Al-Sakib Khan Pathan

According to our database1, Al-Sakib Khan Pathan authored at least 99 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Hybrid data dissemination protocol (HDDP) for wireless sensor networks.
Wireless Networks, 2018

Threats to critical infrastructure from AI and human intelligence.
The Journal of Supercomputing, 2018

Smart Grid Internet of Things.
MONET, 2018

Checkpointing distributed application running on mobile ad hoc networks.
IJHPCN, 2018

Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies.
IJCNIS, 2018

Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols.
IJAHUC, 2018

Advanced Industrial Wireless Sensor Networks and Intelligent IoT.
IEEE Communications Magazine, 2018

An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs.
IEEE Access, 2018

On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep Learning.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wireless Personal Communications, 2017

Introduction to special issue on 'intelligent computing and adaptive systems'.
ISSE, 2017

Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems.
Future Generation Comp. Syst., 2017

Impact of Next-Generation Mobile Technologies on IoT-Cloud Convergence.
IEEE Communications Magazine, 2017

Crowd Associated Network: Exploiting over a Smart Garbage Management System.
IEEE Communications Magazine, 2017

IEEE Access Special Section Editorial: Health Informatics for the Developing World.
IEEE Access, 2017

ECL-EKM: An enhanced Certificateless Effective Key Management protocol for dynamic WSN.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Prolonging the lifetime of wireless sensor networks using secondary sink nodes.
Telecommunication Systems, 2016

SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs.
Telecommunication Systems, 2016

Skip block based distributed source coding for hyperspectral image compression.
Multimedia Tools Appl., 2016

Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm.
IJCNIS, 2016

Mitigating Cross-Site Scripting Attacks with a Content Security Policy.
IEEE Computer, 2016

MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body.
Wireless Personal Communications, 2015

Critical applications in vehicular ad hoc/sensor networks.
Telecommunication Systems, 2015

Information integrity in smart grid systems.
Inf. Syst., 2015

Learning Algorithms for Anomaly Detection from Images.
IJSDA, 2015

Advances in Multimedia Sensor Networks for Health-Care and Related Applications.
IJDSN, 2015

Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue.
IJAHUC, 2015

A High-throughput routing metric for multi-hop Underwater Acoustic Networks.
Computers & Electrical Engineering, 2015

Routing protocol design for secure WSN: Review and open research issues.
J. Network and Computer Applications, 2014

Defending against wireless network intrusion.
J. Comput. Syst. Sci., 2014

Editorial article: On the boundaries of trust and security in computing and communications systems.
IJTMCC, 2014

Advances in Cognitive Radio Sensor Networks.
IJDSN, 2014

Emerging Sensor-Cloud Technology for Pervasive Services and Applications.
IJDSN, 2014

Lethality of SQL injection against current and future internet technologies.
IJCSE, 2014

On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey.
IJCNIS, 2014

Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach.
Computers & Electrical Engineering, 2014

International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Adaptive algorithms for automated intruder detection in surveillance networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Towards Privacy Protection in Smart Grid.
Wireless Personal Communications, 2013

Guest Editorial - Special Issue on Recent Advance on Mobile Sensor Systems.
Telecommunication Systems, 2013

A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks.
Simulation, 2013

Efficient and effective automated surveillance agents using kernel tricks.
Simulation, 2013

Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models.
Mathematical and Computer Modelling, 2013

Wireless Sensor Networks Based on Environmental Energy Harvesting.
IJDSN, 2013

SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems.
IJCNIS, 2013

A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies.
IJCNIS, 2013

Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks.
IJCNIS, 2013

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Communications Surveys and Tutorials, 2013

Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform.
Proceedings of the Security and Privacy in Communication Networks, 2013

On the Key Revocation Schemes in Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Automated Intruder Detection from Image Sequences using Minimum Volume Sets.
IJCNIS, 2012

Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs.
Int. Arab J. Inf. Technol., 2012

On the Boundaries of Trust and Security in Computing and Communications Systems
CoRR, 2012

IDPS: An Integrated Intrusion Handling Model for Cloud
CoRR, 2012

Protection of Integrity and Ownership of PDF Documents Using Invisible Signature.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network.
Security and Communication Networks, 2011

ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols.
Mathematical and Computer Modelling, 2011

Recent advances in simulation and mathematical modeling of wireless networks.
Mathematical and Computer Modelling, 2011

On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster
CoRR, 2011

Performance analysis of a highly available home agent in mobile networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Network Management in Distributed Systems.
Scalable Computing: Practice and Experience, 2010

A case study: establishing redundant access networks in the telecommunication sector of a developing country.
IJITCC, 2010

Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme.
IJCNIS, 2010

A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards.
IJCNIS, 2010

A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

An Enhanced Tree-Based Key Management Scheme for Secure Communication in Wireless Sensor Network.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool
CoRR, 2009

Bilinear-pairing-based remote user authentication schemes using smart cards.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks.
TIIS, 2008

NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks.
Int. Arab J. Inf. Technol., 2008

Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic
CoRR, 2008

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
CoRR, 2008

Securing U-Healthcare Sensor Networks using Public Key Based Scheme
CoRR, 2008

SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks.
Annales des Télécommunications, 2008

Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Transactions, 2007

An Efficient PKC-Based Security Architecture for Wireless Sensor Networks
CoRR, 2007

A Secure Lightweight Approach of Node Membership Verification in Dense HDSN
CoRR, 2007

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
CoRR, 2007

A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards
CoRR, 2007

Secure Clustering in DSN with Key Predistribution and WCDS
CoRR, 2007

Developing an Efficient DMCIS with Next-Generation Wireless Networks
CoRR, 2007

Smartening the Environment using Wireless Sensor Networks in a Developing Country
CoRR, 2007

Security in Wireless Sensor Networks: Issues and Challenges
CoRR, 2007

A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
CoRR, 2007

A Secure Energy-Efficient Routing Protocol for WSN.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Securing Sensor Reports in Wireless Sensor Networks*.
Proceedings of the Euro-Par 2007, 2007

Security Management in Wireless Sensor Networks with a Public Key Based Scheme.
Proceedings of the Managing Next Generation Networks and Services, 2007

A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006

A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN.
Proceedings of the High Performance Computing and Communications, 2006

A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks.
Proceedings of the Management of Convergence Networks and Services, 2006

An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006