Suleman Khan
Citée par
Citée par
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art
S Khan, A Gani, AWA Wahab, M Guizani, MK Khan
IEEE Communications Surveys & Tutorials 19 (1), 303-324, 2016
From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions
S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat, S Khan, B Anthony, ...
Algorithms 10 (2), 39, 2017
Energy efficient computational offloading framework for mobile cloud computing
M Shiraz, A Gani, A Shamim, S Khan, RW Ahmad
Journal of Grid Computing 13 (1), 1-18, 2015
Network forensics: Review, taxonomy, and open challenges
S Khan, A Gani, AWA Wahab, M Shiraz, I Ahmad
Journal of Network and Computer Applications 66, 214-235, 2016
Cloud log forensics: Foundations, state of the art, and future directions
S Khan, A Gani, AWA Wahab, MA Bagiwa, M Shiraz, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 49 (1), 1-42, 2016
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
A Gani, GM Nayeem, M Shiraz, M Sookhak, M Whaiduzzaman, S Khan
Journal of Network and Computer Applications 43, 84-102, 2014
Towards knowledge modeling and manipulation technologies: A survey
AT Bimba, N Idris, A Al-Hunaiyyan, RB Mahmud, A Abdelaziz, S Khan, ...
International Journal of Information Management 36 (6), 857-871, 2016
Passive video forgery detection techniques: a survey
AWA Wahab, MA Bagiwa, MYI Idris, S Khan, Z Razak, MRK Ariffin
2014 10th International Conference on Information Assurance and Security, 29-34, 2014
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
S Khan, M Shiraz, AW Abdul Wahab, A Gani, Q Han, Z Bin Abdul Rahman
The Scientific World Journal 2014, 2014
A multi-objective software defined network traffic measurement
H Tahaei, R Salleh, S Khan, R Izard, KKR Choo, NB Anuar
Measurement 95, 317-327, 2017
Feature selection of denial-of-service attacks using entropy and granular computing
S Khan, A Gani, AWA Wahab, PK Singh
Arabian Journal for Science and Engineering 43 (2), 499-508, 2018
Distributed controller clustering in software defined networks
A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ...
PloS one 12 (4), e0174715, 2017
WDARS: A weighted data aggregation routing strategy with minimum link cost in event-driven WSNs
O Adil Mahdi, AW Abdul Wahab, MYI Idris, A Abu Znaid, YRB Al-Mayouf, ...
Journal of Sensors 2016, 2016
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
YRB Al-Mayouf, M Ismail, NF Abdullah, AWA Wahab, OA Mahdi, S Khan, ...
PloS one 11 (11), e0165966, 2016
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
OA Mahdi, AW Abdul Wahab, MY Idna Idris, AMA Abu znaid, S Khan, ...
Wireless Communications and Mobile Computing 16 (16), 2663-2676, 2016
Software-defined network forensics: Motivation, potential locations, requirements, and challenges
S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani
IEEE Network 30 (6), 6-13, 2016
EE-MRP: Energy-efficient multistage routing protocol for wireless sensor networks
MK Khan, M Shiraz, K Zrar Ghafoor, S Khan, A Safaa Sadiq, G Ahmed
Wireless Communications and Mobile Computing 2018, 2018
Real-time intersection-based segment aware routing algorithm for urban vehicular networks
YRB Al-Mayouf, NF Abdullah, OA Mahdi, S Khan, M Ismail, M Guizani, ...
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2125-2141, 2018
A novel bio-inspired hybrid algorithm (NBIHA) for efficient resource management in fog computing
H Rafique, MA Shah, SU Islam, T Maqsood, S Khan, C Maple
IEEE Access 7, 115760-115773, 2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20