Atta ur Rehman Khan

Orcid: 0000-0003-2930-6508

Affiliations:
  • COMSATS Institute of Information Technology, Abbottabad, Pakistan
  • University of Malaya, Kuala Lumpur, Malaysia


According to our database1, Atta ur Rehman Khan authored at least 60 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things.
IEEE Access, 2024

2023
A survey of Kubernetes scheduling algorithms.
J. Cloud Comput., December, 2023

HeuCrip: a malware detection approach for internet of battlefield things.
Clust. Comput., April, 2023

Reinforcement learning for intelligent online computation offloading in wireless powered edge networks.
Clust. Comput., April, 2023

Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs.
Clust. Comput., February, 2023

Impact of COVID-19 lockdown on air quality analyzed through machine learning techniques.
PeerJ Comput. Sci., 2023

An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things.
IEEE Access, 2023

Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and U<sup>EN</sup>-PDNet.
IEEE Access, 2023

Blockchain-Based Transparent and Secure System for Construction Equipment and Machinery Rental.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

Blockchain-Based System for End-to-End Donations Monitoring.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Optimized D-RAN Aware Data Retrieval for 5G Information Centric Networks.
Wirel. Pers. Commun., 2022

Memory Visualization-Based Malware Detection Technique.
Sensors, 2022

A lightweight and compromise-resilient authentication scheme for IoTs.
Trans. Emerg. Telecommun. Technol., 2022

Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System.
IEEE Access, 2022

A Blockchain-Based IoT-Enabled E-Waste Tracking and Tracing System for Smart Cities.
IEEE Access, 2022

2021
Improving security of the Internet of Things via RF fingerprinting based device identification system.
Neural Comput. Appl., 2021

RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations.
Clust. Comput., 2021

2020
An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters.
J. Netw. Comput. Appl., 2020

Survivability Analysis of MANET Routing Protocols under DOS Attacks.
KSII Trans. Internet Inf. Syst., 2020

Real-Time Fuel Truck Detection Algorithm Based on Deep Convolutional Neural Network.
IEEE Access, 2020

2019
Optimal Content Caching in Content-Centric Networks.
Wirel. Commun. Mob. Comput., 2019

CPU-RAM-based energy-efficient resource allocation in clouds.
J. Supercomput., 2019

A fog-based security framework for intelligent traffic light control system.
Multim. Tools Appl., 2019

A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis.
Int. J. Inf. Technol. Web Eng., 2019

A load balanced task scheduling heuristic for large-scale computing systems.
Comput. Syst. Sci. Eng., 2019

Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs.
Concurr. Comput. Pract. Exp., 2019

Anonymous and formally verified dual signature based online e-voting protocol.
Clust. Comput., 2019

Identification of Yeast's Interactome Using Neural Networks.
IEEE Access, 2019

SocialRec: A Context-Aware Recommendation Framework With Explicit Sentiment Analysis.
IEEE Access, 2019

2018
There's No Such Thing as Free Lunch but Envy among Young Facebookers.
KSII Trans. Internet Inf. Syst., 2018

An Optimal Ride Sharing Recommendation Framework for Carpooling Services.
IEEE Access, 2018

Masquerading Attacks Detection in Mobile Ad Hoc Networks.
IEEE Access, 2018

Performance Assessment of Dynamic Analysis Based Energy Estimation Tools.
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018

2017
Computation Offloading Cost Estimation in Mobile Cloud Application Models.
Wirel. Pers. Commun., 2017

Review and Performance Analysis of Position Based Routing in VANETs.
Wirel. Pers. Commun., 2017

RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
J. Sens. Actuator Networks, 2017

Execution Models for Mobile Data Analytics.
IT Prof., 2017

Diet-Right: A Smart Food Recommendation System.
KSII Trans. Internet Inf. Syst., 2017

A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment.
Int. J. Commun. Syst., 2017

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
Comput. Syst. Sci. Eng., 2017

2016
A Survey of Mobile Device Virtualization: Taxonomy and State of the Art.
ACM Comput. Surv., 2016

2015
MobiByte: An Application Development Model for Mobile Cloud Computing.
J. Grid Comput., 2015

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015

Merging of DHT-based logical networks in MANETs.
Trans. Emerg. Telecommun. Technol., 2015

Context-Aware Mobile Cloud Computing and Its Challenges.
IEEE Cloud Comput., 2015

3D-RP: A DHT-Based Routing Protocol for MANETs.
Comput. J., 2015

Resource management in cloud computing: Taxonomy, prospects, and challenges.
Comput. Electr. Eng., 2015

2014
Road Oriented Traffic Information System for Vehicular Ad hoc Networks.
Wirel. Pers. Commun., 2014

Pirax: framework for application piracy control in mobile cloud environment.
J. Supercomput., 2014

Incremental proxy re-encryption scheme for mobile cloud computing environment.
J. Supercomput., 2014

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014

Routing protocols for mobile sensor networks: a comparative study.
Comput. Syst. Sci. Eng., 2014

A Novel Application Licensing Framework for Mobile Cloud Environment.
CoRR, 2014

A Survey of Mobile Cloud Computing Application Models.
IEEE Commun. Surv. Tutorials, 2014

2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013

A Performance Comparison of Network Simulators for Wireless Networks.
CoRR, 2013

Framework for Ubiquitous Social Networks.
CoRR, 2013

Routing Proposals for Multipath Interdomain Routing.
CoRR, 2013

2012
Clustering-based power-controlled routing for mobile wireless sensor networks.
Int. J. Commun. Syst., 2012

Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012


  Loading...