Name
Affiliation
Papers
FARRUKH ASLAM KHAN
Natl Univ Comp & Emerging Sci, Dept Comp Sci, Islamabad, Pakistan
78
Collaborators
Citations 
PageRank 
138
388
34.17
Referers 
Referees 
References 
986
1612
765
Search Limit
1001000
Title
Citations
PageRank
Year
Memory Augmented Hyper-Heuristic Framework To Solve Multi-Disciplinary Problems Inspired By Cognitive Problem Solving Skills00.342021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism For Detecting Internal Attacks In Internet Of Things40.382021
Subjective Logic-Based Trust Model For Fog Computing10.352021
Tridroid: A Triage And Classification Framework For Fast Detection Of Mobile Threats In Android Markets00.342021
Hand-based multibiometric systems: state-of-the-art and future challenges00.342021
A context-aware encryption protocol suite for edge computing-based IoT devices00.342020
Blockchain and Smart Healthcare Security - A Survey.10.362020
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks20.372020
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing10.352020
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.10.372020
Formal Verification of Hardware Components in Critical Systems.00.342020
Intrusion Detection System For Internet Of Things Based On Temporal Convolution Neural Network And Efficient Feature Engineering00.342020
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance00.342020
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.00.342019
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.00.342019
Accurate detection of sitting posture activities in a secure IoT based assisted living environment.10.352019
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks00.342019
A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection.00.342019
Toward an optimal solution against Denial of Service attacks in Software Defined Networks.40.482019
Reducing the effects of DoS attacks in software defined networks using parallel flow installation00.342019
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.30.392019
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.60.382019
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research.10.412019
An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks.00.342019
Combined Dynamic Multi-Feature And Rule-Based Behavior For Accurate Malware Detection00.342019
Security Safety and Trust Management (SSTM' 19)00.342019
A Multi-Classifier Framework for Open Source Malware Forensics00.342018
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: <Emphasis Type="Italic">A Systematic Literature Review</Emphasis>30.392018
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection20.372018
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection20.372018
Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks.00.342018
Securing wireless sensor networks for improved performance in cloud-based environments.40.422017
Security, Safety and Trust Management (SSTM ‘17)00.342017
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.60.512017
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.00.342017
A Comprehensive Survey on Security in Cloud Computing.30.392017
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments.20.362017
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.40.402017
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.10.352016
Identifying an OpenID anti-phishing scheme for cyberspace.00.342016
Network intrusion detection using hybrid binary PSO and random forests algorithm70.442015
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art240.652015
Anomaly detection in Wireless Sensor Networks using immune-based bioinspired mechanism30.412015
ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment.10.352015
A framework to address inconstant user requirements in cloud SLAs management20.372015
Analysis of Detection Features for Wormhole Attacks in MANETs20.382015
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks850.792014
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.30.402014
A Cloud-based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks140.692014
Particle Swarm Optimization with non-linear velocity10.362014
  • 1
  • 2