Atta ur Rehman Khan

  • COMSATS Institute of Information Technology, Abbottabad, Pakistan
  • University of Malaya, Kuala Lumpur, Malaysia

According to our database1, Atta ur Rehman Khan authored at least 53 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



HeuCrip: a malware detection approach for internet of battlefield things.
Clust. Comput., April, 2023

Reinforcement learning for intelligent online computation offloading in wireless powered edge networks.
Clust. Comput., April, 2023

Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs.
Clust. Comput., February, 2023

Optimized D-RAN Aware Data Retrieval for 5G Information Centric Networks.
Wirel. Pers. Commun., 2022

Memory Visualization-Based Malware Detection Technique.
Sensors, 2022

A lightweight and compromise-resilient authentication scheme for IoTs.
Trans. Emerg. Telecommun. Technol., 2022

Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System.
IEEE Access, 2022

A Blockchain-Based IoT-Enabled E-Waste Tracking and Tracing System for Smart Cities.
IEEE Access, 2022

Improving security of the Internet of Things via RF fingerprinting based device identification system.
Neural Comput. Appl., 2021

RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations.
Clust. Comput., 2021

An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters.
J. Netw. Comput. Appl., 2020

Survivability Analysis of MANET Routing Protocols under DOS Attacks.
KSII Trans. Internet Inf. Syst., 2020

Real-Time Fuel Truck Detection Algorithm Based on Deep Convolutional Neural Network.
IEEE Access, 2020

Optimal Content Caching in Content-Centric Networks.
Wirel. Commun. Mob. Comput., 2019

CPU-RAM-based energy-efficient resource allocation in clouds.
J. Supercomput., 2019

A fog-based security framework for intelligent traffic light control system.
Multim. Tools Appl., 2019

A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis.
Int. J. Inf. Technol. Web Eng., 2019

A load balanced task scheduling heuristic for large-scale computing systems.
Comput. Syst. Sci. Eng., 2019

Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs.
Concurr. Comput. Pract. Exp., 2019

Anonymous and formally verified dual signature based online e-voting protocol.
Clust. Comput., 2019

Identification of Yeast's Interactome Using Neural Networks.
IEEE Access, 2019

SocialRec: A Context-Aware Recommendation Framework With Explicit Sentiment Analysis.
IEEE Access, 2019

There's No Such Thing as Free Lunch but Envy among Young Facebookers.
KSII Trans. Internet Inf. Syst., 2018

An Optimal Ride Sharing Recommendation Framework for Carpooling Services.
IEEE Access, 2018

Masquerading Attacks Detection in Mobile Ad Hoc Networks.
IEEE Access, 2018

Performance Assessment of Dynamic Analysis Based Energy Estimation Tools.
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018

Computation Offloading Cost Estimation in Mobile Cloud Application Models.
Wirel. Pers. Commun., 2017

Review and Performance Analysis of Position Based Routing in VANETs.
Wirel. Pers. Commun., 2017

RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
J. Sens. Actuator Networks, 2017

Execution Models for Mobile Data Analytics.
IT Prof., 2017

Diet-Right: A Smart Food Recommendation System.
KSII Trans. Internet Inf. Syst., 2017

A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment.
Int. J. Commun. Syst., 2017

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
Comput. Syst. Sci. Eng., 2017

A Survey of Mobile Device Virtualization: Taxonomy and State of the Art.
ACM Comput. Surv., 2016

MobiByte: An Application Development Model for Mobile Cloud Computing.
J. Grid Comput., 2015

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015

Merging of DHT-based logical networks in MANETs.
Trans. Emerg. Telecommun. Technol., 2015

Context-Aware Mobile Cloud Computing and Its Challenges.
IEEE Cloud Comput., 2015

3D-RP: A DHT-Based Routing Protocol for MANETs.
Comput. J., 2015

Resource management in cloud computing: Taxonomy, prospects, and challenges.
Comput. Electr. Eng., 2015

Road Oriented Traffic Information System for Vehicular Ad hoc Networks.
Wirel. Pers. Commun., 2014

Pirax: framework for application piracy control in mobile cloud environment.
J. Supercomput., 2014

Incremental proxy re-encryption scheme for mobile cloud computing environment.
J. Supercomput., 2014

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014

Routing protocols for mobile sensor networks: a comparative study.
Comput. Syst. Sci. Eng., 2014

A Novel Application Licensing Framework for Mobile Cloud Environment.
CoRR, 2014

A Survey of Mobile Cloud Computing Application Models.
IEEE Commun. Surv. Tutorials, 2014

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013

A Performance Comparison of Network Simulators for Wireless Networks.
CoRR, 2013

Framework for Ubiquitous Social Networks.
CoRR, 2013

Routing Proposals for Multipath Interdomain Routing.
CoRR, 2013

Clustering-based power-controlled routing for mobile wireless sensor networks.
Int. J. Commun. Syst., 2012

Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012