Follow
Farrukh Aslam Khan
Title
Cited by
Cited by
Year
A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
FA Khan, A Gumaei, A Derhab, A Hussain
IEEE Access, 2019
3262019
A comprehensive survey on security in cloud computing
G Ramachandra, M Iftikhar, FA Khan
Procedia Computer Science 110, 465-472, 2017
2292017
Securing critical infrastructures: deep-learning-based threat detection in IIoT
K Yu, L Tan, S Mumtaz, S Al-Rubaye, A Al-Dulaimi, AK Bashir, FA Khan
IEEE Communications Magazine 59 (10), 76-82, 2021
2062021
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization
H Ali, W Shahzad, FA Khan
Applied Soft Computing 12 (7), 1913-1928, 2012
1902012
Blockchain and smart healthcare security: a survey
N Tariq, A Qamar, M Asim, FA Khan
Procedia Computer Science 175, 615-620, 2020
1432020
KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research
K Siddique, Z Akhtar, FA Khan, Y Kim
Computer 52 (2), 41-51, 2019
1412019
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
1322019
Intrusion detection systems for wireless sensor networks: A survey
AH Farooqi, FA Khan
International Conference on Future Generation Communication and Networking …, 2009
1182009
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
FA Khan, A Ali, H Abbas, NAH Haldar
Procedia Computer Science 34, 511-517, 2014
1012014
Malicious AODV: implementation and analysis of routing attacks in MANETs
H Ehsan, FA Khan
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
1012012
An innovative optimization strategy for efficient energy management with day-ahead demand response signal and energy consumption forecasting in smart grid using artificial …
G Hafeez, KS Alimgeer, Z Wadud, I Khan, M Usman, AB Qazi, FA Khan
IEEE Access 8, 84415-84433, 2020
982020
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
AJ Malik, FA Khan
Cluster Computing 21, 667-680, 2018
952018
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering
A Derhab, A Aldweesh, AZ Emam, FA Khan
Wireless Communications and Mobile Computing 2020, 1-16, 2020
892020
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
A Ahmed, R Latif, S Latif, H Abbas, FA Khan
Multimedia Tools and Applications 77, 21947-21965, 2018
822018
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
NAH Haldar, FA Khan, A Ali, H Abbas
Neurocomputing 220, 221-235, 2017
812017
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
A Ali, FA Khan
EURASIP Journal on Wireless Communications and Networking 2013, 1-19, 2013
742013
Network intrusion detection using hybrid binary PSO and random forests algorithm
AJ Malik, W Shahzad, FA Khan
Security and Communication Networks 8 (16), 2646-2660, 2015
712015
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid
G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab
Applied Energy 299, 117178, 2021
642021
Toward an optimal solution against denial of service attacks in software defined networks
M Imran, MH Durad, FA Khan, A Derhab
Future Generation Computer Systems 92, 444-453, 2019
642019
Key agreement schemes in wireless body area networks: Taxonomy and state-of-the-art
A Ali, FA Khan
Journal of medical systems 39, 1-14, 2015
622015
The system can't perform the operation now. Try again later.
Articles 1–20