
Farrukh Aslam Khan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j45]Mohamed Belaoued
, Abdelouahid Derhab
, Smaine Mazouzi
, Farrukh Aslam Khan
:
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance. IEEE Access 8: 14329-14343 (2020) - [j44]Abdelouahid Derhab
, Mohamed Belaoued
, Mohamed Guerroumi
, Farrukh Aslam Khan
:
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 8: 28956-28969 (2020) - [j43]Ghulam Hafeez
, Khurram Saleem Alimgeer
, Zahid Wadud
, Imran Khan, Muhammad Usman
, Abdul Baseer Qazi, Farrukh Aslam Khan
:
An Innovative Optimization Strategy for Efficient Energy Management With Day-Ahead Demand Response Signal and Energy Consumption Forecasting in Smart Grid Using Artificial Neural Network. IEEE Access 8: 84415-84433 (2020) - [j42]Ghulam Hafeez
, Khurram Saleem Alimgeer
, Abdul Baseer Qazi, Imran Khan, Muhammad Usman
, Farrukh Aslam Khan
, Zahid Wadud
:
A Hybrid Approach for Energy Consumption Forecasting With a New Feature Engineering and Optimization Framework in Smart Grid. IEEE Access 8: 96210-96226 (2020) - [j41]Muhammad Ismail
, Mazhar Islam, Ibrar Ahmad, Farrukh Aslam Khan
, Abdul Baseer Qazi, Zawar H. Khan, Zahid Wadud
, Mabrook Al-Rakhami
:
Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 8: 100346-100364 (2020) - [j40]Abdelouahid Derhab
, Abdelghani Bouras
, Mohamed Belaoued
, Leandros A. Maglaras
, Farrukh Aslam Khan
:
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 20(21): 6106 (2020) - [j39]Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Haider Abbas
:
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks. IEEE Syst. J. 14(2): 1933-1944 (2020) - [j38]Zaineb Dar, Adnan Ahmad
, Farrukh Aslam Khan, Furkh Zeshan
, Razi Iqbal, Hafiz Husnain Raza Sherazi
, Ali Kashif Bashir
:
A context-aware encryption protocol suite for edge computing-based IoT devices. J. Supercomput. 76(4): 2548-2567 (2020) - [j37]Abdelouahid Derhab
, Arwa Aldweesh
, Ahmed Z. Emam
, Farrukh Aslam Khan
:
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering. Wirel. Commun. Mob. Comput. 2020: 6689134:1-6689134:16 (2020) - [j36]Wilayat Khan
, Muhammad Kamran
, Syed Rameez Naqvi
, Farrukh Aslam Khan
, Ahmed S. Alghamdi, Eesa Alsolami:
Formal Verification of Hardware Components in Critical Systems. Wirel. Commun. Mob. Comput. 2020: 7346763:1-7346763:15 (2020) - [c37]Noshina Tariq, Ayesha Qamar, Muhammad Asim, Farrukh Aslam Khan:
Blockchain and Smart Healthcare Security: A Survey. FNC/MobiSPC 2020: 615-620
2010 – 2019
- 2019
- [j35]Wilayat Khan
, Muhammad Kamran, Aakash Ahmad, Farrukh Aslam Khan
, Abdelouahid Derhab:
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. IEEE Access 7: 16550-16560 (2019) - [j34]Farrukh Aslam Khan
, Abdu Gumaei
, Abdelouahid Derhab, Amir Hussain:
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. IEEE Access 7: 30373-30385 (2019) - [j33]Zahid Wadud, Muhammad Ismail
, Abdul Baseer Qazi, Farrukh Aslam Khan
, Abdelouahid Derhab
, Ibrar Ahmad, Arbab Masood Ahmad
:
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 7: 175980-175999 (2019) - [j32]Kamran Siddique
, Zahid Akhtar
, Farrukh Aslam Khan
, Yangwoo Kim
:
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. Computer 52(2): 41-51 (2019) - [j31]Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Abdelouahid Derhab
:
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. Future Gener. Comput. Syst. 92: 444-453 (2019) - [j30]Muhammad Tariq
, Hammad Majeed, Mirza Omer Beg, Farrukh Aslam Khan
, Abdelouahid Derhab
:
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. Future Gener. Comput. Syst. 92: 745-757 (2019) - [j29]Muhammad Imran
, Muhammad Hanif Durad, Farrukh Aslam Khan
, Abdelouahid Derhab:
Reducing the effects of DoS attacks in software defined networks using parallel flow installation. Hum. centric Comput. Inf. Sci. 9: 16 (2019) - [j28]Mohamed Belaoued
, Abdelaziz Boukellal, Mohamed Amir Koalal
, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
Combined dynamic multi-feature and rule-based behavior for accurate malware detection. Int. J. Distributed Sens. Networks 15(11) (2019) - [j27]Abdelouahid Derhab
, Mohamed Guerroumi
, Abdu Gumaei
, Leandros A. Maglaras
, Mohamed Amine Ferrag
, Mithun Mukherjee
, Farrukh Aslam Khan
:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [j26]Zahid Wadud, Khadem Ullah
, Abdul Baseer Qazi
, Sadeeq Jan, Farrukh Aslam Khan
, Nasru Minallah:
An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks. Sensors 19(24): 5557 (2019) - [j25]Farrukh Aslam Khan
, Ashfaq Hussain Farooqi, Abdelouahid Derhab:
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. J. Supercomput. 75(4): 2221-2242 (2019) - [c36]Farrukh Aslam Khan
, Abdu Gumaei
:
A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection. ICAIS (2) 2019: 75-86 - [c35]Haider Abbas
, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan:
Security Safety and Trust Management (SSTM' 19). WETICE 2019: 196-197 - 2018
- [j24]Arif Jamal Malik, Farrukh Aslam Khan:
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust. Comput. 21(1): 667-680 (2018) - [j23]Afsheen Ahmed, Rabia Latif
, Seemab Latif, Haider Abbas
, Farrukh Aslam Khan:
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review. Multim. Tools Appl. 77(17): 21947-21965 (2018) - [j22]Farrukh Aslam Khan
, Wang-Cheol Song
, Khi-Jung Ahn:
Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2018: 1583205:1-1583205:10 (2018) - [c34]Naeem Amjad, Hammad Afzal
, Muhammad Faisal Amjad, Farrukh Aslam Khan:
A Multi-Classifier Framework for Open Source Malware Forensics. WETICE 2018: 106-111 - 2017
- [j21]Farrukh Aslam Khan
, Nur Al Hasan Haldar, Aftab Ali, Mohsin Iftikhar, Tanveer A. Zia, Albert Y. Zomaya
:
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments. IEEE Access 5: 13531-13544 (2017) - [j20]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
Securing wireless sensor networks for improved performance in cloud-based environments. Ann. des Télécommunications 72(5-6): 265-282 (2017) - [j19]Farrukh Aslam Khan, Muhammad Imran
, Haider Abbas
, Muhammad Hanif Durad:
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks. Future Gener. Comput. Syst. 68: 416-427 (2017) - [j18]Nur Al Hasan Haldar, Farrukh Aslam Khan, Aftab Ali, Haider Abbas
:
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems. Neurocomputing 220: 221-235 (2017) - [j17]Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. J. Inf. Sci. Eng. 33(6): 1417-1432 (2017) - [c33]Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan:
A Comprehensive Survey on Security in Cloud Computing. FNC/MobiSPC 2017: 465-472 - [c32]Haider Abbas
, Eugenio Orlandi, Farrukh Aslam Khan, Oliver Popov, Asif Masood:
Security, Safety and Trust Management (SSTM '17). WETICE 2017: 242-243 - 2016
- [j16]Haider Abbas
, Muhammad Yasin, Fahad Ahmed, Anam Sajid, Farrukh Aslam Khan, Rana Aamir Raza Ashfaq, Nur Al Hasan Haldar:
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms. J. Intell. Fuzzy Syst. 31(5): 2645-2658 (2016) - [j15]Haider Abbas
, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha:
Identifying an OpenID anti-phishing scheme for cyberspace. Secur. Commun. Networks 9(6): 481-491 (2016) - 2015
- [j14]Waleed Halboob, Haider Abbas
, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha:
A framework to address inconstant user requirements in cloud SLAs management. Clust. Comput. 18(1): 123-133 (2015) - [j13]Ramsha Rizwan
, Farrukh Aslam Khan
, Haider Abbas
, Sajjad Hussain Chauhdary
:
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism. Int. J. Distributed Sens. Networks 11: 684952:1-684952:10 (2015) - [j12]Aftab Ali, Farrukh Aslam Khan:
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art. J. Medical Syst. 39(10): 115:1-115:14 (2015) - [j11]Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan:
Network intrusion detection using hybrid binary PSO and random forests algorithm. Secur. Commun. Networks 8(16): 2646-2660 (2015) - [c31]Muhammad Imran
, Farrukh Aslam Khan, Tauseef Jamal
, Muhammad Hanif Durad:
Analysis of Detection Features for Wormhole Attacks in MANETs. FNC/MobiSPC 2015: 384-390 - [c30]Aftab Ali, Nur Al Hasan Haldar, Farrukh Aslam Khan, Sana Ullah:
ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment. GLOBECOM 2015: 1-7 - 2014
- [j10]Sana Ullah, Joel J. P. C. Rodrigues, Farrukh Aslam Khan
, Christos V. Verikoukis, Zuqing Zhu
:
Protocols and Architectures for Next-Generation Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Aftab Ali
, Farrukh Aslam Khan:
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks. J. Medical Syst. 38(5): 33 (2014) - [c29]Muhammad Imran
, Farrukh Aslam Khan, Haider Abbas
, Mohsin Iftikhar:
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks. ADHOC-NOW Workshops 2014: 111-122 - [c28]Farrukh Aslam Khan, Aftab Ali, Haider Abbas
, Nur Al Hasan Haldar:
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks. FNC/MobiSPC 2014: 511-517 - [c27]Natasha Arjumand Shoaib Mirza, Haider Abbas
, Farrukh Aslam Khan, Jalal Al-Muhtadi
:
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. ISBAST 2014: 129-132 - [c26]Arif Jamal Malik, Farrukh Aslam Khan:
Particle Swarm Optimization with non-linear velocity. SMC 2014: 602-607 - 2013
- [j8]Hamid Ali, Farrukh Aslam Khan:
Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks. Appl. Soft Comput. 13(9): 3903-3921 (2013) - [j7]Aftab Ali
, Farrukh Aslam Khan:
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013: 216 (2013) - [j6]Sarah Irum, Aftab Ali
, Farrukh Aslam Khan, Haider Abbas
:
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Aftab Ali
, Sarah Irum, Firdous Kausar
, Farrukh Aslam Khan:
A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multim. Tools Appl. 66(2): 201-214 (2013) - [j4]Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee:
A novel intrusion detection framework for wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 907-919 (2013) - [j3]Sajid Hussain, Firdous Kausar
, Laurence T. Yang, Farrukh Aslam Khan, Jong Hyuk Park:
Advances in communication networks for pervasive and ubiquitous applications. J. Supercomput. 64(2): 251-255 (2013) - [c25]Hamid Ali, Farrukh Aslam Khan:
Group Counseling Optimization for multi-objective functions. IEEE Congress on Evolutionary Computation 2013: 705-712 - [c24]Hamid Ali, Farrukh Aslam Khan:
Welfare State Optimization. IEEE Congress on Evolutionary Computation 2013: 3315-3322 - [c23]Mansoor-ul-haque, Farrukh Aslam Khan, Mohsin Iftikhar:
Optimized Energy-Efficient Iterative Distributed Localization for Wireless Sensor Networks. SMC 2013: 1407-1412 - [c22]Arif Jamal Malik, Farrukh Aslam Khan:
A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network. SMC 2013: 2473-2478 - 2012
- [j2]Hamid Ali, Waseem Shahzad, Farrukh Aslam Khan:
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl. Soft Comput. 12(7): 1913-1928 (2012) - [j1]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
A survey of Intrusion Detection Systems for Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 9(2): 69-83 (2012) - [c21]Hamid Ali, Farrukh Aslam Khan:
Comprehensive Parent Selection-based Genetic Algorithm. SGAI Conf. 2012: 123-135 - [c20]Humaira Ehsan
, Farrukh Aslam Khan:
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. TrustCom 2012: 1181-1187 - 2011
- [c19]Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan:
Binary PSO and random forests algorithm for PROBE attacks detection in a network. IEEE Congress on Evolutionary Computation 2011: 662-668 - [c18]Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee:
Security requirements for a cyber physical community system: a case study. ISABEL 2011: 166:1-166:5 - [c17]Salabat Khan
, Mohsin Bilal
, Muhammad Sharif, Farrukh Aslam Khan:
A Solution to Bipartite Drawing Problem Using Genetic Algorithm. ICSI (1) 2011: 530-538 - [c16]Humaira Ehsan, Farrukh Aslam Khan:
Query Processing Systems for Wireless Sensor Networks. UCMA (1) 2011: 273-282 - [c15]Afshan Ahmed, Jawad Hassan, Mata ur Rehman, Farrukh Aslam Khan:
Binding Update Schemes for Inter-domain Mobility Management in Hierarchical Mobile IPv6: A Survey. UCMA (2) 2011: 411-420 - 2010
- [c14]Raees Khan, Farrukh Aslam Khan:
SRCP: Sensor Reliability and Congestion Control Protocol. CIT 2010: 1542-1548 - [c13]Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan:
Remote-to-Local attacks detection using incremental genetic algorithm. ICITST 2010: 1-6 - [c12]Aftab Ali
, Farrukh Aslam Khan:
An Improved EKG-Based Key Agreement Scheme for Body Area Networks. ISA 2010: 298-308 - [c11]Syed Ali Abbas Hamdani, Sarah Shafiq, Farrukh Aslam Khan:
Cryptanalysis of Four-Rounded DES Using Binary Artificial Immune System. ICSI (1) 2010: 338-346 - [c10]Farrukh Aslam Khan, Khi-Jung Ahn, Wang-Cheol Song:
A New Location-Aware Hierarchical Routing Protocol for MANETs. UIC 2010: 519-533
2000 – 2009
- 2009
- [c9]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
Intrusion Detection Systems for Wireless Sensor Networks: A Survey. FGIT-FGCN 2009: 234-241 - [c8]Waseem Shahzad, Farrukh Aslam Khan, Abdul Basit Siddiqui:
Clustering in Mobile Ad Hoc Networks Using Comprehensive Learning Particle Swarm Optimization (CLPSO). FGIT-FGCN 2009: 342-349 - [c7]Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan:
Cryptanalysis of four-rounded DES using binary particle swarm optimization. GECCO 2009: 1757-1758 - [c6]Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan:
Cryptanalysis of four-rounded DES using binary particleswarm optimization. GECCO (Companion) 2009: 2161-2166 - 2007
- [c5]Farrukh Aslam Khan, Khi-Jung Ahn, Wang-Cheol Song:
Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery. ICOIN 2007: 213-222 - 2006
- [c4]Farrukh Aslam Khan, Umer Zeeshan Ijaz
, Kyung Youn Kim, Min-Jae Kang, Wang-Cheol Song:
Policy-Based Management in Ad hoc Networks Using Geographic Routing. ICOIN 2006: 237-246 - [c3]Min-Jae Kang, Ho-Chan Kim, Farrukh Aslam Khan, Wang-Cheol Song, Sang Joon Lee:
Neural Networks for Optimization Problem with Nonlinear Constraints. ICONIP (2) 2006: 1014-1021 - [c2]Min-Jae Kang, Ho-Chan Kim, Farrukh Aslam Khan, Wang-Cheol Song, Jacek M. Zurada:
Convergence Analysis of Continuous-Time Neural Networks. ISNN (1) 2006: 100-108 - [c1]Farrukh Aslam Khan, Momin Uppal, Wang-Cheol Song, Min-Jae Kang, Anwar M. Mirza:
FPGA Implementation of a Neural Network for Character Recognition. ISNN (2) 2006: 1357-1365
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-11 00:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint