Publihsed Papers

رقم عنوان البحث الباحثون المجلة العلمية الناشر المجلد والعدد والتاريخ عامل الأثر
1 An Approach to Establish a Center of Excellence in Information Security Khaled Alghathbar International Journal of Computer Science and Information Security Inderscience المجلد 8، العدد 3، مارس 2008 n/a
2 Adapting and Accelerating The Stream Cipher algorithm RC4 Using Ultra Gridsec AndHiman and Use it to Secure Himan Data Hisham A. Kholidy, Khaled S. Alghathbar Journal of Information Assurance and Security MIRLABS المجلد 4، 2009 n/a
3 Efficient Approach for Security Information Retrieval by Using Grid Hameed Ullah Khan Journal of Computer Science Science publications المجلد 5، العدد 12، 2009 0.300
4 Generic-Point Parallel Scalar Multiplication Without Precomputations Turki Faisal Al-Somani IEICE Electronics Express J-STAGE المجلد 6، العدد 24، 2009 0.482
5 The Use of Nmaca Approach in Building a Secure Message Authentication Code Khaled S. Alghathbar And Alaaeldin M. Hafez International Journal of Education and Information Technologies NAUN المجلد 3، العدد 3، 2009 n/a
6 Block-Based Motion Estimation Analysis for Lip Reading User Authentication Systems Khaled Alghathbar, Hanan A. Mahmoud WSEAS Transactions on Information Science & Applications WSEAS المجلد 6، العدد 5، مايو 2009 0.545
7 Face Detection And Counting in Color Images Mona F.M. Mursi, Ghazy M.R. Assassa, Abeer Al-Humaimeedy , Khaled Alghathbar WSEAS Transactions on Computers, Transactions Id WSEAS المجلد 6، العدد 5، مايو 2009 0.545
8 Fingerprint Biometric-Based Self And Deniable Authentication Schemes for the Electronic World Muhammad Khurram Khan, IETE Technical Review IETE المجلد 26، العدد 3، مايو- يونيو 2009 0.724
9 Information Sharing in Vehicular Adhoc Network A. Rahim, Z.S Khan, Fahad B. Muhaya, M. Sher, Muhammad Khurram Khan International Journal of Computers, Communications & Control CCC Publications, R & D Agora. المجلد 5، العدد 5، 2010 0.438
10 Dynamic Weighted Discrimination Power Analysis: A Novel Approach for Face and Palmprint Recognition in DCT Domain Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Khaled Alghathbar International Journal of Physical Sciences Academic journals المجلد 5، العدد 17، 2010 0.554
11 Sensor Based Framework for Secure Multimedia Communication in Vanet Aneel Rahim, Zeeshan Shafi Khan, Fahad T. Bin Muhaya, Muhammad Sher, T.H Kim Sensors International Information Institute المجلد 10، 2010 1.953
12 A Quantum Evolutionary Algorithm for Data Clustering Chafikaramdane, Souham Meshoul, Mohamed Batouche, Mohamed-Khireddinekholladi International Journal of Data Mining, Modeling and Management Inderscience المجلد 2، العدد 2، 2010 n/a
13 Cryptanalysis of A Handover Authentication Scheme Using Credentials Based on Chameleon Hashing E.J Yoon, Muhammad Khurram Khan, K.Y Yoo IEICE Transactions on Information and Systems Maruzen Co., Ltd/Maruzen Kabushikikaisha المجلد B93، العدد 11، 2010 0.218

 

 

14 Improvement of the Efficient Secret Broadcast Scheme E.J Yoon, Muhammad Khurram Khan, K.Y Yoo IEICE Transactions on Information and Systems Maruzen Co., Ltd/Maruzen Kabushikikaisha المجلد B93، العدد 11، 2010 0.218

 

 

15 Environment Recognition for Digital Audio Forensics Using Mpeg-7 and Mel Cepstral Features Ghulam Muhammad, Khaled Alghathbar International Arab Journal of Information Technology Zarqa University مارس 2010 0.390
16 Utilizing Diacritic Marks for Arabic Text Steganography Adnan A. Gutub, Lahourai M. Ghouti, Yousef S. Elarian, Sameh M. Awaiden, Aleem .Alvi Kuwait Journal of Science & Engineering University of Kuwait المجلد 37، العدد 1، 2010 0.075
17 Context-Aware Access Control Model for Pervasive Environments. Al-Rwais S, Al-Muhtadi J. A IETE Technical Review IETE المجلد 27، العدد 5، 2010 0.724
18 Broadcast Authentication for Wireless Sensor Network Using Nested Hashing and Chinese Remainder Theorem Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathabar, E.S Cho Sensors MDPI المجلد 10، العدد 9، 2010 1.953
19 Analytical Study of the Saudi Hackers Khaled Alghathbar, Information Studies n/a n/a n/a
20 Information Flow Analysis of UCON Mohammad Nauman, Tamleek Ali , Masoomalam, Muhammad Khurram Khan, Khaled Alghathbar International Journal of the Physical Sciences Academic journals المجلد 5، العدد 6، ابريل 2010 0.554
21 Biometrics and Identity Management for Homeland Security Applications of Saudi Arabia Bilal Khan, Muhammad Khurram Khan, Khaled S. Alghathbar African Journal of Business Management Academic journals المجلد 4، العدد 15، نوفمبر 2010 0.20
22 Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks Muhammad Khurram Khan, Khaled Alghathbar Sensors MDPI المجلد 10، العدد 3، 2010 1.953
23 Singular Points Detection Using Fingerprint Orientation Field Reliability Mohammad. Sayim Khalil, D. Muhammad, Muhammad Khurram Khan, Khaled Alghathbar International Journal of Physical Sciences Academic journals المجلد 5، العدد 4، 2010 0.554
24 Arabic Domain Names: Analysis & Solution Khaled Alghathbar, Journal of Information Assurance and Security MIRLABS المجلد 5، 2010 n/a
25 Fingerprint Verification Using Statistical Descriptors Mohammad Sayim Khalil, Dzulkifli M, Muhammad Khurram Khan, Q Al-Nuzaili Journal of Digital Signal Processing Elsevier Science المجلد20 ، العدد 4، يوليو 2010 1.918
26 Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray- Shinerun,Rong-Jianchen, Jui-Lin Lai,Muhammad Khurram Khan, Kevin Octaviussentosa Pattern Recognition Elsevier Science المجلد 43، العدد 5، مايو 2010 3.219
27 Chaos-Based Secure Satellite Imagery Cryptosystem Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee Computer and Mathematics With Applications Elsevier Science المجلد 60، العدد 2، يوليو 2010 2.069
28 Code Based Hashing Technique for Message Authentication Algorithms K. Alghathbar, A Journal of Information Assurance and Security MIRLABS المجلد 5، 2010 n/a
29 Chaos and NDFT-Based Concealing of Fingerprint-Biometric Data into Audio Signals for Trustworthy Person Authentication Muhammad Khurram Khan, Ling Xie, Jiashu Zhang Journal of Digital Signal Processing Elsevier Science المجلد 20، 2010 1.918
30 An Efficient Phishing Webpage Detector Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shiine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto Expert Systems With Applications Elsevier Science المجلد 38، العدد 7، يوليو 2011 1.854
31 An Improved Forecasting Model Based on The Weighted Fuzzy Relationship Matrix Combined With a PSO Adaptation For Enrolments Yao-Lin Huang, Shin-Jinn Horng, Tzong-Wang Kao, Ray-Shine Runm Jui-Lin Lai, Rong-Jian Cheen, I-Hong Kuo And Muhammad Khurram Khan International Journal of Innovative Computing Information and Control ICIC International المجلد 7، العدد 7، يوليو 2011 1.667
32 Application of Grey-Relational Analysis to Find the Most Suitable Watermarking Scheme S.T Lin, S.J Horng, B.H Lee, P. Fan, Y. Pan, J.L Lai, R.J Chen, Muhammad Khurram Khan International Journal of Innovative Computing Information and Control ICIC International المجلد 7، العدد 9، سبتمبر 2011 1.667
33 A Practical Hybrid Particle Swarm Optimization Algorithm for High-Dimensional Complex Engineering Problems Dongli Jia, Guoxin Zheng, Bo Yang Qu, Muhammad Khurram Khan Computers And Industrial Engineering Elsevier Science المجلد 61، العدد 4، نوفمبر 2011 1.589
34 Steganalysis for Palette-Based Images Using Generalized Difference Image And Color Correlogram Hong Zhao, Hongxia Wang, Muhammad Khurram Khan Signal Processing Elsevier Science المجلد 91، العدد 11، نوفمبر 2011 1.851
35 Electronic War- The Future War Science and Technology Section Khaled Alghathbar OIC Conference Journal OIC المجلد 17، ابريل 2011 n/a
36 Vibrabt Color Image Stegnography Using Channel Differences and Secret Data Distribution Muhammd Tanveer Parvez And Adnan Abdul Aziz Gutab Kuwait Journal of Science & Engineering University of Kuwait المجلد 38، العدد 1B ابريل 2011 0.075
37 Fingerprint Classification Using PCA, LDA, L-LDA and BPN Mohammad Sayim Khalil, Muhammad Imran Razzak, Muhammad Khurram Khan Information Journal International Information Institute المجلد 14، العدد 10، أكتوبر 2011 2.103
38 An Effective Memetic Differential Evolution Algorithm Based on Chaotic Local Search Donglijia, Guoxinzheng, Muhammad Khurram Khan Information Sciences Elsevier Science المجلد 181، العدد 15، أغسطس 2011 3.643
39 A Hybrid Forecasting Model for Enrollments Based on Aggregated Fuzzy Time Series And Particle Swarm Optimization Y.L Huang, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, J.L Lai, I. H Kuo Expert Systems With Applications Elsevier Science المجلد 38، العدد 7، يوليو 2011 1.854
40 A Fast RFID Tag Identification Algorithm Based on Counter and Stack M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen Expert Systems With Applications Elsevier Science المجلد 38، العدد 6، يونيو 2011 1.854
41 Mutual Funds Trading Strategy Based on Particle Swarm Optimization L.Y Hsu, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, R.S Run, J.L Lai, R. J Chen Expert Systems With Applications Elsevier Science المجلد 38، العدد 6، يونيو 2011 1.854
42 Real-Time Algorithmic Design for Silent Pass Lip Reading Authentication System Khaled Alghathbar International Journal of The Physical Sciences Academic Journals المجلد 6، العدد 7، ابريل 2011 0.554
43 Cyber Security Using Arabic Captcha Scheme Muhammad Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah Alkelabi, Abdulaziz Alajaji International Arab Journal of Information Technology Zarqa University مارس، 2011 0.390
44 A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards Hanan Mahmoud, Khaled Alghathbar, Alaaeldin Hafez Journal of Applied Sciences Asian Network of Scientific Information المجلد 11، العدد 6، 2011 0.350
45 Secure Chaotic Map Based Block Cryptosystem With Application on Camera Sensor Networks X. Guo, J. Zhang, Muhammad Khurram Khan, Khaled Alghathbar Sensors MDPI المجلد 11، العدد 2، 2011 1.953
46 3D Block-Based Medial Axis Transform and Chessboard Distance Transform Based on Dominance S.Y Lin, S.Jhorng, T.W Kao, C.S Fahn, P. Fan,Y.H Chen, Muhammad Khurram Khan, A. Bourgeois,T. Terano Image and Vision Computing Elsevier Science المجلد 29، العدد 4، 2011 1.952
47 An Extended Intrusion Detection and Prevention System for Next Generation Network Application Zeeshan Shafi Khan, Khalid Rashid, Muhammad Khurram Khan, Muhammad Sher Information Journal International Information Institute المجلد 14، العدد 1، 2011 2.103
48 Multimodal Biometric Recognition Based on Fusion of Low Resolution Face and Finger Veins Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyahyousaf International Journal of Innovative Computing Information and Control ICIC International المجلد 7، العدد 8، 2011 1.667
49 Cancelable Palmcode Generated From Randomized Gabor Filters for Palmprint Template Protection Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Ming Ji, Khaled Alghathbar Scientific Research & Essays Academic journals المجلد 6، 2011 0.445
50 Mtpso Algorithm for Solving Planar Graph Coloring Problem L.Y Hsu, S.J Horng, P. Fan, Muhammad Khurram Khan, Y.R Wang, R.S Run, J.L Lai, R.J Chen Expert Systems With Applications Elsevier Science المجلد 38، العدد 5، مايو 2011 1.854
51 A Survey of Identity-Based Signcryption Fagen Li, Muhammad Khurram Khan, IETE Technical Review IETE المجلد 38، العدد 3، مايو 2011 0.724
52 Privacy Versus Scalability in Radio Frequency Identification Systems Basel Alomair, Radhapoovendran Computer Communications Elsevier Science المجلد 33، 2010 1.227
53 Handling Diacritical Marks for Online Arabic Script Based Languages Character Recognition Using Fuzzy C-Mean Clustering and Relative Position Muhammad Imran Razzak, Syed Afaq Husain, Muhammad Khurram Khan, Muhammad Sher Information journal International Information Institute المجلد 14، العدد 1، 2011 2.103
54 An Extended Push to Multimedia Service for IP Multimedia Subsystem Zeeshanshafi Khan, Nazishmunawar, Muhammad Sher, Khalid Rashid, Aneel Rahim, International Journal of Innovative Computing Information and Control ICIC International المجلد 7، العدد 6، 2011 1.667
55 Challenge-Response Based Biometric Image Scrambling for Secure Personal Identification Muhammad Khurram Khan, Z. Jiashu, Khaled S. Alghathbar, Future Generation Computer Systems Elsevier Science المجلد 27، العدد 4، ابريل 2011 2.033
56 Privacy-Preserving and Tokenless Chaotic Revocable Face Authentication Scheme Muhammad Khurram Khan, Khaled Alghathbar, J. Zhang Telecommunication Systems Springer-Verlag المجلد47، العدد 3-4، أغسطس 2011 1.027
57 Cryptanalysis and Security Enhancement of a ‘More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme’ Muhammad Khurram Khan, S. Kim, Khaled Alghathbar Computer Communications Elsevier Science المجلد 34، العدد 3، مارس 2011 1.079
58 Statistical Analysis of Several Reversible Data Hiding Algorithms Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan Journal of Multimedia Tools And Applications Springer-Verlag المجلد 52، العدد 2-3 ، ابريل 2011 1.014

 

 

59 Deep Text Mining for Automatic Keyphrase Extraction from Text Documents Abulaish, M., Jahiruddin and Dey, L Journal of Intelligent Systems De Gruyter المجلد 20، العدد 4، 2011 n/a
60 Identity-Based Online/Offline Signcryption for Low Power Devices Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi Journal of Network and Computer Applications Elsevier Science المجلد 35، العدد 1 يناير 2012 1.467
61 Securing the Smart Phones Against Malicious Exploits M Zubair Rafique, Faraz Ahmed, Muddassar Farooq, Muhammad Khurram Khan Information Journal International Information Institute المجلد 15، العدد 2 فبراير 2012 2.103
62 Clustering Periodic Frequent Patterns Using Fuzzy Statistical Parameters Fokrul Alom Mazarbhuiya And Muhammad Abulaish International Journal of Innovative Computing Information and Control ICIC International المجلد 8، العدد 3 مارس 2012 1.667
63 New Robust Protocols for Remote User Authentication And Password Change E.J Yoon, Muhammad Khurram Khan, K.Y Yoo International Journal of Innovative Computing Information and Control ICIC International المجلد 7، العدد 9 سبتمبر 2012 1.667
64 An Efficient Wavelet-Tree-Based Watermarking Method S.J Horng, W.H Lin, T.W Kao, P. Fan, Muhammad Khurram Khan Expert Systems With Applications Elsevier Science المجلد 38، العدد 12، نوفمبر- ديسمبر 2012 1.854
65 Statistical Authentication of Fingerprints Mohammad Sayim Khalil, Muhammad Khurram Khan The Imaging Science Journal Academia المجلد 59، العدد 5، مايو 2012 0.506
66 Efficient Distributed Face Recognition in Wireless Sensor Network Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan, Khaled Alghathbar International Journal of Innovative Computing Information and Control International Information Institute المجلد 8، العدد 4، ابريل 2012 1.667
67 Effectiveness of Information Security Awareness Methods Based on Psychological Theories Bilal Khan, Khaled Alghathbar, S.I Nabi, Muhammad Khurram Khan African Journal of Business Management Academic Journals المجلد 5، العدد 26، أكتوبر 2012 0.20
68 Mobile-Otp: Two-Factor Authentication Using Mobile Phones. M. Eldefrawy, M. K. Khan, K. Alghathbar, T. Kim, H. Elkamchouchi Security and Communication Networks John Wiley and Sons Inc. المجلد 5، العدد 5، 2012 0.311
69 Representing Access Control Policies in Use Cases Khaled Alghathbar International Arab Journal of Information Technology Zarqa University المجلد 9، العدد 3، مايو 2012 0.390
70 Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah And Yazid Bin Idris International Arab Journal of Information Technology Zarqa University المجلد 9، العدد 4، يوليو 2012 0.390
71 Study on the Common Criteria Methodology for Secure Ubiquitous Environment Construction S.Y Kang, J.H Park, Muhammad Khurram Khan, J. Kwak, Journal of Intelligent Manufacturing Springer-Verlag المجلد23 ، العدد 4، أغسطس 2012 1.278
72 A Blind Reversible Method for Watermarking Relational Databases Based on a Time-stamping Protocol M. Farfoura, S.J Horng, J.L Lai, R.S Run, R.J Chen, Muhammad Khurram Khan Expert Systems with Applications Elsevier Science المجلد 39، العدد 3، فبراير 2012 1.854
73 Towards Secure VANETs: A Survey Dr. Mohammad Moharrum IETE Technical Review IETE المجلد 29، العدد 1، 2012 0.724
74 An Efficient Copyright Protection Scheme for E-government Document Images S.J Horng, D. Rosiyadi, P.Fan, W. Xian, Muhammad Khurram Khan, Y. Pan IEEE Multimedia IEEE المجلد 19، العدد 3، 2012 0.984
75 A biometric identity- based signcryption scheme F.Li, Muhammad Khurram Khan Future Generation Computer systems Elsevier science المجلد 28، العدد 1، 2012 2.033
76 Analysis of existing remote attestation techniques M. Alam, T. Ali, S. Khan, Muhammad Ali, M. Nauman, A. Hayat, Muhammad Khurram Khan, Khaled Alghathbar Security and communication networks Wiley- Blackwell المجلد 5، العدد 9، سبتمبر 2012 0.311
77 Adaptively weighted Sub- directional Two dimensional Linear Discriminant Analysis for Face recognition L. Yan, J. S Pan, S. C Chu, Muhammad Khurram Khan, Future Generation Computer systems Elsevier science المجلد 28، العدد 1، يناير 2012 2.033
78 A Supervised Learning Approach for Automatic Keyphrase Extraction Muhammad Abulaish and Tarique Anwar International Journal of Innovative Computing Information and Control ICIC International المجلد 8، العدد 11، 2012 1.667
79  Interactive Artificial Bee Colony Supported Passive Continuous Authentication System P.W Tsai, Muhammad Khurram Khan, J.S Pan, B.Y Liao IEEE Systems Journal IEEE المجلد PP، العدد 99، أغسطس 2012 1.270
80 Context-Adaptive Anisotropic Diffusion for Image Denoising L. H Chao, P. Z Fan, Muhammad Khurram Khan IET Electronics Letters IEEE المجلد 48، العدد 14، يوليو 2012 1.038
81 Collaborative Security Measures to Counter Zero Day- Exploits Using Function Hooking

 

 

Haider Abbas, Natasha Arjumand Shoaib Mirza, Farrukh Aslam Khan UCAWSN 13 – Case A Journal Special issue Submission for n/a n/a n/a
82 Cryptanalysis And Improvement on a Parallel Keyed Hash Function Based on Chaotic Neural Network X. Wang, W. Guo, W. Zhang, Muhammad Khurram Khan, Khaled Alghathbar Telecommunication Systems Springer-Verlag المجلد 52، العدد 2، 2013 1.027
83 Event Correlation, Extra Information and Merged Policies Approaches for Integrating Intrusion Detection and Access Control Systems Waleed Halboob, Khaled Alghathbar, Ali Mamat, Ramlan mahmod Information Journal International information institute المجلد 16، العدد 3، مارس 2013 2.103
84 Attack Containment in Mobile Ad-Hoc Network Through Fair Distribution of Processing Resources Zeeshanshafi Khan, Farzanaazam, Khaled Alghathbar, Muhammad Sher, Khalid Rashid, Muhammad Khurram Khan Telecommunication Systems Springer-Verlag يوليو 2013 1.027
85 Energy Efficient Distributed Face Recognition in Wireless Sensor Network Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar Wireless Personal Communications Springer-Verlag المجلد 60، العدد 3، أكتوبر 2013 0.428
86 Designing User Profiling Prototype for Identification of Malicious Forums Maqsood Mahmud, Muhammad Elmogy, Muhammad Khurram Khan, Khaled Alghathbar Information Journal International information institute المجلد 16، العدد 3(A)، مارس 2013 2.103
87 Dynamic Password Based Remote User Authentication without Time Stamping M. H. Eldefrawy, M. K. Khan, K. Alghathbar International Journal of Innovative Computing Information and Control ICIC International المجلد 9، العدد 1، 2013 1.667
88 Presence Based Extended Secure Call Control System for IP Multimedia Subsystem Z.S. Khan, M. Sher Information journal Information International Institute المجلد 16، العدد 3(a)، مارس 2013 2.103
89 A Novel Intrusion Detection Framework for Wireless Sensor Networks Farrukh Aslam Khan,Ashfaq Hussain Farooqi, Jin Wang, Sungyoung Lee Personal and Ubiquitous Computing Springer-Verlag المجلد 17، العدد 5، يوليو 2013 1.133
90 A Framework for Preservation of Cloud Users’ Data Privacy using Dynamic Reconstruction of Metadata Adeela Waqar, Asad Raza ,Haider Abbas, Muhammad Khurram Khan Journal of Network and Computer Applications Elsevier science المجلد 36، العدد 1، يناير 2013 1.467
91 Trust-based Scalable Access Control Model for Broadcast XML Documents Waleed Halboob, Ali Mamat,  Ramlan Mahmod, Khaled Alghathbar, Mohammed Khurram Khan Information Journal Information International Institute المجلد 16، العدد 3(a)، مارس 2013 2.103
92 Authentication of Fingerprint Biometrics Acquired using a Cellphone camera: A Review Mhammed Sayim Khalil, Fajri Kurniawan, Kashif Saleem International Journal of Wavelets, Multiresolution and Information Processing World Scientific المجلد 11، العدد 05، 2013 n/a
93 A Temporal and Delegable Secure Access to the Broadcasted XML Documents Waleed Halboob, Ali Mamat, Ramlan Mahmod, Mohammad Khurram Khan Journal of Computer Science Information International Institute المجلد 16، العدد 3(a)، مارس 2013 0.300
94 Review: Assessing Routing Strategies for Cognitive Radio Sensor Networks Suleiman Zubair, Norsheila Fisal, Yakubu S. Baguda, Kashif Saleem Sensors MDPI المجلد 13، العدد 10، 2013 1.953
95 b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET S.J Horng, S.F Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, IEEE Transactions on Information Forensics and Security IEEE المجلد 8، العدد 11، نوفمبر2013 1.895
96 Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks

 

 

D. He, N. Kumar, Muhammad Khurram Khan, J. H Lee IEEE Transactions on Consumer Electronics Inderscience المجلد 59، العدد 4، نوفمبر2013 n/a
97 On the Security of an Authentication Scheme for Multi-server Architecture D. He, J. Chen, W. Shi, Muhammad Khurram Khan International Journal of Electronic Security and Digital Forensics Inderscience المجلد 5، العدد 3/4، 2013 n/a
98 Analysis of Correlation of 2DPalmHash Code and Orientation Range Suitable for Transposition

 

 

L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan Neurocomputing Elsevier science قبلت للنشر في أكتوبر 2013 1.634
99 Cryptanalysis of a Key Agreement Protocol based on Chaotic Hash D. He, Muhammad Khurram Khan International Journal of Electronic Security and Digital Forensics Inderscience المجلد 5، العدد 3/4، 2013 n/a
100 More Secure Smart Card Based Remote User Password Authentication Scheme with User Anonymity S. Kumari, Muhammad Khurram Khan Security and Communication Networks Wiley سبتمبر 2013 0.311
101 Lattice-based Signcryption F. Li, M. Fahad, Muhammad Khurram Khan, T. Takagi Concurrency and Computation: Practice and Experience Wiley المجلد 25، سبتمبر 2013 0.845
102 An Improved Timestamp-based

 

Password Authentication Schemem: Comments, Cryptanalysis and Improvement

S. Kumari, M.K Gupta, Muhammad Khurram Khan, X. Li Security and Communication Networks Wiley سبتمبر 2013 0.311
103 A Remote Cancelable Palmprint Authentication Protocol Based on Multi-directional Two-dimensional Palm Phasor-Fusion

 

 

L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, Security and Communication Networks Wiley سبتمبر 2013 0.311
104 A Blind Image Copyright Protection Scheme for e-government

 

 

S. J Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, Muhammad Khurram Khan  Journal of Visual Communication and Image Representation Elsevier science المجلد 24، العدد 7، أكتوبر 2013 1.195
105 An Adaptive Watermarking Scheme for e-government Document Images Press

 

 

 S. J Horng, D. Rosiyadi, P. Fan, X. Wang, Muhammad Khurram Khan Multimedia Tools and Applications Springer-Verlag يوليو 2013 1.014

 

 

106 Cryptanalysis and Improvement of a Robust Smart-Card-Based Remote User Password Authentication Scheme in S. Kumari, Muhammad Khurram Khan International Journal of Communication Systems Wiley نشرت اون لاين في يونيو 2013 0.712
107 Using Sorted Switching Median Filter to Remove High-Density Impulse Noise

 

 

S.J Horng, L.Y Hsu, T. Li, S. Qiao, X. Gong, H.H Chou, Muhammad Khurram Khan Journal of Visual Communication and Image Representation Elsevier science المجلد 24، العدد 7، أكتوبر 2013 1.195
108 Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles

 

 

S.J Horng, S.F Tzeng, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan KSII Transactions on Internet and Information Systems Korea Society of Internet Information المجلد 7، العدد 6، يونيو 2013 0.164
109 Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical S. Kumari, Muhammad Khurram Khan, R. Kumar Journal of Medical Systems Springer-Verlag المجلد 37، العدد 4، مايو 2013 1.783
110 Cryptanalysis of an ‘Efficient-Strong Authentication Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks Muhammad Khurram Khan, S. Kumari, P. Singh KSII Transactions on Internet and Information Systems Korea Society of Internet Information المجلد 7، العدد 5، مايو 2013 0.164
111 More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device Muhammad Khurram Khan, S. Kumari, M.K. Gupta Computing Springer-Verlag فبراير 2013 0.807
112 On the Security of a RSA-based Certificateless Signature Scheme D. He, Muhammad Khurram Khan, S. Wu International Journal of Network Security National chung hsing university المجلد 15، العدد 6، 2013 n/a
113 A Keyphrase-Based Tag Cloud Generation Framework to Conceptualize Textual Data

 

 

Muhammad Abulaish, Tarique Anwar International Journal of Adaptive, Resilient and Autonomic Systems

 

 

IGI Global المجلد 4، العدد 2، 2013 n/a
114 A Generic Statistical Approach for Spam Detection in Online Social Networks Faraz Ahmed,

 

Muhammad Abulaish

 

Computer Communications Elsevier science المجلد 36، العدد 10-11، 2013 1.079
115 Web-Content Mining for Learning Generic Relations and their Associations from Textual Biological Data Mourad Elloumi, Muhammad Abulaish Biological Knowledge Discovery Handbook: Preprocessing, Mining and Post-processing of Biological Data

 

 

IGI Global نشر اون لاين، 2013 n/a
116 Energy-Efficient Cluster-Based Security Mechanism for Intra-WBAN and Inter-WBAN Communication for Healthcare Applications Aftab Ali, Farrukh Aslam Khan EURASIP Journal on Wireless Communications and Networking Springer-Verlag تم قبولها للنشر، 2013 0.540
117 Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks

 

 

Hamid Ali, Farrukh Aslam Khan Applied Soft Computing Elsevier science المجلد 13، العدد 9، 2013 2.140
118 A Hybrid Security Mechanism for intra-WBAN and inter-WBAN Communication Sarah Irum, Aftab Ali, Farrukh Aslam Khan, Haider Abbas International Journal of Distributed Sensor Networks   المجلد (2013)، 2013 0.727
119 A Digsby Log Analysis Tool to Identify Forensic Artifacts Muhammad Yasin,
and Muhammad Abulaish
Digital Investigation Elsevier science المجلد 9، العدد 3-4، فبراير 2013 0.630
120 TC-enabled and Distributed Cloud Computing Access Control Model Waleed Halboob, Khaled S.Alghathbar, Ramlan Mahmod, Ali Mamat Journal of Applied Sciences Asian Network of Scientific Information نشرت اون لاين، 2014 0.350
121 Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System

 

 

Z. Siddiqui, A.H Abdullah, Muhammad Khurram Khan, Abdullah S.G Journal of Medical Systems Springer-Verlag المجلد 38، العدد 1، يناير2014 1.783
122 A New Handover Authentication Protocol based on Bilinear Pairing Functions for Wireless Networks

 

 

H. Debiao, Muhammad Khurram Khan, N. Kumar International Journal of Ad hoc and Ubiquitous Computing Inderscience قبلت للنشر في يناير 2014 n/a
123 Namesake Alias Mining on the Web and its Role Towards Suspect Tracking Tarique Anwar, Muhammad Abulaish

 

 

Information Sciences Elsevier science نشر اون لاين، 2014 3.643
124 Empirical Studies of Bio-inspired Self-Organized Secure Autonomous Routing Protocol

 

 

Kashif Saleem, Norsheila Fisal, M. Ariff Baharudin IEEE Sensors Journal IEEE تم قبولها للنشر، 2014 1.520
125 Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: solutions and challenges

 

 

Abdelouahid, Miloud Bagaa Yacine Challaly Adlen Ksentiniz Nadjib Badache IEEE Communications Surveys & Tutorials IEEE تم قبولها للنشر، 2014 4.818
127 Current Trends and Future Directions of Privacy Preservation in Computer Forensics

 

 

Waleed Halboob,

 

Ramlan Mahmod,

Nur Izura Udzir,

Mohd. Taufik Abdullah,

Ali Deghantanha

 

Computer Law and Security Review

 

 

Elsevier تم قبولها للنشر، 2014 0.33
128 An Ordered Selective Imaging and Distributed Analysis Computer Forensics Investigation Process for Better Imaging Efficiency and Analysis Scalability

 

 

Waleed Halboob,

 

Ramlan Mahmod,

Nur Izura Udzir,

Mohd. Taufik Abdullah,

Ali Deghantanha

Journal of Applied Sciences ScienceAlert تم قبولها للنشر، 2014 0.35
129 Multivariate Correlation Analysis and Geometric Linear Similarity for Real-time Intrusion Detection Systems Abdelouahid Derhab, Abdelghani Bouras Security and Communication Networks

 

 

Wiley تم قبولها للنشر، 2014 0.311
130 Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks Abdelouahid Derhab, Abdelghani Bouras Ad Hoc & Sensor Wireless Networks Old city publishing تم قبولها للنشر، 2014 0.410
131 Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks Saifullah Khalid, Ashraf Masood, Faisal Bashir Hussain, Haider Abbas and Abdul Ghafoor International Journal of Distributed Sensor Networks Hindawi نشر اون لاين، 2014 0.9
132 Identifying An OpenID Anti-phishing Scheme for Cyberspace” (2014) Security and Communication Networks Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan and Maruf Pasha Security and Communication Networks Wiley نشر اون لاين، 2014 0.43
133 Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review Rabia Latif, Haider Abbas, Said Assar Journal of Medical System Springer-Verlag تم قبولها للنشر، 2014  
134 A Framework to Address Inconstant User Requirements in Cloud SLAS Management Waleed Halboob, Haider Abbas, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha Cluster computing Springer-Verlag المجلد 18، العدد 1، 2015 1.510
135 A Broadcast-Based Key Agreement Scheme using Set Reconciliation for Wireless Body Area Networks Aftab Ali, Farrukh Aslam Khan Journal of Medical Systems Springer-Verlag المجلد 38، العدد 5، 2014 2.21
136 Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks Abdelouahid Derhab, Abdelghani Bouras, Mustapha Reda Senouci, Muhammad Imran International Journal of Distributed Sensor Networks Hindawi Publishing Cooperation نشر اون لاين، 2014 0.665
137 A Comprehensive Study of Email Spam Botnet Detection W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao IEEE Communications Surveys and Tutorials IEEE تم قبولها للنشر، 2015 6.49
138 Securing the Software Defined Networks: Taxonomy, Requirements, and Open Issues A. Akhanzada, E. Ahmed, A. Gani, Muhammad Khurram Khan, M. Imran, S. Guizani IEEE Communications Magazine IEEE المجلد 53، العدد 4، 2015 4.46
139 Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET S.F Tzeng, S.J Horng, T. Li, X. Wang, P.H. Huang, Muhmmad Khurram Khan IEEE Transactions on Vehicular Technology IEEE تم قبولها للنشر، 2015 2.64
140 A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan International Journal of Communication Systems Wiley تم قبولها للنشر، 2015 1.1
141 An Enhanced Privacy Preserving Remote User Authentication Scheme with Provable Security S. A Chaudhry, M.S Farash, H. Naqvi, S. Kumari, Muhammad Khurram Khan Security and Communication Networks Wiley تم قبولها للنشر، 2015 0.43
142 On the Security Enhancement of Integrated Electronic Patient Records Information Systems Muhammad Khurram Khan, A. Chaturvedi, D. Mishra, Saru Kumari Computer Science and Information Systems ComSIS تم قبولها للنشر، 2015 0.477
143 Modified Artificial Bee Colony Optimization with Block Perturbation Strategy J. Dongli, D. Xintao, Muhammad Khurram Khan Engineering Optimization journal Taylor & Francis المجلد 47، العدد5، 2015 1.076
144 User Authentication Schemes for Wireless Sensor Networks: A Review S. Kumari, Muhammad Khurram Khan, M. Atiquzzaman Ad Hoc Networks Elsevier المجلد 27، العدد5، 2015 1.53
145 An Efficient Certificateless Aggregate Signature with Conditional Privacy-Preserving for Vehicular Sensor Networks S.J Horng, S.F Tzeng, PH Huang, X. Wang, T. Li, Muhammad Khurram Khan Information Sciences Elsevier تم قبولها للنشر، 2015 4.038
146 Cryptanalysis and Improvement of ‘A Secure Authentication Scheme for Telecare Medical Information System’ with Nonce Verification Z. Siddiqui, A. Hanan, Muhammad Khurram Khan, A. Alghamdi Peer-to-Peer Networking and Applications Springer-Verlag تم قبولها للنشر، 2015 0.632
147 A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems W. Zhang, X. Wang, Muhammad Khurram Khan Security & Communication Networks Wiley المجلد 8، العدد6، 2015 0.43
148 Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges  E. Ahmed, A. Gani, Muhammad Khurram Khan, R. Buyya, SU Khan Journal of Network & Computer Applications Springer-Verlag المجلد 52، 2015 2.229
149 Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks using Extended Chaotic Maps SKH Islam, Muhammad Khurram Khan, MS. Obaidat, Fahad Muhaya Wireless Personal Communications Springer-Verlag نشر اون لاين، 2015 0.653
150 A New Dynamic ID based User Authentication Scheme using Mobile Device: Cryptanalysis, the Principles and Design X. Li, J. Liao, S. Kumari, W. Liang, F. Wu, Muhammad Khurram Khan Wireless Personal Communications Springer-Verlag نشر اون لاين، 2015 0.653
151 Man-At-The-End Attacks: Analysis, Taxonomy, Human Aspects, Motivation and Future Directions A. Akhunzada, M. Sookhak, Nor Badrul Anuar, A. Gani, E. Ahmed, S. Furnell, A. Hyat, Muhammad Khurram Khan Journal of Network and Computer Applications Elsevier المجلد 48، 2015 2.229
152 An Efficient Remote User Authentication with Key Agreement Scheme using Elliptic Curve Cryptography B. Huang, Muhammad Khurram Khan, L. Wu, F. B Muhaya, D. He Wireless Personal Communications Springer-Verlag نشر اون لاين، 2015 0.653
153 Geographic Wormhole Detection in Wireless Sensor Network M. Sookhak, A. Akhunzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khurram Khan, L. Xiong, WX Ming PLOS ONE Public Library of Science المجلد 10، العدد1 ، 2015 3.534
154 An Anonymous Biometric Based Remote User Authenticated Key Agreement Scheme for Multimedia Systems D. Mishra, S. Kumari, Muhammad Khurram Khan, S. Mukhopadhya International Journal of Communication Systems Wiley نشر اون لاين، 2015 1.10
155 Design and Analysis of a Chaotic Maps-based Three Party Authenticated Key Agreement Protocol X Li, JW Niu, S Kumari, Muhammad Khurram Khan, JG Liao, W Liang Nonlinear Dynamics LI Multimedia Tools and Applications تم قبولها للنشر، 2015 2.849
156 A New Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks with User Anonymity  X. Li, J. Niu, S. Kumari, J.Liao, W. Liang, Muhammad Khurram Khan Security and Communication Networks Wiley تم قبولها للنشر، 2015 0.43
157 A More Secure Digital Rights Management Authentication Scheme Based on Smart Card S. Kumari, Muhammad Khurram Khan, X., LI Multimedia Tools and Applications Springer-Verlag تم قبولها للنشر، 2015 1.346
158 A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan International Journal of Communication Systems Wiley تم قبولها للنشر، 2015 1.1
159 A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds Q. Jiang, Muhammad Khurram Khan, X. Lu, J. Ma, D. He The Journal of Supercomputing Springer-Verlag نشر اون لاين، 2016  
160 Design of Anonymity Preserving Three-Factor Authenticated Key Exchange Protocol for Wireless Sensor Network R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, L. Leng, N. Kumar Computer Networks Elsevier نشر اون لاين، 2016  
161 A Comprehensive Study of Email Spam Botnet Detection W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao IEEE Communications Surveys and Tutorials IEEE المجلد 17، العدد4 ، 2015  
162 A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks Mohammed Abazeed, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Norsheila Fisal, Jalal Al-Muhtadi, and Suleiman Zubair International Journal of Distributed Sensor Networks Hindawi المجلد  2015(2015)  
163 Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks

 

 

  ACM Transactions on Sensor Networks (TOSN) ACM المجلد 11، العدد3، 2015  
164 Secure Key Distribution Using Fragmentation and Assimilation in Wireless Sensor and Actor Networks AtaUllah Ghafoor, Muhammad Sher, Muhammad Imran and Abdelouahid Derhab International Journal of Distributed Sensor Networks Hindawi المجلد  2015(2015)  
165 Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices Abdelouahid Derhab, Kashif Saleem,

 

Ahmed Youssef 

Mohamed Guerroum

Arabian Journal for Science and Engineering Springer-Verlag المجلد 41، العدد 2، 2016  
166 Secure transfer of environmental data to enhance human decision accuracy

 

 

Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi, Basit Shahzad, Mehmet A. Orgun Computer in Human Behavior Journal Elsevier المجلد 51، الجزء ب2، 2015  
167 Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience  Kashif Saleem ,

 

Abdelouahid DerhabJalal Al-MuhtadiMehmet A. Orgun

Computer in Human Behavior Journal Elsevier المجلد 51، الجزء ب2، 2015  
168 Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi,  Basit Shahzad Computer in Human Behavior Journal Elsevier المجلد 51، الجزء ب، 2015  
169 Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks Abdelouahid Derhab, Abdelghani Bouras, Mustapha Reda Senouci, and Muhammad Imran International Journal of Distributed Sensor Networks Hindawi المجلد   2014 (2014)  
170 Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN

 

 

Miloud Bagaaa, Mohamed YounisbAbdelouahid Derhabc, Nadjib Badache Computer Networks Elsevier المجلد 75، الجزء أ، 2014  
171 Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices Abdelouahid Derhab, Kashif Saleem, Jalal Al-Muhtadi, Mehmet A. Orgun Computers in Human Behavior Elsevier المجلد 59، يونيو 2016  
172 Mobile-health: A review of current state in 2015

 

 

Bruno M.C. Silvaa, 1Joel J.P.C. Rodriguesa, bIsabel de la Torre Díezc, Miguel López-Coronadoc, Kashif Saleemb, Journal of Biomedical Informatics Elsevier المجلد 56، يونيو 2016  
173 Energy Efficient Strategy for Throughput Improvement in Wireless Sensor Networks

 

 

Sohail Jabbar, Abid Ali Minhas, Muhammad Imran, Shehzad Khalid

 

and Kashif Saleem

Sensors MDPI المجلد 15،الإصدار 2، 2015  
174 Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan Mathematical Problems in Engineering Hindawi المجلد  2015(2015)  
175 Reference point detection for camera-based fingerprint image based on wavelet transformation

 

 

Mohammed S Khalil

 

 

BioMedical Engineering OnLine BioMedCentral نشر اون لاين، 2015  
176 Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art Aftab Ali, Farrukh Aslam Khan Journal of Medical Systems Springer-Verlag المجلد 38،الإصدار 10، 2015  
177 Anomaly Detection in Wireless Sensor Networks Using Immune-based Bio-inspired Mechanism Ramsha Rizwan, Farrukh Aslam Khan, Haider Abbas, Sajjad Hussain Chauhdary International Journal of Distributed Sensor Networks Hindawi المجلد  2015(2015)  
178 Identifying An OpenID Anti-phishing Scheme for Cyberspace Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha Security and Communication Networks Wiley نشر اون لاين، 2015  
179 EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network Rabia Latif, Haider Abbas, Seemab Latif, and Ashraf Masood Mobile Information Systems Hindawi المجلد 2015 (2015)  
180 A Framework for Cloud Forensics Analysis using Security Information and Event Management , Security and Communication Networks Muhammad Irfan, Haider Abbas, Yinchuan Sun , Anam Sajid and Maruf Pasha Security and Communication Networks Wiley تم قبولها للنشر  
181 BiSAL A Lexical Resource for Sentiment Analysis over English and Arabic Language Texts from Dark Web Forums   Digital Investigation Elsevier المجلد 14،الجزء c، 2015  
182 Smart Help at the Workplace for Persons with Disabilities (SHW-PWD) Ghassan Kbar, Shady Aly, Ibrahim Alsharawy, Akshay Bhatia, Nur Alhasan, Ronaldo Enriquez

 

 

International Journal of Computer, Information, Systems and Control Engineering      
183 Pixel Distribution-Based Features for Offline Arabic Handwritten Word Recognition Qais Al-nuzaili, Siti Z. Mohd Hashim, Faisal Saeed, Mohammed S. Khalil, Dzulkifli Mohamad International Journal of Computational Vision and Robotics

 

Inderscience تم قبولها للنشر  
184 Cost-Effective Encryption-based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues, Mohammed Sayim Khalil, Adel Ali Ahmed Sensors      
185 Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges Anam Sajid, Haider Abbas and Kashif Saleem IEEE Access

 

IEEE تم قبولها للنشر  
             
             

 

  

Publihsed Papers on Conferences

رقم عنوان البحث الباحثون المؤتمرات الناشر المجلد والعدد والتاريخ
1 Enhanced Ultra Gridsec: Enhancing High Performance Symmetric Key Cryptography Schema Using Pure Peer to Peer Computational Grid Middleware (HIMAN) Kholidy, H.A. Azab, A.A. Deif, S.H. 3rd International Conference on Pervasive Computing And Applications, Alexandria, Egypt. 6-8 Oct. 2008. IEEE الدورة الثالثة، 2008
2 Most Known Vulnerabilities in Saudi Arabian Web Servers Alghathbar.K.S, Mahmud.M, Ullah.H 4th IEEE/IFIP International Conference on Internet (ICI 2008), 23-25 Sept. 2008. Uzbakistan. IEEE الدورة الرابعة، 2008
3 A Thin Operating System Khaled S. Alghathbar, Swooj 2nd National Information Technology Symposium, 18-21 May, 2008. Riyadh, Saudi Arabia. N/A الدورة الثانية، 2008
4 Biometric-Gaussian-Stream (BGS) Cipher With New Aspect of Image Encryption (Data Hiding) Maqsood Mahmud, Hanif Ullah, Muhammad Khurram Khan, Khaled Alghathbar International Conference on Bio-Science and Bio-Technology (BSBT 2009), December 10-12, 2009. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 56، 2009
5 Acceptance And Applications of Smart Cards Technology in University Settings Abdulrahman Mirza, Khaled Alghathbar 8th International Conference On Pervasive Intelligence And Computing (Picom 2009), December 12-14, 2009, Chengdu, China IEEE الدورة الثامنة عشر، 2009
6 Environment Recognition from Audio Using Mpeg-7 Features Ghulam Muhammadand Khaled Alghathbar, 4th International Conference On Embedded And Multimedia Computing (Em-Com), December, 2009. S. Korea. IEEE الدورة الرابعة، 2009
7 Difference Histogram Analysis of Several Reversible Data Hiding Schemes Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia’9). Shanghai, China, 2009. IEEE الدورة الأولى، 2009
8 Low Power Design for Silent Pass Authentication System Khaled Alghathbar, 4th International Conference For Internet Technology And Secured Transactions. November 9-12, 2009, London, Uk IEEE الدورة الرابعة، 2009
9 Framework For Identification of Power System Operating Security Regions Mohamed A. El-Kady, Essam A. Al-Ammar, 3rd International Conference On Network & System Security (NSS), October 2009, Australia. IEEE الدورة الثالثة، 2009
10 A Context-Aware Access Control Model for Pervasive Environments Sumayah Alrwais, Jalal Almuhtadi, 3rd International Conference On Network & System Security (NSS), October 2009, Australia. IEEE الدورة الثالثة، 2009
11 Enhancing the Security of a more Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme Muhammad Khurram Khan, 3rd International Conference On Network & System Security (NSS), October 2009, Australia. IEEE الدورة الثالثة، 2009
12 Enhancement of Use Case Diagram to Capture Authorization Requirements Khaled S. Alghathbar 4th International Conference on Software Engineering Advances, September 20-25, 2009 – Porto, Portugal. IEEE الدورة الرابعة، 2009
13 Bio-Chaotic Stream Cipher-Based Iris Image Encryption Abdullah. Alghamdi, Hanif. Ullah, Maqsood. Mahmud, Muhammad Khurram Khan 7th IEEE/IFIP International Conference on Embedded And Ubiquitous Computing (Euc-09), Canada, 2009. IEEE الدورة السابعة، 2009
14 Environment Recognition for Digital Audio Forensics Using Mpeg-7 Features and Separate Modeling Technique Ghulam Muhammad, Mubarak O. Al-Qahtani, And Khaled Alghathbar 10th International Workshop On Information Security Application (WISA), Pp. 3-17, August 25-27, 2009, S. Korea. N/A الدورة العاشرة، 2009
15 Nmaca: A Novel Methodology for Message Authentication Code Algorithms K. Alghathbar, A. Hafez, F. B. Muhaya, And H. M. Abdullah 8Th Int. Conf. On Telecommunications And Informatics (Tele-Info ’09), May 30 – June 1, 2009. Istanbul, Turkey. WSEAS الدورة الثامنة، 2009
16 Noisy Password Scheme: A New on Time Password System Khaled S. Alghathbar,Hanan A. Mahmoud 22nd Canadian Conference On Electrical And Computer Engineering, May 3-6, 2009. Canada. IEEE الدورة الثانية والعشرون، 2009
17 Motion Estimation Analysis for Unsupervised Training for Lip Reading User Authentication Systems Hanan A. Mahmoud , Khaled Alghathbar , Fahad Bin Muhaya 10th WSEAS International Conference On Automation & Information, March 23-25, 2009, Prague, Czech Republic WSEAS الدورة العاشر، 2009
18 Automatic Human Face Counting in Digital Color Images Mona F.M. Mursi, Ghazy M.R. Assassa, Abeer Al-Humaimeedy, Khaledalghathbar, 8th WSEAS International Conference On Signal Processing, Robotics Andautomation, Cambridge, Uk, February 21-23, 2009. WSEAS الدورة الثامنة، 2009
19 A Secure Semi-Fragile S Image Authentication Scheme Based on Discretecosine Transform Mona F.M. Mursi, Ghazy M.R. Assassa, Hatimaboalsamh , Khaled Alghathbar, International Computer Conference )(ICC2009), University Of California, Fullerton, April 2009. IEEE الدورة الأولى، 2009
20 Facerecognition Using Incremental Principal Components Analysis Hatimaboalsamh, Hassan Mathkour, Ghazy Assassa, Mona Mursi, International Computer Conference )ICC2009), University Of California, Fullerton, April 2009. IEEE الدورة الأولى، 2009
21 Automated Summarization And Visualization of Unstructured Text Documents Muhammad Abulaish And Dr. Khaled Alghathbar 2nd International Conference On It And Business Intelligence (Itbi’10), 2010, Nagpur, India. N/A 2010
22 Dynamic Weighted Discrimination Power Analysis in DCT Domain for Face and Palmprint Recognition L. Leng, J. Zhang, J. Xu, Muhammad Khurram Khan, Khaled Alghathbar International Conference On Ict Convergence (Ictc’10), 17-19 November, 2010, South Korea IEEE 2010
23 Information Assurance in Saudi Organizations – An Empirical Study Nabi, S. I., Mirza, A. A., & Alghathbar, K. International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
24 Data Confidentiality and Integrity Issues And Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan Nabi, S. I., Nabi, S. W., Tipu, S. A. A., Haqqi, B., Abid, Z., & Alghathbar, K. International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
25 One-Time Password System With Infinite Nested Hash Chains Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
26 Issues of Security and Network Load in Presence – A Survey Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
27 Contactless Biometrics in Wireless Sensor Network: A Survey Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea. Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
28 Nmaca Approach Used to Build a Secure Message Authentication Code Raedalosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed H. Eldefrawy International Conference On Security Technology (Sectech 2010), December 13-15, 2010. Jeju Island, Korea Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
29 Using Arabic Captcha for Cyber Security Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah Alkelabi, Abdulaziz Alajaji International Conference On Security Technology (Sectech 2010), December 13 ~ 15, 2010. Jeju Island, Korea Springer-Verlag, Communications in Computer and Information Science المجلد 122 2010
30 Web 2.0 Content Extraction Mohammad Waqar, Zeeshan Shafi Khan 5th International Conference For Internet Technology And Secured Transactions (Icitst-2010) In London, Uk IEEE الدورة الخامسة، 2010
31 Secure Single Packet IP Traceback Mechanism to Identify The Source Zeeshanshafi Khan, Nabilaakran, Khaled Alghathbar, Muhammad, Rashidmehmood 5th International Conference For Internet Technology And Secured Transactions (Icitst-2010), November 8-11, 2010, London, Uk IEEE الدورة الخامسة، 2010
32 Novel Technique for Steganography in Fingerprints Images: Design and Implementation Hanan Mahmoud, Aljoharah Al-Dawood, Hanan Saad Al-Hulaibah, Buthainasaleh Al-Nassar, Sarah Ahmad Al-Naeem, Buthainasaleh Al-Nassar, Suha Ali Al-Qhatani, Dhay Yousef Al-Salman 6th International Conference On Information Assurance And Security”(Ias 2010), Accepted. IEEE الدورة السادسة، 2010
33 Novel Mapping Technique for Steganography in Fingerprints Images Hanan Abdalla,Khaled Alghathbar 3rd IEEE International Conference On Broadband Network & Multimedia Technology, 26-28 Oct, 2010, Beijing, China IEEE الدورة الثالثة، 2010
34 Bio-Inspired Hybrid Face Recognition System For Small Sample Size and Large Dataset Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar 6th International Conference On Intelligent Information Hiding And Multimedia Signal Processing (Iih-Msp-2010), October 15-17, 2010, In Darmstadt, Germany. IEEE الدورة الخامسة، 2010
35 A New Particle Swarm Optimization Algorithm for Dynamic Image Clustering Salimaouadfel, Mohamed Batouche, Abdelmaliktaleb-Ahmed 5th International Conference On Digital Information Management (Icdim 2010), Thunder Bay, Canada, 5-7 July, 2010 IEEE الدورة السادسة، 2010
36 A Key Agreement Algorithm With Rekeying for Wireless Sensor Networks Using Public Key Cryptography M. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar IEEE International Conference On Anti-Counterfeiting, Security, And Identification, Chengdu, China; July 2010. IEEE الدورة الأولى، 2010
37 Attacking Websites During Crises: Analysis And Solutions Khaled Alghathbar, International Forum For Crisis Management, Jeddah, Saudi Arabia, 26 May 2010. (In Arabic) N/A الدورة الأولى، 2010
38 Face Recognition Using Layered Linear Discriminant Analysis And Small Subspace Muhammad Imran, Rubiyahyousaf, Muhammad Khurram Khan, Khaled Alghathbar 10th IEEE International Conference On Computer And Information Technology (Cit2010), Bradford, Uk, 29 June – 1 July, 2010 IEEE الدورة العاشرة، 2010
39 Security Analysis of Firewall Rule Sets in Computer Networks Bilal Khan, Maqsood Mahmud, Muhammad Khurram Khan, Khaled S. Alghathbar 4th International Conference On Emerging Security Information, Systems And Technologies Securware 2010, Venice/Mestre Italy, July 2010. IEEE الدورة الخامسة، 2010
40 A Novel Approach For Online Signature Verification Using Fisher Based Probabilistic Neural Network Souham Meshoul And Mohamed Batouche, 15th IEEE Symposium On Computers And Communications (Iscc’10),June 22-25, 2010, Riccione, Italy. IEEE الدورة الخامسة عشر، 2010
41 Combining Fisher Discriminant Analysis and Probabilistic Neural Network For Effective On-Line Signature Recognition Souham Meshoul And Mohamed Batouche 10th International Conference On Information Science, Signal Processing And Applications -Isspa’2010, Ieee Press, 10-13 May, 2010, Kuala Lumpur, Malaysia. IEEE الدورة العاشرة، 2010
42 Security Analysis Of ‘Two-Factor User Authentication In Wireless Sensor Networks’ Muhammad Khurram Khan, Khaled Alghathbar 4th International Conference On Information Security And Assurance (Isa’10), Miyazaki, Japan.2010. Springer-Verlag, Lecture Notes in Computer Science المجلد 6059، 2010
43 Fingerprint Verification Based On Statistical Analysis Mohammad Sayim Khalil, D. Muhammad, Muhammad Khurram Khan, Khaled Alghathbar 5th International Conference On Future Information Technology (Futuretech), Busan, South Korea. IEEE الدورة الخامسة، 2010
44 Application Of Operating Security Regions In Power Systems Mohamed A. El-Kady, Essam A. Al-Ammar IEEE PES Transmission And Distribution Conference And Exposition, New Orleans, Usa, April 2010. IEEE الدورة الأولى، 2010
45 A Quantum Inspired Learning Cellular Automaton For Solving The Travelling Salesman Problem Amerdraa, Souham Meshoul 12th International Conference On Computer Modelling And Simulation, Cambridge University (Emmanuel College) England, 24 – 26 March 2010 IEEE الدورة الثانية عشر، 2010
46 Fingerprint Verification Using Fingerprint Texture Mohammed Sayim Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Qais Al-Nuzaili 9th IEEE International Symposium On Signal Processing And Information Technology (Isspit) , Uae, Dec. 14-17, 2009. IEEE الدورة الثانية عشر، 2010
47 A Web Content Mining Approach For Tag Cloud Generation Muhammad Abulaish, Tarique Anwar 13th International Conference On Information Integration And Web-Based Applications & Services (IIWAS2011), 5-7 December 2011, Veitnam. ACM الدورة الثالثة عشر،2011
48 Biometric Driven Initiative System for Passive Continuous Authentication Muhammad Khurram Khan, Pei-Wei Tsai, J.S Pan, B.Y Liao5 7th IEEE International conference on Information Assurance and Security (IAS), Malaysia. IEEE الدورة السابعة، 2011
49 Xminer: Nip The Zero Days Exploit In The Bud M. Zubair Rafique And Muhammad Abulaish 10th International IEEE Symposium On Network Computing And Applications”, Cambridge, Usa 2011. IEEE الدورة العاشرة،2011
50 A Data Mining Framework For Securing 3G Core Network From Gtp Fuzzing Attacks Faraz Ahmed, M Zubair Rafique And Muhammad Abulaish, 7th International Conference On Information Systems Security (ICISS 2011), Kolkata, India, Dec 2011 Springer-Verlag, Lecture Notes in Computer Science المجلد 7093، 2011
51 Deducting Fingerprint Singular Points Using Orientation Field Reliability Mohmmad Sayim Khalil International Conference Robot, Vision And Signal Processing 21-23 November 2011, Kaohsiung, Taiwan. IEEE الدورة الأولى، 2011
52 Analysis of Saudi Arabian Cyber Crime Act Bilal Khan, Khaled Alghathbar 6th International Conference on Legal, Security And Privacy Issues In It (Lspi 2011), Aug 2011. IAITL

 

 

الدورة السادسة، 2011
53 Information Security Awareness Campaign: An Alternate Approach Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan 5th International Conference on Information Security And Assurance: ISA May 2011. Springer-Verlag, Communications in Computer and Information Science المجلد 200، 2011
54 Web Content Mining for Alias Identification: A First Step Towards Suspect Tracking Tarique Anwar, Muhammad Abulaish And Khaled Alghathbar IEEE International Conference on Intelligence And Security Informatics (ISI-2011), Bejing, China, July 2011. IEEE الدورة الأولى، 2011
55 Simont: A Security Information Management Ontology Muhammad Abulaish, Syed Irfannabi, Khaled Alghathbar, Azeddine Chikh 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
56 Two Dimensional Palmphasor Enhanced by Multi-Orientation Score Level Fusion L. Leng, J. Zang, G. Chen, Muhammad Khurram Khan, P. Bai 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011, Greece. Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
57 A Framework For Detecting Malformed SMS Attack M. Zubairrafique, Muddassarfarooq, Muhammad Khurram Khan, Khaled Alghathbar 8th IEEE/FTRA International Conference on Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011, Greece. Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
58 Embedding High Capacity Covert Channels In Short Message Service (SMS) M. Zubairrafique, Muddassarfarooq, Muhammad Khurram Khan, Khaled Alghathbar 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
59 An Ontology Based Information Security Requirements Engineering Framework Azeddine Chikh, Muhammad Abulaish, Syed Irfannabi, Khaled Alghathbar 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece. Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
60 Exclusion Based Vanets (Ebv) A. Al-Daraiseh, Mohammed Morsi 8th IEEE/FTRA International Conference On Secure And Trust Computing, Data Management, And Applications (STA 2011), 28-30 June, 2011. Greece Springer-Verlag, Communications in Computer and Information Science المجلد 186، 2011
61 Co-Occurrence Matrix Features For Fingerprint Verification Mohammed Sayim Khalil, Muhammad Khurram Khan 5th IEEE International Conference on Anti-Counterfeiting, Security, And Identification, Jun24-26,2011; Xiamen, China. IEEE الدورة الخامسة، 2011
62 Presence Based Secure Instant Messaging Mechanism For Ip Multimedia Subsystem Zeeshanshafi Khan 11th  International Conference on Computational Science And Its Applications, June 20-23, 2011, Spain. Springer-Verlag, Lecture Notes in Computer Science المجلد 6786،2011
63 Two-Directional Two-Dimensional Random Projection And Its Variations For Face And Palmprint Recognition L. Leng, J. Zhang, G. Chen, M.K. Khan, K. Alghathbar 11th International Conference On Computational Science And Its Applications (Iccsa’11), 20-23 June 2011, Spain. Springer, Lecture Notes in Computer Science المجلد 6786،2011
64 Application Of Evolutionary Algorithms In Detecting Sms Spam At Access Layer M. Zubairrafique, Nasser Alrayes, Muhammad Khurram Khan, Khaled Alghathbar 13th annual conference on Genetic and evolutionary computation, 12-16 July, 2011, Dublin, Ireland. ACM الدورة الثالثة عشر، 2011
65 Qualified Analysis B/W Esb(S) Using Analytical Hierarchy Process (Ahp) Method Zeeshansiddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, 2nd IEEE International Conference On Intelligent Systems, Modelling And Simulation, January 2011, Malaysia. IEEE المؤتمر الثاني، 2011
66 Environment Sound Recognition For Digital Audio Forensics Using Zc, Mfcc And Mpeg-7 Features Mubarak Obaidalqahtani, Ghulam Muhammad, Mohamed M. Abd-Eldayem IEEE International Conference On Psychology Psychological Sciences And Computer Science (PPSCS), Pp. 34-37, 2010, China. Springer-Verlag, Communications in Computer and Information Science المجلد 189،2011
67 Otp-Based Two-Factor Authentication Using Mobile Phones Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan 88th  International Conference On Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, Nevada, Usa. IEEE الدورة الثامنة، 2011
68 Securing Ip-Multimedia Subsystem (IMS) Against Anomalous Message Exploits By Using Machine Learning Algorithms M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar 8th International Conference On Information Technology: New Generations (ITNG’11), April 11-13, 2011, Las Vegas, Nevada, Usa. IEEE الدورة الثامنة، 2011
69 Relation Characterization Using Ontological Concepts Muhammad Abulaish, 8th International Conference On Information Technology: New Generations (Itng’11), April 11-13, 2011, Las Vegas, Nevada, Usa. IEEE الدورة الثامنة، 2011
70 Secure Instant Messaging Protocol For Centralized Communication Group Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan Elkamchouchi 4th  IFIP International Conference On New Technologies, Mobility And Security (NTMS), February 2011, Paris, France. IEEE الدورة الرابعة، 2011
71 A Comparison Between It Workers And End-Users Outlook On The Soundness Of Information Security Measures In Saudi Arabian Organizations Nabi, Syed Irfan, Abdulrahman A. Mirza, Khaled Alghathbar AIS SIGSEC Workshop On Information Security & Privacy, 2010, USA. SIGSEC 2010
72 Quaternary privacy-levels Preservation in Computer forensics Investigation process Waleed Halboob, Muhammad Abulaish, Khaled Alghathbar. 6th international conference for internet technology and secured transactions (ICITS) dec 11-14,2011, Abu Dhabi IEEE الدورة السادسة، 2011
73 Implementation of ISO 27001 in Saudi arabia–onstacles, motivations, outcomes, and lessons learned Belal AbuSaad, Khaled Alghathbar, Fahad A. Saeed, Bilal Khan 9th Australian Information Security Management Conference ECU الدورة التاسعة، 2011
74 Multi-levels Privacy-Preserving Computer Forensics Investigation Waleed Halboob, Muhammad Abulaish, and Khaled S. Alghathbar 5th International Conference on Cybercrime Forensics Education and Training (CFET 2011), 1st and 2nd Sept 2011, Canterbury, UK. CFET الدورة الخامسة، 2011
75 A Statistical Approach for Automatic Keyphrase Extraction Abulaish, M., Jahiruddin, Dey L 5th Indian International Conference on Artificial Intelligence (IICAI’11), Bangalore,  India IEEE الدورة الخامسة، 2012
76 Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes M. H. Eldefrawy, K. Alghathbar, M. K. Khan The International Symposium on Biometrics and Security Technologies (ISBAST’12), Taipei, Taiwan IEEE الدورة الأولى، 2012
77 An Activity Pattern Based Wireless Intrusion Detection System Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha 9th International Conference on Information Technology : New Generations, USA IEEE الدورة التاسعة، 2012
78 BAN Logic Based Security Proof for Mobile OTP Authentication Scheme Mohammed Saeed Alkatheiri, M.H. Eldefrawy, Muhammad Khurram Khan 7th International Conference on Future Information Technology (FutureTech’12) Vancouver, Canada Springer-Verlag, Lecture Notes in Electrical Engineering المجلد 164، 2012
79 Identifying Cliques in Dark Web Forums: An Agglomerative Clustering Approach Tarique Anwar and Muhammad Abulaish IEEE International Conference on Intelligence and Security Informatics IEEE الدورة الأولى، 2012
80 State of the Art in Trusted Computing Forensics W. Halboob, R. Mahmod 6th International Symposium on Digital Forensics and Information Security (DFIS-12 Springer-Verlag,

 

Lecture Notes in Electrical Engineering

المجلد 179، 2012
81 Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs Farrukh A. Khan, H. Ehsan 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12) IEEE الدورة الحادية عشر، 2012
82 Performance Comparison Between SVM-based and RBF-based for Detection of Saudi License Plate  Fajri Kurniawan, Mohammed S. Khalil 8th International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA2012) IEEE الدورة الثامنة، 2012
83 Graph-Based Learning Model for Detection of SMS Spam on Smart Phones Z. Rafique, M. Abulaish 8th International Wireless Communication and Mobile Computing Conference (IWCMC 2012) Trust, Privacy and Security Symposium IEEE الدورة الثامنة، 2012
84 An MCL-Based Approach for Spam Profile Detection in Online Social Networks F. Ahmed, M. Abulaish, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE الدورة الثانية عشر، 2012
85  A Density-Based Approach for Mining Overlapping Communities from Social Network Interactions Sajid Y. Bhat and Muhammad Abulaish  2nd International Conference on Web Intelligence, Mining and Semantics (WIMS),, Craiova, Romania, ACM ACM الدورة الثانية، 2012
86 Mining Feature-Opinion Pairs and their Reliability Scores from Web Opinion Sources Ahmad Kamal, Muhammad Abulaish, Tarique Anwar, 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS), Craiova, Romania, ACM ACM الدورة الثانية، 2012
87 A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders Nur Al Hasan Haldar, Muhammad Abulaish and Syed Ashim Pasha, International Conference on Network Security and Applications (CNSA), Chennai, India, , Springer Springer-Verlag, Advances in Intelligent and Soft Computing Book Series المجلد 186، 2012
88 A Review of Fingerprint Pre-processing using a Mobile Phone Mohammed S. Khalil and Fajri Kurniawan International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR). IEEE الدورة الأولى، 2012
89 Forensic Analysis of Digsby Log Data to Trace Suspected User Activities  Muhammad Yasin, Muhammad Abulaish, Muhammad N. Elmogy 9th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2012). Springer-Verlag, Lecture Notes in Electrical Engineering المجلد 180، 2012
90 Two-Dimensional Cancelable Biometric Scheme”, Accepted L. Leng, S. Zhang, X. Bi, Muhammad Khurram Khan 8th IEEE International Conference on Wavelets Analysis and Pattern Recognition (ICWAPR’12), China, July 2012 IEEE الدورة الثامنة، 2012
91 Password-Less Authentication Framework for OpenID Systems to Avoid Phishing Attacks Haider Abbas, Khaled Alghathbar, Kashif Akhtar Saleem, Moeen Qaemi Mahmoodzadeh 7th LCN Workshop on Security in Communications Networks IEEE الدورة السابعة، 2012
92 Comprehensive Parent Selection-based Genetic Algorithm Farrukh Khan,Hamid Ali 32nd SGAI International Conference on Artificial Intelligence Springer-Verlag, Research and Development in Intelligent Systems المجلد xxix، 2012
93 Detecting Counterfeit-Money using RFID-enabled Mobile Devices Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK IEEE الدورة السابعة، 2012
94 Enhanced Ant Colony Algorithm for Self-Optimized Data Assured Routing in Wireless Sensor Netowrks

 

 

Kashif Saleem, Norsheila Fisal 18th International Conference on Networks (ICON) IEEE الدورة الثامنة عشر، 2012
95 Mobile IPV6 based Autonomous Routing Protocol (MARP) For Wireless Sensor Networks

 

 

Kashif Saleem, Zahid Farid, Mohammad Ghulam Rahman Building Next-Generation Converged Networks: Theory and Practice: Chapter in Book to be published by: CRC Press, Taylor & Francis Group, USA, 2012 Taylor & Francis 2012
96 An MCL-Based Text Mining Approach for Namesake Disambiguation on the Web
  Tarique Anwar

 

Muhammad Abulaish

 
     
12th IEEE/WIC/ACM International Conference on Web Intelligence, Macau IEEE/WIC/ACM الدورة الثانية عشرة ، 2012
97 WLAN Location Privacy acquisition using Client Server Based Architecture Muhammad Junaid Khan Haider Abbas 10th International Conference on Information Technology: New Generations Las Vegas, Nevada, USA IEEE الدورة العاشرة، 2013
98 Energy Efficient Information Assured Routing based on Hybrid Optimization Algorithm for WSNs Kashif Saleem, Norsheila Fisal 10th International Conference on Information Technology: New Generations (ITNG 2013) IEEE الدورة العاشرة، 2013
99 Securing Internet Information Services (IIS) Configuration Files Haider Abbas,Saneeha Khalid 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) IEEE الدورة السابعة، 2013
100 A Real-Time Empirical Study of BIOSARP based Wireless Sensor Network Testbed Kashif Saleem ,Norsheila Fisal & M. Ariff Baharudin 11th IEEE SENSORS IEEE الدورة الحادية عشر، 2012
101 Anti-Phishing Open ID Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan The 2013 FTRA International Conference on Advanced IT, engineering and Management (FTRA AIM-13) FTRA الدورة الأولى، 2013
102 Core-point Detection on Camera-based Fingerprint Image Fajri Kurniawan, Mohammed S. Khalil 2nd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) IEEE الدورة الثالثة، 2013
103 Cryptanalysis of ‘A Robust Smart-Card-Based Remote User Password Authentication Scheme’ Saru Kumari, Muhammad Khurram Khan 3rd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) IEEE الدورة الثالثة، 2013
104 Anticipating Dormant Functionality in Malware – A Semantics based Approach Muzammil Noor, Haider Abbas 3rd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13) IEEE الدورة الثالثة، 2013
105 Security and Privacy Issues in Near Field Communication (NFC) Systems Hammad Kazmi, Haider Abbas, Farrukh Aslam Khan 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE الدورة الثانية عشر، 2013
106 Group Counseling Optimization for Multi-objective Functions Hamid Ali, Farrukh Aslam Khan 5th IEEE Congress on Evolutionary Computation (CEC 2013) IEEE الدورة الخامسة عشر، 2013
107 Welfare State Optimization Hamid Ali, Farrukh Aslam Khan 5th IEEE Congress on Evolutionary Computation (CEC 2013) IEEE الدورة الخامسة عشر، 2013
108 Truth of Network Layer Attacks and AODV Defense in MANETS Amna Saeed, Muhammad Nasim, Asad Raza, Haider Abbas International Conference on Intelligent Computing Special Session on Biometrics System and Security for Intelligent Computing Springer-Verlag الدورة التاسعة، 2013
109 Cryptanalysis of an improved remote password authentication scheme with smartcard Mohammed Khurram Khan, Debiao He 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications IEEE الدورة الثانية عشرة ، 2013
110 A Hybrid Technique using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network Arif Jamal Malik, Farrukh Aslam Khan 26th IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2013 IEEE الدورة السادسة والعشرون، 2013
111 Optimized Energy-efficient Iterative Distributed Localization for Wireless Sensor Networks Mansoor-ul-haque, Farrukh Aslam Khan, Mohsin Iftikhar 26th IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2013 IEEE الدورة السادسة والعشرون، 2013
112 Community-Based Features for Identifying Spammers in Online Social Networks Sajid Yousuf Bhat, Muhammad Abulaish 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

 

 

IEEE/ACM الدورة  الأولى، 2013
113 Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks Faraz Ahmed, Muhammad Abulaish 15th Asia-Pacific Web Conference (APWeb’13)

 

 

Springer-Verlag, Lecturer Note in Computer Science الدورة الخامسة عشر، 2013
114 Cloud Computing Risk Assessment: A Systematic Review Rabia Latif, Haider Abbas, Saïd Assar, Qasim Ali

 

 

7th International Symposium on Digital Forensics and Information Security (DFIS-13).

 

 

Springer-Verlag, Lecture Notes in Electrical Engineering الدورة السابعة، 2013
115 An Efficient Computer Forensics Selective Imaging Model

 

 

Waleed Halboob, Khaled S. Alghathbar, Ramlan Mahmod, Nur Izura Udzir, Mohd. Taufik Abdullah, Ali Deghantanha

 

 

7th International Symposium on Digital Forensics and Information Security (DFIS-13).

 

 

Springer-Verlag, Lecture Notes in Electrical Engineering الدورة السابعة، 2013
116 Statistical Features Identification for Sentiment Analysis using Machine Learning Techniques Kamal, A and Abulaish, M.

 

 

International Symposium on Computational and Business Intelligence. IEEE الدورة الأولى، 2013
117 Overlapping Social Network Communities and Viral Marketing Sajid Yousuf Bhat, Muhammad Abulaish International Symposium on Computational and Business Intelligence (ISCBI’13).

 

 

IEEE الدورة الأولى، 2013
118 OCTracker: A Density-Based Framework for Tracking the Evolution of Overlapping Communities in OSNs Sajid Yousuf Bhat, Muhammad Abulaish IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Istanbul, Turkey. IEEE/ACM الدورة الأولى، 2013
119 Mining an Enriched Social Graph to Model Cross-Thread Community Interactions and Interests Tarique Anwar

 

Muhammad Abulaish

3rd International Workshop on Modeling Social Media (MSM): Collective Intelligence in Social Media – Co-located with the 23rdACM Conference on Hypertext and Social Media, Milwaukee, WI, USA. ACM الدورة الثالثة، 2013
120 Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs

 

 

Kashif Saleem, Mohammed Sayim Khalil, Norsheila Fisal, Adel Ali Ahmed, and Mehmet Ali Orgun 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13) International Workshop on Security & Optimization for Wireless Networks (SOWN 2013). IEEE الدورة الثالثة عشر، 2013
121 Security Requirement Specification Framework for Cloud Users Rida Naveed, Haider Abbas, Saïd Assar 7th International Symposium on Digital Forensics and Information Security (DFIS-13). Springer-Verlag, Lecture Notes in Electrical Engineering المجلد 276، 2014
122 Securing Mass Storage Devices with Two Authentication Factors Mohamad Eldefrawy

 

Muhammad Khurram Khan, Hassan Elkamchouchi

 

11th International Conference on Information Technology: New Generations ITNG 2014. IEEE الدورة الحادي عشر، 2014
123 Logical Conjunction of Triple-perpendicular-directional Translation Residual for Contactless Palmprint Preprocessing Muhammad Khurram Khan

 

Lu Leng, Gang Liu, Ming Li

 

11th International Conference on Information Technology: New Generations ITNG 2014. IEEE الدورة الحادي عشر، 2014
124 License Plate Detection Method for Real-time Video of Low-Cost Webcam based on Hybrid SVM-Heuristic Approach Mohammed Sayim Khalil

 

Fajri Kurniawan

 

11th International Conference on Information Technology: New Generations ITNG 2014. IEEE الدورة الحادي عشر، 2014
125 Third Line of Defense Strategy to Fight against SMS-based Malware in Android-based Smartphones

 

 

Abdelouahid Derhab, & Kashif Saleem Ahmed Youssef 10th International Wireless Communications and Mobile Computing Conference (IWCMC 2014)

 

 

IEEE الدورة العاشرة، 2014
126 SMART: Secure Multi-pAths Routing for wireless sensor neTworks

 

 

Abdelouahid Derhab,

 

Noureddine Lasla,

Abdelraouf Ouadjaout,

Miloud Bagaa,

Yacine Challal

 

13th Ad-Hoc Networks and Wireless (ADHOC-NOW)

 

 

Springer-Verlag الدورة الثالثة عشر، 2014
127 CARPM: Cross Layer Ant Based Routing protocol for Wireless Multimedia Sensor Network

 

 

M.Abazeed, K. Saleem, N. Fisal, S. Zubair 13th Ad-Hoc Networks and Wireless (ADHOC-NOW)

 

 

Springer-Verlag الدورة الثالثة عشر، 2014
128 ROB-based Cloud Computing SLA Dynamic and Secure Management Model Waleed Halboob , Haider Abbas, Kamel Haouam 10th International Conference on Intelligent Computing (ICIC 2014) Springer-Verlag الدورة العاشرة، 2014
129 Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud Assisted WBAN Rabia Latif, Haider Abbas 10th International Conference on Intelligent Computing (ICIC 2014) Springer-Verlag الدورة العاشرة، 2014
130 Countering Advanced Persistent Threat (APT) using Security Information and Event Management

 

 

Natasha Shoaib, Haider Abbas, Farrukh Aslam Khan, Jalal Al Muhtadi 4th International Symposium on Biometric and Security Technologies (ISBAST’14) IEEE الدورة الرابعة، 2014
131 Push-based XML access control policy languages: A review

 

 

Waleed Halboob, Ali Mamat, Ramlan Mahmod 4th International Symposium on Biometric and Security Technologies (ISBAST’14) IEEE الدورة الرابعة، 2014
132 DWT+LSB-based Fragile Watermarking Method For Digital Quran Images

 

 

Fajri 4th International Symposium on Biometric and Security Technologies (ISBAST’14) IEEE الدورة الرابعة، 2014
133 Detection and Prevention of Black Hole Attacks in

 

Mobile Ad hoc Networks

Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, Mohsin Iftikhar Thirteenth International Conference on Ad-Hoc Networks and Wireless (Ad Hoc NOW)

 

 

Springer-Verlag الدورة الثالثة عشر، 2014
134 Particle Swarm Optimization with Non-Linear Velocity Arif Jamal Malik, Farrukh Aslam Khan IEEE International Conference on Systems, Man, and Cybernetics (SMC2014)

 

 

IEEE الدورة السادسة والعشرون، 2014
135 A cloud-based framework for security and patients’ data privacy using body sensor networks for ubiquitous healthcare applications Farrukh Aslam Khan, Aftab Ali, Haider Abbas, Nur Al hasan 9th International Conference on Future Networks and Communications

 

 

Elsevier الدورة التاسعة، 2014
136 Low Delay and Secure M2M Communication Mechanism for eHealthcare Kashif Saleem, Abdelouahid Derhab, Jalal Al-Muhtadi IEEE HEALTHCOM 2014 – 1st International Workshop on Secure and Privacy-Aware Information Management in eHealth IEEE الدورة السادسة عشر، 2014
137 Spam Trapping System: Novel Security Framework to Fight Against Spam Botnets Abdelouahid Derhab Abdelghani Bouras Fahad Bin Muhaya

 

Muhammad Khurram Khan

Yang Xiang

21st IEEE International Conference on Telecommunications (ICT 2014) IEEE الدورة الحادية والعشرين، 2014
138 A Survey on Network Layer Attacks and AODV Defense in Mobile Ad-hoc Networks Amna Saeed, Asad Raza, Haider Abbas 8th IEEE International Conference on Software Security and Reliability , San Francisco , USA

 

 

IEEE الدورة الثامنة، 2014
139 Security Issues of Chen et al.’s Dynamic ID-based Authentication Scheme Muhammad Khurram , S. Kumari, X. Wang, R. Kumar, 2th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014) IEEE الدورة الثانية عشر، 2014
140 Notes on A Password-Based Remote User Authentication Scheme without Smart Card S. Kumari, Muhammad Khurram Khan, X. Li, R. Kumar 4th International Symposium on Biometric and Security Technologies (ISBAST’14) IEEE الدورة الرابعة، 2014
141 Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture X. Li, Muhammad Khurram Khan, S. Kumari 4th International Symposium on Biometric and Security Technologies (ISBAST’14) IEEE الدورة الرابعة، 2014
142 Twitter Data Mining for Events Classi cation and Analysis Nausheen Azam,  Jahiruddin, Muhammad Abulaish, Nur Al-Hasan Haldar

 

 

2nd International Conference on Soft Computing & Machine Intelligence IEEE  
143 Feasibility Analysis for Incorporating/Deploying SIEM for Forensics Evidence Collection in Cloud Environment Muhammad Irfan, Haider Abbas, Waseem Iqbal 14th IEEE/ACIS International Conference on Computer and Information Science 2015, Las Vegas, U.S.A IEEE  
144 Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs Asad Raza, Haider Abbas, Muhammad Siddiqui The 2015 IEEE International Conference on Software Quality, Reliability and Security, Vancouver, Canada IEEE  
145 Network Intrusion Detection using Diversity-based Centroid Mechanism Muhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan 12th International Conference on Information Technology : New Generations (ITNG 2015), Las Vegas, Nevada IEEE  
146 Analysis of Detection Features for Wormhole Attacks in MANETs Muhammad Imran, Farrukh Aslam Khan, Tauseef Jamal, Muhammad Hanif Durad International Workshop on Cyber Security and Digital Investigation (CSDI 2015) (in conjunctions with MobiSPC 2015), August 17-20, 2015, Belfort, France. Procedia Computer Science (Elsevier), Volume 56, 2015, Pages 384-390.

 

 

Elsevier  
147 ECG Arrhythmia Classification using Mahalanobis-Taguchi System in a Body Area Network Environment Aftab Ali, Nur Al Hasan Haldar, Farrukh Aslam Khan, Sana Ullah IEEE Global Communications Conference (IEEE Globecom 2015), December 6-10, 2015, San Diego, California, USA. IEEE  
148 Perceptual Feature Extraction Model for Arabic Literal Amounts Recognition

 

 

Fajri Kurniawan, Mohammed Sayim Khalil, International Conference on Innovation in Science and Technology (IICIST 2015)

 

 

IEEE  
149 Dual-Microphone Forensics of Identical Model Based on Signal Analysis Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan and Hafiz Malik 5th International Conference on Information Systems and Technologies (ICIST 2015)
Istanbul, Turkey, March 21 – 23 December 2015  
Cambridge Scholars  
150 Robust Tampered Detection Method For Digital Audio using Gabor Filterbank

 

 

Fajri Kurniawan,

 

Mohammed S. Khalil

and Hafiz Malik

 

International Conference on Image Processing, Production and Computer Science June 3-4, 2015 Istanbul (Turkey)

 

 

URST  
151 Anomaly Detection using Wavelet-Based Estimation of LRD in Packet and Byte Count of Control Traffic Zeb Khan, Basil AsSadhan, Jalal Al-Muhtadi, and Saleh Alshebeili

 

 

7th International Conference on Information & Communication Systems (iCICS’16) April 5-7, 2016, Irbid, Jordan IEEE  
152 DDoS Attacks and Countermeasures in Cyberspace

 

 

Zeb khan 22nd World Symposium on Web Applications and Networking (WSWAN), 2015 IEEE  
153 Survey on Mobile User’s Data Privacy Threats and Defense Mechanisms

 

 

Jalaluddin Khan, Haider  AbbasJalal Al-Muhtadi The 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops

 

 

Elsevier  
154 Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing

 

 

Waleed Halboob, Haider Abbas, Kamel Haouam, Asif Yaseen 10th International Conference on Intelligent Computing (ICIC2014), Taiyuan, China Springer-Verlag  
155 Data Warehousing Based Computer Forensics Investigation Framework Waleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem 12th International Conference on Information Technology : New Generations, Las Vegas, Nevada, USA IEEE  
156 Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation

 

 

Waleed Halboob , Ramlan MahmodNur Izura Udzir, Mohd. Taufik Abdullaha

 

 

The 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Affiliated Workshops

 

 

Elsevier  
157 Cryptanalysis and Enhancement of a Password-Based Authentication Scheme Mohamed Eldefrawy and Jalal Al-Muhtadi Seventh IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2015) Vancouver, Canada.

 

 

IEEE  
158 A Lightweight Key Freshness Scheme for Wireless Sensor Networks

 

 

Ata UllahGhafoor, Muhammad Sher, Muhammad Imran, and

 

KashifSaleem

 

International Conference on Information Technology – New Generations 2015 (ITNG 2015)

 

 

IEEE  
159 Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks

 

 

Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, and Jalal Al-Muhtadi

 

 

12th International Conference on Information Technology – New Generations 2015 (ITNG 2015)

 

 

IEEE  
160 Analysis of Secure Routing Protocols for Wireless Mesh Network Shaker Al Anazi; Kashif Saleem, Ph.D.; and Jalal Al Muhtadi 12th International Conference on Information Technology – New Generations 2015 (ITNG 2015) IEEE  
161 Enhanced Inteliigent Security Mechanism for Mobile Devices Authentication to share eHealth Information Kashif Saleem, Ph.D. and Christoph Thuemmler 12th International Conference on Information Technology – New Generations 2015 (ITNG 2015) IEEE  
162 An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK

 

 

IEEE  
163 Enabling Consumer Trust upon Acceptance of IoT Technologies through Security and Privacy Model W.Z Khan, M.Y Aalsalem, Muhammad Khurram Khan, Q. Arshad 11th International Conference on Future Information Technology (FutureTech’16), April 2016, Beijing, China Springer-Verlag  
164 A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering A. Aburumman, W.J Seo, R. Islam, Muhammad Khurram Khan, K. K.R. Choo SecureComm 2015 Springer-Verlag  
165 On Resilience of Wireless Mesh Routing Protocol against DoS Attacks in IoT-based Ambient Assisted Living Applications Shaker AlanaziJalal Al MuhtadiAbdelouahid DerhabKashif SaleemAfnan AlromiHanan AlholaibahJoel J. P. C. Rodrigues IEEE Healthcom 2015 IEEE  
166 A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui IEEE Wireless Communications and Networking Conference (WCNC 2016)

 

 

IEEE  
167 A Preeclampsia Diagnosis Approach using Bayesian Networks

 

 

Mário W. L. Moreira, Joel J. P. C. Rodrigues, Antonio M. B. Oliveira, Ronaldo F. Ramos, Kashif Saleem 2016 IEEE International Conference on Communications (IEEE ICC 2016)

 

 

IEEE  
168 Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs Asad Raza, Jamal Nazzal Al-Karaki, Haider Abbas 13th International Conference on Information Technology: New Generations Springer-Verlag