Suleman Khan
Citat de
Citat de
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions
S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat, S Khan, B Anthony, ...
Algorithms 10 (2), 39, 2017
Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art
S Khan, A Gani, AWA Wahab, M Guizani, MK Khan
IEEE Communications Surveys & Tutorials 19 (1), 303-324, 2016
Network forensics: Review, taxonomy, and open challenges
S Khan, A Gani, AWA Wahab, M Shiraz, I Ahmad
Journal of Network and Computer Applications 66, 214-235, 2016
Energy efficient computational offloading framework for mobile cloud computing
M Shiraz, A Gani, A Shamim, S Khan, RW Ahmad
Journal of Grid Computing 13 (1), 1-18, 2015
Cloud log forensics: foundations, state of the art, and future directions
S Khan, A Gani, AWA Wahab, MA Bagiwa, M Shiraz, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 49 (1), 1-42, 2016
An efficient reinforcement learning-based Botnet detection approach
M Alauthman, N Aslam, M Al-Kasassbeh, S Khan, A Al-Qerem, KKR Choo
Journal of Network and Computer Applications 150, 102479, 2020
A novel bio-inspired hybrid algorithm (NBIHA) for efficient resource management in fog computing
H Rafique, MA Shah, SU Islam, T Maqsood, S Khan, C Maple
IEEE Access 7, 115760-115773, 2019
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
A Gani, GM Nayeem, M Shiraz, M Sookhak, M Whaiduzzaman, S Khan
Journal of Network and Computer Applications 43, 84-102, 2014
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges
AIA Ahmed, SH Ab Hamid, A Gani, MK Khan
Journal of Network and Computer Applications 145, 102409, 2019
Towards knowledge modeling and manipulation technologies: A survey
AT Bimba, N Idris, A Al-Hunaiyyan, RB Mahmud, A Abdelaziz, S Khan, ...
International Journal of Information Management 36 (6), 857-871, 2016
A comprehensive survey of load balancing techniques in software-defined network
M Hamdan, E Hassan, A Abdelaziz, A Elhigazi, B Mohammed, S Khan, ...
Journal of Network and Computer Applications 174, 102856, 2021
Distributed controller clustering in software defined networks
A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ...
PloS one 12 (4), e0174715, 2017
Feature selection of denial-of-service attacks using entropy and granular computing
S Khan, A Gani, AWA Wahab, PK Singh
Arabian Journal for Science and Engineering 43 (2), 499-508, 2018
EE-MRP: energy-efficient multistage routing protocol for wireless sensor networks
MK Khan, M Shiraz, K Zrar Ghafoor, S Khan, A Safaa Sadiq, G Ahmed
Wireless Communications and Mobile Computing 2018, 2018
Real-time intersection-based segment aware routing algorithm for urban vehicular networks
YRB Al-Mayouf, NF Abdullah, OA Mahdi, S Khan, M Ismail, M Guizani, ...
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2125-2141, 2018
Software-defined network forensics: Motivation, potential locations, requirements, and challenges
S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani
IEEE Network 30 (6), 6-13, 2016
Delay-aware accident detection and response system using fog computing
BK Dar, MA Shah, SU Islam, C Maple, S Mussadiq, S Khan
Ieee Access 7, 70975-70985, 2019
Passive video forgery detection techniques: A survey
AWA Wahab, MA Bagiwa, MYI Idris, S Khan, Z Razak, MRK Ariffin
2014 10th International Conference on Information Assurance and Security, 29-34, 2014
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
S Khan, M Shiraz, AW Abdul Wahab, A Gani, Q Han, Z Bin Abdul Rahman
The Scientific World Journal 2014, 2014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20