Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Follow
Farrukh Aslam Khan
Title
Cited by
Cited by
Year
A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
FA Khan, A Gumaei, A Derhab, A Hussain
IEEE Access, 2019
3842019
A comprehensive survey on security in cloud computing
G Ramachandra, M Iftikhar, FA Khan
Procedia Computer Science 110, 465-472, 2017
2522017
Securing critical infrastructures: deep-learning-based threat detection in IIoT
K Yu, L Tan, S Mumtaz, S Al-Rubaye, A Al-Dulaimi, AK Bashir, FA Khan
IEEE Communications Magazine 59 (10), 76-82, 2021
2472021
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization
H Ali, W Shahzad, FA Khan
Applied Soft Computing 12 (7), 1913-1928, 2012
1952012
Blockchain and smart healthcare security: a survey
N Tariq, A Qamar, M Asim, FA Khan
Procedia Computer Science 175, 615-620, 2020
1712020
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
1612019
KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research
K Siddique, Z Akhtar, FA Khan, Y Kim
Computer 52 (2), 41-51, 2019
1602019
An innovative optimization strategy for efficient energy management with day-ahead demand response signal and energy consumption forecasting in smart grid using artificial …
G Hafeez, KS Alimgeer, Z Wadud, I Khan, M Usman, AB Qazi, FA Khan
IEEe Access 8, 84415-84433, 2020
1362020
Intrusion detection systems for wireless sensor networks: A survey
AH Farooqi, FA Khan
International Conference on Future Generation Communication and Networking …, 2009
1212009
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering
A Derhab, A Aldweesh, AZ Emam, FA Khan
Wireless Communications and Mobile Computing 2020 (1), 6689134, 2020
1112020
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
FA Khan, A Ali, H Abbas, NAH Haldar
Procedia Computer Science 34, 511-517, 2014
1092014
Malicious AODV: implementation and analysis of routing attacks in MANETs
H Ehsan, FA Khan
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
1042012
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
AJ Malik, FA Khan
Cluster Computing 21, 667-680, 2018
1012018
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid
G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab
Applied Energy 299, 117178, 2021
892021
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
A Ahmed, R Latif, S Latif, H Abbas, FA Khan
Multimedia Tools and Applications 77, 21947-21965, 2018
882018
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
NAH Haldar, FA Khan, A Ali, H Abbas
Neurocomputing 220, 221-235, 2017
862017
Detection and prediction of diabetes using data mining: a comprehensive review
FA Khan, K Zeb, M Al-Rakhami, A Derhab, SAC Bukhari
IEEE Access 9, 43711-43735, 2021
822021
Network intrusion detection using hybrid binary PSO and random forests algorithm
AJ Malik, W Shahzad, FA Khan
Security and Communication Networks 8 (16), 2646-2660, 2015
782015
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
A Ali, FA Khan
EURASIP Journal on Wireless Communications and Networking 2013, 1-19, 2013
762013
Toward an optimal solution against denial of service attacks in software defined networks
M Imran, MH Durad, FA Khan, A Derhab
Future Generation Computer Systems 92, 444-453, 2019
692019
The system can't perform the operation now. Try again later.
Articles 1–20