العاشرة، 2009 | ||||||
15 | Nmaca: A Novel Methodology for Message Authentication Code Algorithms | K. Alghathbar, A. Hafez, F. B. Muhaya, And H. M. Abdullah | 8Th Int. Conf. On Telecommunications And Informatics (Tele-Info ’09), May 30 – June 1, 2009. Istanbul, Turkey. | WSEAS | الدورة الثامنة، 2009 | ||||||
16 | Noisy Password Scheme: A New on Time Password System | Khaled S. Alghathbar,Hanan A. Mahmoud | 22nd Canadian Conference On Electrical And Computer Engineering, May 3-6, 2009. Canada. | IEEE | الدورة الثانية والعشرون، 2009 | ||||||
17 | Motion Estimation Analysis for Unsupervised Training for Lip Reading User Authentication Systems | Hanan A. Mahmoud , Khaled Alghathbar , Fahad Bin Muhaya | 10th WSEAS International Conference On Automation & Information, March 23-25, 2009, Prague, Czech Republic | WSEAS | الدورة العاشر، 2009 | ||||||
18 | Automatic Human Face Counting in Digital Color Images | Mona F.M. Mursi, Ghazy M.R. Assassa, Abeer Al-Humaimeedy, Khaledalghathbar, | 8th WSEAS International Conference On Signal Processing, Robotics Andautomation, Cambridge, Uk, February 21-23, 2009. | WSEAS | الدورة الثامنة، 2009 | ||||||
19 | A Secure Semi-Fragile S Image Authentication Scheme Based on Discretecosine Transform | Mona F.M. Mursi, Ghazy M.R. Assassa, Hatimaboalsamh , Khaled Alghathbar, | International Computer Conference )(ICC2009), University Of California, Fullerton, April 2009. | IEEE | الدورة الأولى، 2009 | ||||||
20 | Facerecognition Using Incremental Principal Components Analysis | Hatimaboalsamh, Hassan Mathkour, Ghazy Assassa, Mona Mursi, | International Computer Conference )ICC2009), University Of California, Fullerton, April 2009. | IEEE | الدورة الأولى، 2009 | ||||||
21 | Automated Summarization And Visualization of Unstructured Text Documents | Muhammad Abulaish And Dr. Khaled Alghathbar | 2nd International Conference On It And Business Intelligence (Itbi’10), 2010, Nagpur, India. | N/A | 2010 | ||||||
22 | Dynamic Weighted Discrimination Power Analysis in DCT Domain for Face and Palmprint Recognition | L. Leng, J. Zhang, J. Xu, Muhammad Khurram Khan, Khaled Alghathbar | International Conference On Ict Convergence (Ictc’10), 17-19 November, 2010, South Korea | IEEE | 2010 | ||||||
23 | Information Assurance in Saudi Organizations – An Empirical Study | Nabi, S. I., Mirza, A. A., & Alghathbar, K. | International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
24 | Data Confidentiality and Integrity Issues And Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan | Nabi, S. I., Nabi, S. W., Tipu, S. A. A., Haqqi, B., Abid, Z., & Alghathbar, K. | International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
25 | One-Time Password System With Infinite Nested Hash Chains | Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar | International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
26 | Issues of Security and Network Load in Presence – A Survey | Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid | International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
27 | Contactless Biometrics in Wireless Sensor Network: A Survey | Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar | International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea. | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
28 | Nmaca Approach Used to Build a Secure Message Authentication Code | Raedalosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed H. Eldefrawy | International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
29 | Using Arabic Captcha for Cyber Security | Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah Alkelabi, Abdulaziz Alajaji | International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea | Springer-Verlag, Communications in Computer and Information Science | المجلد 122 2010 | ||||||
30 | Web 2.0 Content Extraction | Mohammad Waqar, Zeeshan Shafi Khan | 5th International Conference For Internet Technology And Secured Transactions (Icitst-2010) In London, Uk | IEEE | الدورة الخامسة، 2010 | ||||||
31 | Secure Single Packet IP Traceback Mechanism to Identify The Source | Zeeshanshafi Khan, Nabilaakran, Khaled Alghathbar, Muhammad, Rashidmehmood | 5th International Conference For Internet Technology And Secured Transactions (Icitst-2010), November 8-11, 2010, London, Uk | IEEE | الدورة الخامسة، 2010 | ||||||
32 | Novel Technique for Steganography in Fingerprints Images: Design and Implementation | Hanan Mahmoud, Aljoharah Al-Dawood, Hanan Saad Al-Hulaibah, Buthainasaleh Al-Nassar, Sarah Ahmad Al-Naeem, Buthainasaleh Al-Nassar, Suha Ali Al-Qhatani, Dhay Yousef Al-Salman | 6th International Conference On Information Assurance And Security”(Ias 2010), Accepted. | IEEE | الدورة السادسة، 2010 | ||||||
33 | Novel Mapping Technique for Steganography in Fingerprints Images | Hanan Abdalla,Khaled Alghathbar | 3rd IEEE International Conference On Broadband Network & Multimedia Technology, 26-28 Oct, 2010, Beijing, China | IEEE | الدورة الثالثة، 2010 | ||||||
34 | Bio-Inspired Hybrid Face Recognition System For Small Sample Size and Large Dataset | Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar | 6th International Conference On Intelligent Information Hiding And Multimedia Signal Processing (Iih-Msp-2010), October 15-17, 2010, In Darmstadt, Germany. | IEEE | الدورة الخامسة، 2010 | ||||||
35 | A New Particle Swarm Optimization Algorithm for Dynamic Image Clustering | Salimaouadfel, Mohamed Batouche, Abdelmaliktaleb-Ahmed | 5th International Conference On Digital Information Management (Icdim 2010), Thunder Bay, Canada, 5-7 July, 2010 | IEEE | الدورة السادسة، 2010 | ||||||
36 | A Key Agreement Algorithm With Rekeying for Wireless Sensor Networks Using Public Key Cryptography | M. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar | IEEE International Conference On Anti-Counterfeiting, Security, And Identification, Chengdu, China; July 2010. | IEEE | الدورة الأولى، 2010 | ||||||
37 | Attacking Websites During Crises: Analysis And Solutions | Khaled Alghathbar, | International Forum For Crisis Management, Jeddah, Saudi Arabia, 26 May 2010. (In Arabic) | N/A | الدورة الأولى، 2010 | ||||||
38 | Face Recognition Using Layered Linear Discriminant Analysis And Small Subspace | Muhammad Imran, Rubiyahyousaf, Muhammad Khurram Khan, Khaled Alghathbar | 10th IEEE International Conference On Computer And Information Technology (Cit2010), Bradford, Uk, 29 June – 1 July, 2010 | IEEE | الدورة العاشرة، 2010 | ||||||
39 | Security Analysis of Firewall Rule Sets in Computer Networks | Bilal Khan, Maqsood Mahmud, Muhammad Khurram Khan, Khaled S. Alghathbar | 4th International Conference On Emerging Security Information, Systems And Technologies Securware 2010, Venice/Mestre Italy, July 2010. | IEEE | الدورة الخامسة، 2010 | ||||||
40 | A Novel Approach For Online Signature Verification Using Fisher Based Probabilistic Neural Network | Souham Meshoul And Mohamed Batouche, | 15th IEEE Symposium On Computers And Communications (Iscc’10),June 22-25, 2010, Riccione, Italy. | IEEE | الدورة الخامسة عشر، 2010 | ||||||
41 | Combining Fisher Discriminant Analysis and Probabilistic Neural Network For Effective On-Line Signature Recognition | Souham Meshoul And Mohamed Batouche | 10th International Conference On Information Science, Signal Processing And Applications -Isspa’2010, Ieee Press, 10-13 May, 2010, Kuala Lumpur, Malaysia. | IEEE | الدورة العاشرة، 2010 | ||||||
42 | Security Analysis Of ‘Two-Factor User Authentication In Wireless Sensor Networks’ | Muhammad Khurram Khan, Khaled Alghathbar | 4th International Conference On Information Security And Assurance (Isa’10), Miyazaki, Japan.2010. | Springer-Verlag, Lecture Notes in Computer Science | المجلد 6059، 2010 | ||||||
43 | Fingerprint Verification Based On Statistical Analysis | Mohammad Sayim Khalil, D. Muhammad, Muhammad Khurram Khan, Khaled Alghathbar | 5th International Conference On Future Information Technology (Futuretech), Busan, South Korea. | IEEE | الدورة الخامسة، 2010 | ||||||
44 | Application Of Operating Security Regions In Power Systems | Mohamed A. El-Kady, Essam A. Al-Ammar | IEEE PES Transmission And Distribution Conference And Exposition, New Orleans, Usa, April 2010. | IEEE | الدورة الأولى، 2010 | ||||||
45 | A Quantum Inspired Learning Cellular Automaton For Solving The Travelling Salesman Problem | Amerdraa, Souham Meshoul | 12th International Conference On Computer Modelling And Simulation, Cambridge University (Emmanuel College) England, 24 – 26 March 2010 | IEEE | الدورة الثانية عشر، 2010 | ||||||
46 | Fingerprint Verification Using Fingerprint Texture | Mohammed Sayim Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Qais Al-Nuzaili | 9th IEEE International Symposium On Signal Processing And Information Technology (Isspit) , Uae, Dec. 14-17, 2009. | IEEE | الدورة الثانية عشر، 2010 | ||||||
47 | A Web Content Mining Approach For Tag Cloud Generation | Muhammad Abulaish, Tarique Anwar | 13th International Conference On Information Integration And Web-Based Applications & Services (IIWAS2011), 5-7 December 2011, Veitnam. | ACM | الدورة الثالثة عشر،2011 | ||||||
48 | Biometric Driven Initiative System for Passive Continuous Authentication | Muhammad Khurram Khan, Pei-Wei Tsai, J.S Pan, B.Y Liao5 | 7th IEEE International conference on Information Assurance and Security (IAS), Malaysia. | IEEE | الدورة السابعة، 2011 | ||||||
49 | Xminer: Nip The Zero Days Exploit In The Bud | M. Zubair Rafique And Muhammad Abulaish | 10th International IEEE Symposium On Network Computing And Applications”, Cambridge, Usa 2011. | IEEE | الدورة العاشرة،2011 | ||||||
50 | A Data Mining Framework For Securing 3G Core Network From Gtp Fuzzing Attacks | Faraz Ahmed, M Zubair Rafique And Muhammad Abulaish, | 7th International Conference On Information Systems Security (ICISS 2011), Kolkata, India, Dec 2011 | Springer-Verlag, Lecture Notes in Computer Science | المجلد 7093، 2011 | ||||||
51 | Deducting Fingerprint Singular Points Using Orientation Field Reliability | Mohmmad Sayim Khalil | International Conference Robot, Vision And Signal Processing 21-23 November 2011, Kaohsiung, Taiwan. | IEEE | الدورة الأولى، 2011 | ||||||
52 | Analysis of Saudi Arabian Cyber Crime Act | Bilal Khan, Khaled Alghathbar | 6th International Conference on Legal, Security And Privacy Issues In It (Lspi 2011), Aug 2011. | IAITL
|
الدورة السادسة، 2011 | ||||||
53 | Information Security Awareness Campaign: An Alternate Approach | Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan | 5th International Conference on Information Security And Assurance: ISA May 2011. | Springer-Verlag, Communications in Computer and Information Science | المجلد 200، 2011 | ||||||
54 | Web Content Mining for Alias Identification: A First Step Towards Suspect Tracking | Tarique Anwar, Muhammad Abulaish And Khaled Alghathbar | IEEE International Conference on Intelligence And Security Informatics (ISI-2011), Bejing, China, July 2011. | IEEE | الدورة الأولى، 2011 | ||||||
55 | Simont: A Security Information Management Ontology | Muhammad Abulaish, Syed Irfannabi, Khaled Alghathbar, Azeddine Chikh | 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
56 | Two Dimensional Palmphasor Enhanced by Multi-Orientation Score Level Fusion | L. Leng, J. Zang, G. Chen, Muhammad Khurram Khan, P. Bai | 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011, Greece. | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
57 | A Framework For Detecting Malformed SMS Attack | M. Zubairrafique, Muddassarfarooq, Muhammad Khurram Khan, Khaled Alghathbar | 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011, Greece. | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
58 | Embedding High Capacity Covert Channels In Short Message Service (SMS) | M. Zubairrafique, Muddassarfarooq, Muhammad Khurram Khan, Khaled Alghathbar | 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
59 | An Ontology Based Information Security Requirements Engineering Framework | Azeddine Chikh, Muhammad Abulaish, Syed Irfannabi, Khaled Alghathbar | 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
60 | Exclusion Based Vanets (Ebv) | A. Al-Daraiseh, Mohammed Morsi | 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece | Springer-Verlag, Communications in Computer and Information Science | المجلد 186، 2011 | ||||||
61 | Co-Occurrence Matrix Features For Fingerprint Verification | Mohammed Sayim Khalil, Muhammad Khurram Khan | 5th IEEE International Conference on Anti-Counterfeiting, Security, And Identification, Jun24-26,2011; Xiamen, China. | IEEE | الدورة الخامسة، 2011 | ||||||
62 | Presence Based Secure Instant Messaging Mechanism For Ip Multimedia Subsystem | Zeeshanshafi Khan | 11th International Conference on Computational Science And Its Applications, June 20-23, 2011, Spain. | Springer-Verlag, Lecture Notes in Computer Science | المجلد 6786،2011 | ||||||
63 | Two-Directional Two-Dimensional Random Projection And Its Variations For Face And Palmprint Recognition | L. Leng, J. Zhang, G. Chen, M.K. Khan, K. Alghathbar | 11th International Conference On Computational Science And Its Applications (Iccsa’11), 20-23 June 2011, Spain. | Springer, Lecture Notes in Computer Science | المجلد 6786،2011 | ||||||
64 | Application Of Evolutionary Algorithms In Detecting Sms Spam At Access Layer | M. Zubairrafique, Nasser Alrayes, Muhammad Khurram Khan, Khaled Alghathbar | 13th annual conference on Genetic and evolutionary computation, 12-16 July, 2011, Dublin, Ireland. | ACM | الدورة الثالثة عشر، 2011 | ||||||
65 | Qualified Analysis B/W Esb(S) Using Analytical Hierarchy Process (Ahp) Method | Zeeshansiddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, | 2nd IEEE International Conference On Intelligent Systems, Modelling And Simulation, January 2011, Malaysia. | IEEE | المؤتمر الثاني، 2011 | ||||||
66 | Environment Sound Recognition For Digital Audio Forensics Using Zc, Mfcc And Mpeg-7 Features | Mubarak Obaidalqahtani, Ghulam Muhammad, Mohamed M. Abd-Eldayem | IEEE International Conference On Psychology Psychological Sciences And Computer Science (PPSCS), Pp. 34-37, 2010, China. | Springer-Verlag, Communications in Computer and Information Science | المجلد 189،2011 | ||||||
67 | Otp-Based Two-Factor Authentication Using Mobile Phones | Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan | 88th International Conference On Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, Nevada, Usa. | IEEE | الدورة الثامنة، 2011 | ||||||
68 | Securing Ip-Multimedia Subsystem (IMS) Against Anomalous Message Exploits By Using Machine Learning Algorithms | M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar | 8th International Conference On Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, Nevada, Usa. | IEEE | الدورة الثامنة، 2011 | ||||||
69 | Relation Characterization Using Ontological Concepts | Muhammad Abulaish, | 8th International Conference On Information Technology: New Generations (Itng’11), April 11-13, 2011, Las Vegas, Nevada, Usa. | IEEE | الدورة الثامنة، 2011 | ||||||
70 | Secure Instant Messaging Protocol For Centralized Communication Group | Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan Elkamchouchi | 4th IFIP International Conference On New Technologies, Mobility And Security (NTMS), February 2011, Paris, France. | IEEE | الدورة الرابعة، 2011 | ||||||
71 | A Comparison Between It Workers And End-Users Outlook On The Soundness Of Information Security Measures In Saudi Arabian Organizations | Nabi, Syed Irfan, Abdulrahman A. Mirza, Khaled Alghathbar | AIS SIGSEC Workshop On Information Security & Privacy, 2010, USA. | SIGSEC | 2010 | ||||||
72 | Quaternary privacy-levels Preservation in Computer forensics Investigation process | Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar. | 6th international conference for internet technology and secured transactions (ICITS) dec 11-14,2011, Abu Dhabi | IEEE | الدورة السادسة، 2011 | ||||||
73 | Implementation of ISO 27001 in Saudi arabia–onstacles, motivations, outcomes, and lessons learned | Belal AbuSaad, Khaled Alghathbar, Fahad A. Saeed, Bilal Khan | 9th Australian Information Security Management Conference | ECU | الدورة التاسعة، 2011 | ||||||
74 | Multi-levels Privacy-Preserving Computer Forensics Investigation | Waleed Halboob, Muhammad Abulaish, and Khaled S. Alghathbar | 5th International Conference on Cybercrime Forensics Education and Training (CFET 2011), 1st and 2nd Sept 2011, Canterbury, UK. | CFET | الدورة الخامسة، 2011 | ||||||
75 | A Statistical Approach for Automatic Keyphrase Extraction | Abulaish, M., Jahiruddin, Dey L | 5th Indian International Conference on Artificial Intelligence (IICAI’11), Bangalore, India | IEEE | الدورة الخامسة، 2012 | ||||||
76 | Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes | M. H. Eldefrawy, K. Alghathbar, M. K. Khan | The International Symposium on Biometrics and Security Technologies (ISBAST’12), Taipei, Taiwan | IEEE | الدورة الأولى، 2012 | ||||||
77 | An Activity Pattern Based Wireless Intrusion Detection System | Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha | 9th International Conference on Information Technology : New Generations, USA | IEEE | الدورة التاسعة، 2012 | ||||||
78 | BAN Logic Based Security Proof for Mobile OTP Authentication Scheme | Mohammed Saeed Alkatheiri, M.H. Eldefrawy, Muhammad Khurram Khan | 7th International Conference on Future Information Technology (FutureTech’12) Vancouver, Canada | Springer-Verlag, Lecture Notes in Electrical Engineering | المجلد 164، 2012 | ||||||
79 | Identifying Cliques in Dark Web Forums: An Agglomerative Clustering Approach | Tarique Anwar and Muhammad Abulaish | IEEE International Conference on Intelligence and Security Informatics | IEEE | الدورة الأولى، 2012 | ||||||
80 | State of the Art in Trusted Computing Forensics | W. Halboob, R. Mahmod | 6th International Symposium on Digital Forensics and Information Security (DFIS-12 | Springer-Verlag,
|
المجلد 179، 2012 | ||||||
81 | Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs | Farrukh A. Khan, H. Ehsan | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12) | IEEE | الدورة الحادية عشر، 2012 | ||||||
82 | Performance Comparison Between SVM-based and RBF-based for Detection of Saudi License Plate | Fajri Kurniawan, Mohammed S. Khalil | 8th International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA2012) | IEEE | الدورة الثامنة، 2012 | ||||||
83 | Graph-Based Learning Model for Detection of SMS Spam on Smart Phones | Z. Rafique, M. Abulaish | 8th International Wireless Communication and Mobile Computing Conference (IWCMC 2012) Trust, Privacy and Security Symposium | IEEE | الدورة الثامنة، 2012 | ||||||
84 | An MCL-Based Approach for Spam Profile Detection in Online Social Networks | F. Ahmed, M. Abulaish, | 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications | IEEE | الدورة الثانية عشر، 2012 | ||||||
85 | A Density-Based Approach for Mining Overlapping Communities from Social Network Interactions | Sajid Y. Bhat and Muhammad Abulaish | 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS), Craiova, Romania, ACM | ACM | الدورة الثانية، 2012 | ||||||
86 | Mining Feature-Opinion Pairs and their Reliability Scores from Web Opinion Sources | Ahmad Kamal, Muhammad Abulaish, Tarique Anwar, | 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS), Craiova, Romania, ACM | ACM | الدورة الثانية، 2012 | ||||||
87 | A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders | Nur Al Hasan Haldar, Muhammad Abulaish and Syed Ashim Pasha, | International Conference on Network Security and Applications (CNSA), Chennai, India, , Springer | Springer-Verlag, Advances in Intelligent and Soft Computing Book Series | المجلد 186، 2012 | ||||||
88 | A Review of Fingerprint Pre-processing using a Mobile Phone | Mohammed S. Khalil and Fajri Kurniawan | International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR). | IEEE | الدورة الأولى، 2012 | ||||||
89 | Forensic Analysis of Digsby Log Data to Trace Suspected User Activities | Muhammad Yasin, Muhammad Abulaish, Muhammad N. Elmogy | 9th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2012). | Springer-Verlag, Lecture Notes in Electrical Engineering | المجلد 180، 2012 | ||||||
90 | Two-Dimensional Cancelable Biometric Scheme”, Accepted | L. Leng, S. Zhang, X. Bi, Muhammad Khurram Khan | 8th IEEE International Conference on Wavelets Analysis and Pattern Recognition (ICWAPR’12), China, July 2012 | IEEE | الدورة الثامنة، 2012 | ||||||
91 | Password-Less Authentication Framework for OpenID Systems to Avoid Phishing Attacks | Haider Abbas, Khaled Alghathbar, Kashif Akhtar Saleem, Moeen Qaemi Mahmoodzadeh | 7th LCN Workshop on Security in Communications Networks | IEEE | الدورة السابعة، 2012 | ||||||
92 | Comprehensive Parent Selection-based Genetic Algorithm | Farrukh Khan,Hamid Ali | 32nd SGAI International Conference on Artificial Intelligence | Springer-Verlag, Research and Development in Intelligent Systems | المجلد xxix، 2012 | ||||||
93 | Detecting Counterfeit-Money using RFID-enabled Mobile Devices | Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan | 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK | IEEE | الدورة السابعة، 2012 | ||||||
94 | Enhanced Ant Colony Algorithm for Self-Optimized Data Assured Routing in Wireless Sensor Netowrks
|
Kashif Saleem, Norsheila Fisal | 18th International Conference on Networks (ICON) | IEEE | الدورة الثامنة عشر، 2012 | ||||||
95 | Mobile IPV6 based Autonomous Routing Protocol (MARP) For Wireless Sensor Networks
|
Kashif Saleem, Zahid Farid, Mohammad Ghulam Rahman | Building Next-Generation Converged Networks: Theory and Practice: Chapter in Book to be published by: CRC Press, Taylor & Francis Group, USA, 2012 | Taylor & Francis | 2012 | ||||||
96 | An MCL-Based Text Mining Approach for Namesake Disambiguation on the Web |
|
12th IEEE/WIC/ACM International Conference on Web Intelligence, Macau | IEEE/WIC/ACM | الدورة الثانية عشرة ، 2012 | ||||||
97 | WLAN Location Privacy acquisition using Client Server Based Architecture | Muhammad Junaid Khan Haider Abbas | 10th International Conference on Information Technology: New Generations Las Vegas, Nevada, USA | IEEE | الدورة العاشرة، 2013 | ||||||
98 | Energy Efficient Information Assured Routing based on Hybrid Optimization Algorithm for WSNs | Kashif Saleem, Norsheila Fisal | 10th International Conference on Information Technology: New Generations (ITNG 2013) | IEEE | الدورة العاشرة، 2013 | ||||||
99 | Securing Internet Information Services (IIS) Configuration Files | Haider Abbas,Saneeha Khalid | 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) | IEEE | الدورة السابعة، 2013 | ||||||
100 | A Real-Time Empirical Study of BIOSARP based Wireless Sensor Network Testbed | Kashif Saleem ,Norsheila Fisal & M. Ariff Baharudin | 11th IEEE SENSORS | IEEE | الدورة الحادية عشر، 2012 | ||||||
101 | Anti-Phishing Open ID | Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan | The 2013 FTRA International Conference on Advanced IT, engineering and Management (FTRA AIM-13) | FTRA | الدورة الأولى، 2013 | ||||||
102 | Core-point Detection on Camera-based Fingerprint Image | Fajri Kurniawan, Mohammed S. Khalil | 2nd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) | IEEE | الدورة الثالثة، 2013 | ||||||
103 | Cryptanalysis of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme’ | Saru Kumari, Muhammad Khurram Khan | 3rd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) | IEEE | الدورة الثالثة، 2013 | ||||||
104 | Anticipating Dormant Functionality in Malware – A Semantics based Approach | Muzammil Noor, Haider Abbas | 3rd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) | IEEE | الدورة الثالثة، 2013 | ||||||
105 | Security and Privacy Issues in Near Field Communication (NFC) Systems | Hammad Kazmi, Haider Abbas, Farrukh Aslam Khan | 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications | IEEE | الدورة الثانية عشر، 2013 | ||||||
106 | Group Counseling Optimization for Multi-objective Functions | Hamid Ali, Farrukh Aslam Khan | 5th IEEE Congress on Evolutionary Computation (CEC 2013) | IEEE | الدورة الخامسة عشر، 2013 | ||||||
107 | Welfare State Optimization | Hamid Ali, Farrukh Aslam Khan | 5th IEEE Congress on Evolutionary Computation (CEC 2013) | IEEE | الدورة الخامسة عشر، 2013 | ||||||
108 | Truth of Network Layer Attacks and AODV Defense in MANETS | Amna Saeed, Muhammad Nasim, Asad Raza, Haider Abbas | International Conference on Intelligent Computing Special Session on Biometrics System and Security for Intelligent Computing | Springer-Verlag | الدورة التاسعة، 2013 | ||||||
109 | Cryptanalysis of an improved remote password authentication scheme with smartcard | Mohammed Khurram Khan, Debiao He | 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications | IEEE | الدورة الثانية عشرة ، 2013 | ||||||
110 | A Hybrid Technique using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network | Arif Jamal Malik, Farrukh Aslam Khan | 26th IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2013 | IEEE | الدورة السادسة والعشرون، 2013 | ||||||
111 | Optimized Energy-efficient Iterative Distributed Localization for Wireless Sensor Networks | Mansoor-ul-haque, Farrukh Aslam Khan, Mohsin Iftikhar | 26th IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2013 | IEEE | الدورة السادسة والعشرون، 2013 | ||||||
112 | Community-Based Features for Identifying Spammers in Online Social Networks | Sajid Yousuf Bhat, Muhammad Abulaish | 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
|
IEEE/ACM | الدورة الأولى، 2013 | ||||||
113 | Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks | Faraz Ahmed, Muhammad Abulaish | 15th Asia-Pacific Web Conference (APWeb’13)
|
Springer-Verlag, Lecturer Note in Computer Science | الدورة الخامسة عشر، 2013 | ||||||
114 | Cloud Computing Risk Assessment: A Systematic Review | Rabia Latif, Haider Abbas, Saïd Assar, Qasim Ali
|
7th International Symposium on Digital Forensics and Information Security (DFIS-13).
|
Springer-Verlag, Lecture Notes in Electrical Engineering | الدورة السابعة، 2013 | ||||||
115 | An Efficient Computer Forensics Selective Imaging Model
|
Waleed Halboob, Khaled S. Alghathbar, Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullah, Ali Deghantanha
|
7th International Symposium on Digital Forensics and Information Security (DFIS-13).
|
Springer-Verlag, Lecture Notes in Electrical Engineering | الدورة السابعة، 2013 | ||||||
116 | Statistical Features Identification for Sentiment Analysis using Machine Learning Techniques | Kamal, A and Abulaish, M.
|
International Symposium on Computational and Business Intelligence. | IEEE | الدورة الأولى، 2013 | ||||||
117 | Overlapping Social Network Communities and Viral Marketing | Sajid Yousuf Bhat, Muhammad Abulaish | International Symposium on Computational and Business Intelligence (ISCBI’13).
|
IEEE | الدورة الأولى، 2013 | ||||||
118 | OCTracker: A Density-Based Framework for Tracking the Evolution of Overlapping Communities in OSNs | Sajid Yousuf Bhat, Muhammad Abulaish | IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Istanbul, Turkey. | IEEE/ACM | الدورة الأولى، 2013 | ||||||
119 | Mining an Enriched Social Graph to Model Cross-Thread Community Interactions and Interests | Tarique Anwar
|
3rd International Workshop on Modeling Social Media (MSM): Collective Intelligence in Social Media – Co-located with the 23rdACM Conference on Hypertext and Social Media, Milwaukee, WI, USA. | ACM | الدورة الثالثة، 2013 | ||||||
120 | Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs
|
Kashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, and Mehmet Ali Orgun | 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13) International Workshop on Security & Optimization for Wireless Networks (SOWN 2013). | IEEE | الدورة الثالثة عشر، 2013 | ||||||
121 | Security Requirement Specification Framework for Cloud Users | Rida Naveed, Haider Abbas, Saïd Assar | 7th International Symposium on Digital Forensics and Information Security (DFIS-13). | Springer-Verlag, Lecture Notes in Electrical Engineering | المجلد 276، 2014 | ||||||
122 | Securing Mass Storage Devices with Two Authentication Factors | Mohamad Eldefrawy
Muhammad Khurram Khan, Hassan Elkamchouchi
|
11th International Conference on Information Technology: New Generations ITNG 2014. | IEEE | الدورة الحادي عشر، 2014 | ||||||
123 | Logical Conjunction of Triple-perpendicular-directional Translation Residual for Contactless Palmprint Preprocessing | Muhammad Khurram Khan
Lu Leng, Gang Liu, Ming Li
|
11th International Conference on Information Technology: New Generations ITNG 2014. | IEEE | الدورة الحادي عشر، 2014 | ||||||
124 | License Plate Detection Method for Real-time Video of Low-Cost Webcam based on Hybrid SVM-Heuristic Approach | Mohammed Sayim Khalil
Fajri Kurniawan
|
11th International Conference on Information Technology: New Generations ITNG 2014. | IEEE | الدورة الحادي عشر، 2014 | ||||||
125 | Third Line of Defense Strategy to Fight against SMS-based Malware in Android-based Smartphones
|
Abdelouahid Derhab, & Kashif Saleem Ahmed Youssef | 10th International Wireless Communications and Mobile Computing Conference (IWCMC 2014)
|
IEEE | الدورة العاشرة، 2014 | ||||||
126 | SMART: Secure Multi-pAths Routing for wireless sensor neTworks
|
Abdelouahid Derhab,
Noureddine Lasla, Abdelraouf Ouadjaout, Miloud Bagaa, Yacine Challal
|
13th Ad-Hoc Networks and Wireless (ADHOC-NOW)
|
Springer-Verlag | الدورة الثالثة عشر، 2014 | ||||||
127 | CARPM: Cross Layer Ant Based Routing protocol for Wireless Multimedia Sensor Network
|
M.Abazeed, K. Saleem, N. Fisal, S. Zubair | 13th Ad-Hoc Networks and Wireless (ADHOC-NOW)
|
Springer-Verlag | الدورة الثالثة عشر، 2014 | ||||||
128 | ROB-based Cloud Computing SLA Dynamic and Secure Management Model | Waleed Halboob , Haider Abbas, Kamel Haouam | 10th International Conference on Intelligent Computing (ICIC 2014) | Springer-Verlag | الدورة العاشرة، 2014 | ||||||
129 | Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud Assisted WBAN | Rabia Latif, Haider Abbas | 10th International Conference on Intelligent Computing (ICIC 2014) | Springer-Verlag | الدورة العاشرة، 2014 | ||||||
130 | Countering Advanced Persistent Threat (APT) using Security Information and Event Management
|
Natasha Shoaib, Haider Abbas, Farrukh Aslam Khan, Jalal Al Muhtadi | 4th International Symposium on Biometric and Security Technologies (ISBAST’14) | IEEE | الدورة الرابعة، 2014 | ||||||
131 | Push-based XML access control policy languages: A review
|
Waleed Halboob, Ali Mamat, Ramlan Mahmod | 4th International Symposium on Biometric and Security Technologies (ISBAST’14) | IEEE | الدورة الرابعة، 2014 | ||||||
132 | DWT+LSB-based Fragile Watermarking Method For Digital Quran Images
|
Fajri | 4th International Symposium on Biometric and Security Technologies (ISBAST’14) | IEEE | الدورة الرابعة، 2014 | ||||||
133 | Detection and Prevention of Black Hole Attacks in
Mobile Ad hoc Networks |
Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, Mohsin Iftikhar | Thirteenth International Conference on Ad-Hoc Networks and Wireless (Ad Hoc NOW)
|
Springer-Verlag | الدورة الثالثة عشر، 2014 | ||||||
134 | Particle Swarm Optimization with Non-Linear Velocity | Arif Jamal Malik, Farrukh Aslam Khan | IEEE International Conference on Systems, Man, and Cybernetics (SMC2014)
|
IEEE | الدورة السادسة والعشرون، 2014 | ||||||
135 | A cloud-based framework for security and patients’ data privacy using body sensor networks for ubiquitous healthcare applications | Farrukh Aslam Khan, Aftab Ali, Haider Abbas, Nur Al hasan | 9th International Conference on Future Networks and Communications
|
Elsevier | الدورة التاسعة، 2014 | ||||||
136 | Low Delay and Secure M2M Communication Mechanism for eHealthcare | Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi | IEEE HEALTHCOM 2014 – 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth | IEEE | الدورة السادسة عشر، 2014 | ||||||
137 | Spam Trapping System: Novel Security Framework to Fight Against Spam Botnets | Abdelouahid Derhab Abdelghani Bouras Fahad Bin Muhaya
Muhammad Khurram Khan Yang Xiang |
21st IEEE International Conference on Telecommunications (ICT 2014) | IEEE | الدورة الحادية والعشرين، 2014 | ||||||
138 | A Survey on Network Layer Attacks and AODV Defense in Mobile Ad-hoc Networks | Amna Saeed, Asad Raza, Haider Abbas | 8th IEEE International Conference on Software Security and Reliability , San Francisco , USA
|
IEEE | الدورة الثامنة، 2014 | ||||||
139 | Security Issues of Chen et al.’s Dynamic ID-based Authentication Scheme | Muhammad Khurram , S. Kumari, X. Wang, R. Kumar, | 2th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014) | IEEE | الدورة الثانية عشر، 2014 | ||||||
140 | Notes on A Password-Based Remote User Authentication Scheme without Smart Card | S. Kumari, Muhammad Khurram Khan, X. Li, R. Kumar | 4th International Symposium on Biometric and Security Technologies (ISBAST’14) | IEEE | الدورة الرابعة، 2014 | ||||||
141 | Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture | X. Li, Muhammad Khurram Khan, S. Kumari | 4th International Symposium on Biometric and Security Technologies (ISBAST’14) | IEEE | الدورة الرابعة، 2014 | ||||||
142 | Twitter Data Mining for Events Classi cation and Analysis | Nausheen Azam, Jahiruddin, Muhammad Abulaish, Nur Al-Hasan Haldar
|
2nd International Conference on Soft Computing & Machine Intelligence | IEEE | |||||||
143 | Feasibility Analysis for Incorporating/Deploying SIEM for Forensics Evidence Collection in Cloud Environment | Muhammad Irfan, Haider Abbas, Waseem Iqbal | 14th IEEE/ACIS International Conference on Computer and Information Science 2015, Las Vegas, U.S.A | IEEE | |||||||
144 | Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs | Asad Raza, Haider Abbas, Muhammad Siddiqui | The 2015 IEEE International Conference on Software Quality, Reliability and Security, Vancouver, Canada | IEEE | |||||||
145 | Network Intrusion Detection using Diversity-based Centroid Mechanism | Muhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan | 12th International Conference on Information Technology : New Generations (ITNG 2015), Las Vegas, Nevada | IEEE | |||||||
146 | Analysis of Detection Features for Wormhole Attacks in MANETs | Muhammad Imran, Farrukh Aslam Khan, Tauseef Jamal, Muhammad Hanif Durad | International Workshop on Cyber Security and Digital Investigation (CSDI 2015) (in conjunctions with MobiSPC 2015), August 17-20, 2015, Belfort, France. Procedia Computer Science (Elsevier), Volume 56, 2015, Pages 384-390.
|
Elsevier | |||||||
147 | ECG Arrhythmia Classification using Mahalanobis-Taguchi System in a Body Area Network Environment | Aftab Ali, Nur Al Hasan Haldar, Farrukh Aslam Khan, Sana Ullah | IEEE Global Communications Conference (IEEE Globecom 2015), December 6-10, 2015, San Diego, California, USA. | IEEE | |||||||
148 | Perceptual Feature Extraction Model for Arabic Literal Amounts Recognition
|
Fajri Kurniawan, Mohammed Sayim Khalil, | International Conference on Innovation in Science and Technology (IICIST 2015)
|
IEEE | |||||||
149 | Dual-Microphone Forensics of Identical Model Based on Signal Analysis | Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan and Hafiz Malik | 5th International Conference on Information Systems and Technologies (ICIST 2015) Istanbul, Turkey, March 21 – 23 December 2015 |
Cambridge Scholars | |||||||
150 | Robust Tampered Detection Method For Digital Audio using Gabor Filterbank
|
Fajri Kurniawan,
Mohammed S. Khalil and Hafiz Malik
|
International Conference on Image Processing, Production and Computer Science June 3-4, 2015 Istanbul (Turkey)
|
URST | |||||||
151 | Anomaly Detection using Wavelet-Based Estimation of LRD in Packet and Byte Count of Control Traffic | Zeb Khan, Basil AsSadhan, Jalal Al-Muhtadi, and Saleh Alshebeili
|
7th International Conference on Information & Communication Systems (iCICS’16) April 5-7, 2016, Irbid, Jordan | IEEE | |||||||
152 | DDoS Attacks and Countermeasures in Cyberspace
|
Zeb khan | 22nd World Symposium on Web Applications and Networking (WSWAN), 2015 | IEEE | |||||||
153 | Survey on Mobile User’s Data Privacy Threats and Defense Mechanisms
|
Jalaluddin Khan, Haider Abbas, Jalal Al-Muhtadi | The 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops
|
Elsevier | |||||||
154 | Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing
|
Waleed Halboob, Haider Abbas, Kamel Haouam, Asif Yaseen | 10th International Conference on Intelligent Computing (ICIC2014), Taiyuan, China | Springer-Verlag | |||||||
155 | Data Warehousing Based Computer Forensics Investigation Framework | Waleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem | 12th International Conference on Information Technology : New Generations, Las Vegas, Nevada, USA | IEEE | |||||||
156 | Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation
|
Waleed Halboob , Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullaha
|
The 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops
|
Elsevier | |||||||
157 | Cryptanalysis and Enhancement of a Password-Based Authentication Scheme | Mohamed Eldefrawy and Jalal Al-Muhtadi | Seventh IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2015) Vancouver, Canada.
|
IEEE | |||||||
158 | A Lightweight Key Freshness Scheme for Wireless Sensor Networks
|
Ata UllahGhafoor, Muhammad Sher, Muhammad Imran, and
KashifSaleem
|
International Conference on Information Technology – New Generations 2015 (ITNG 2015)
|
IEEE | |||||||
159 | Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks
|
Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, and Jalal Al-Muhtadi
|
12th International Conference on Information Technology – New Generations 2015 (ITNG 2015)
|
IEEE | |||||||
160 | Analysis of Secure Routing Protocols for Wireless Mesh Network | Shaker Al Anazi; Kashif Saleem, Ph.D.; and Jalal Al Muhtadi | 12th International Conference on Information Technology – New Generations 2015 (ITNG 2015) | IEEE | |||||||
161 | Enhanced Inteliigent Security Mechanism for Mobile Devices Authentication to share eHealth Information | Kashif Saleem, Ph.D. and Christoph Thuemmler | 12th International Conference on Information Technology – New Generations 2015 (ITNG 2015) | IEEE | |||||||
162 | An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks | R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan | International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK
|
IEEE | |||||||
163 | Enabling Consumer Trust upon Acceptance of IoT Technologies through Security and Privacy Model | W.Z Khan, M.Y Aalsalem, Muhammad Khurram Khan, Q. Arshad | 11th International Conference on Future Information Technology (FutureTech’16), April 2016, Beijing, China | Springer-Verlag | |||||||
164 | A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering | A. Aburumman, W.J Seo, R. Islam, Muhammad Khurram Khan, K. K.R. Choo | SecureComm 2015 | Springer-Verlag | |||||||
165 | On Resilience of Wireless Mesh Routing Protocol against DoS Attacks in IoT-based Ambient Assisted Living Applications | Shaker Alanazi, Jalal Al Muhtadi, Abdelouahid Derhab, Kashif Saleem, Afnan Alromi, Hanan Alholaibah, Joel J. P. C. Rodrigues | IEEE Healthcom 2015 | IEEE | |||||||
166 | A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks | Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui | IEEE Wireless Communications and Networking Conference (WCNC 2016)
|
IEEE | |||||||
167 | A Preeclampsia Diagnosis Approach using Bayesian Networks
|
Mário W. L. Moreira, Joel J. P. C. Rodrigues, Antonio M. B. Oliveira, Ronaldo F. Ramos, Kashif Saleem | 2016 IEEE International Conference on Communications (IEEE ICC 2016)
|
IEEE | |||||||
168 | Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs | Asad Raza, Jamal Nazzal Al-Karaki, Haider Abbas | 13th International Conference on Information Technology: New Generations | Springer-Verlag | |||||||