|On cloud security attacks: A taxonomy and intrusion detection and prevention as a service|
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
|Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art|
S Khan, A Gani, AWA Wahab, M Guizani, MK Khan
IEEE Communications Surveys & Tutorials 19 (1), 303-324, 2016
|From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions|
S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat, S Khan, B Anthony, ...
Algorithms 10 (2), 39, 2017
|Energy efficient computational offloading framework for mobile cloud computing|
M Shiraz, A Gani, A Shamim, S Khan, RW Ahmad
Journal of Grid Computing 13 (1), 1-18, 2015
|Network forensics: Review, taxonomy, and open challenges|
S Khan, A Gani, AWA Wahab, M Shiraz, I Ahmad
Journal of Network and Computer Applications 66, 214-235, 2016
|Cloud log forensics: Foundations, state of the art, and future directions|
S Khan, A Gani, AWA Wahab, MA Bagiwa, M Shiraz, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 49 (1), 1-42, 2016
|A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing|
A Gani, GM Nayeem, M Shiraz, M Sookhak, M Whaiduzzaman, S Khan
Journal of Network and Computer Applications 43, 84-102, 2014
|Towards knowledge modeling and manipulation technologies: A survey|
AT Bimba, N Idris, A Al-Hunaiyyan, RB Mahmud, A Abdelaziz, S Khan, ...
International Journal of Information Management 36 (6), 857-871, 2016
|Passive video forgery detection techniques: a survey|
AWA Wahab, MA Bagiwa, MYI Idris, S Khan, Z Razak, MRK Ariffin
2014 10th International Conference on Information Assurance and Security, 29-34, 2014
|A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing|
S Khan, M Shiraz, AW Abdul Wahab, A Gani, Q Han, Z Bin Abdul Rahman
The Scientific World Journal 2014, 2014
|A multi-objective software defined network traffic measurement|
H Tahaei, R Salleh, S Khan, R Izard, KKR Choo, NB Anuar
Measurement 95, 317-327, 2017
|Feature selection of denial-of-service attacks using entropy and granular computing|
S Khan, A Gani, AWA Wahab, PK Singh
Arabian Journal for Science and Engineering 43 (2), 499-508, 2018
|Distributed controller clustering in software defined networks|
A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ...
PloS one 12 (4), e0174715, 2017
|WDARS: A weighted data aggregation routing strategy with minimum link cost in event-driven WSNs|
O Adil Mahdi, AW Abdul Wahab, MYI Idris, A Abu Znaid, YRB Al-Mayouf, ...
Journal of Sensors 2016, 2016
|Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network|
YRB Al-Mayouf, M Ismail, NF Abdullah, AWA Wahab, OA Mahdi, S Khan, ...
PloS one 11 (11), e0165966, 2016
|A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation|
OA Mahdi, AW Abdul Wahab, MY Idna Idris, AMA Abu znaid, S Khan, ...
Wireless Communications and Mobile Computing 16 (16), 2663-2676, 2016
|Software-defined network forensics: Motivation, potential locations, requirements, and challenges|
S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani
IEEE Network 30 (6), 6-13, 2016
|EE-MRP: Energy-efficient multistage routing protocol for wireless sensor networks|
MK Khan, M Shiraz, K Zrar Ghafoor, S Khan, A Safaa Sadiq, G Ahmed
Wireless Communications and Mobile Computing 2018, 2018
|Real-time intersection-based segment aware routing algorithm for urban vehicular networks|
YRB Al-Mayouf, NF Abdullah, OA Mahdi, S Khan, M Ismail, M Guizani, ...
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2125-2141, 2018
|A novel bio-inspired hybrid algorithm (NBIHA) for efficient resource management in fog computing|
H Rafique, MA Shah, SU Islam, T Maqsood, S Khan, C Maple
IEEE Access 7, 115760-115773, 2019