Farrukh Aslam Khan

Orcid: 0000-0002-7023-7172

According to our database1, Farrukh Aslam Khan authored at least 104 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework.
IEEE Access, 2024

2023
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
Sensors, December, 2023

A novel routing protocol for underwater wireless sensor networks based on shifted energy efficiency and priority.
Comput. Commun., October, 2023

Internet of drones security: Taxonomies, open issues, and future directions.
Veh. Commun., February, 2023

BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.
Sensors, 2023

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions.
CoRR, 2023

Detection of Data Scarce Malware Using One-Shot Learning With Relation Network.
IEEE Access, 2023

GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures.
IEEE Access, 2023

2021
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.
Sensors, 2021

Hand-based multibiometric systems: state-of-the-art and future challenges.
PeerJ Comput. Sci., 2021

Memory augmented hyper-heuristic framework to solve multi-disciplinary problems inspired by cognitive problem solving skills.
Neural Comput. Appl., 2021

TriDroid: a triage and classification framework for fast detection of mobile threats in android markets.
J. Ambient Intell. Humaniz. Comput., 2021

CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
Complex., 2021

Subjective logic-based trust model for fog computing.
Comput. Commun., 2021

Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT.
IEEE Commun. Mag., 2021

Context-oriented trust computation model for industrial Internet of Things.
Comput. Electr. Eng., 2021

Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network.
IEEE Access, 2021

Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review.
IEEE Access, 2021

Tweet-Based Bot Detection Using Big Data Analytics.
IEEE Access, 2021

Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2020
Formal Verification of Hardware Components in Critical Systems.
Wirel. Commun. Mob. Comput., 2020

Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.
Wirel. Commun. Mob. Comput., 2020

A context-aware encryption protocol suite for edge computing-based IoT devices.
J. Supercomput., 2020

DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.
IEEE Syst. J., 2020

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
Sensors, 2020

Design of normalized fractional SGD computing paradigm for recommender systems.
Neural Comput. Appl., 2020

Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks.
IEEE Access, 2020

An Innovative Optimization Strategy for Efficient Energy Management With Day-Ahead Demand Response Signal and Energy Consumption Forecasting in Smart Grid Using Artificial Neural Network.
IEEE Access, 2020

A Hybrid Approach for Energy Consumption Forecasting With a New Feature Engineering and Optimization Framework in Smart Grid.
IEEE Access, 2020

Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing.
IEEE Access, 2020

MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance.
IEEE Access, 2020

Blockchain and Smart Healthcare Security: A Survey.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020

2019
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.
J. Supercomput., 2019

An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks.
Sensors, 2019

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.
Sensors, 2019

Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
Int. J. Distributed Sens. Networks, 2019

Reducing the effects of DoS attacks in software defined networks using parallel flow installation.
Hum. centric Comput. Inf. Sci., 2019

Accurate detection of sitting posture activities in a secure IoT based assisted living environment.
Future Gener. Comput. Syst., 2019

Toward an optimal solution against Denial of Service attacks in Software Defined Networks.
Future Gener. Comput. Syst., 2019

KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research.
Computer, 2019

An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks.
IEEE Access, 2019

Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.
IEEE Access, 2019

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.
IEEE Access, 2019

Security Safety and Trust Management (SSTM' 19).
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks.
Wirel. Commun. Mob. Comput., 2018

Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multim. Tools Appl., 2018

A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection.
Clust. Comput., 2018

A Multi-Classifier Framework for Open Source Malware Forensics.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

2017
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017

Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Gener. Comput. Syst., 2017

Securing wireless sensor networks for improved performance in cloud-based environments.
Ann. des Télécommunications, 2017

A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments.
IEEE Access, 2017

Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

A Comprehensive Survey on Security in Cloud Computing.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
Identifying an OpenID anti-phishing scheme for cyberspace.
Secur. Commun. Networks, 2016

Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
J. Intell. Fuzzy Syst., 2016

2015
Network intrusion detection using hybrid binary PSO and random forests algorithm.
Secur. Commun. Networks, 2015

Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art.
J. Medical Syst., 2015

Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
Int. J. Distributed Sens. Networks, 2015

A framework to address inconstant user requirements in cloud SLAs management.
Clust. Comput., 2015

Network Intrusion Detection Using Diversity-Based Centroid Mechanism.
Proceedings of the 12th International Conference on Information Technology, 2015

ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Analysis of Detection Features for Wormhole Attacks in MANETs.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks.
J. Medical Syst., 2014

Protocols and Architectures for Next-Generation Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Particle Swarm Optimization with non-linear velocity.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
Advances in communication networks for pervasive and ubiquitous applications.
J. Supercomput., 2013

A novel intrusion detection framework for wireless sensor networks.
Pers. Ubiquitous Comput., 2013

A cluster-based key agreement scheme using keyed hashing for Body Area Networks.
Multim. Tools Appl., 2013

A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications.
Int. J. Distributed Sens. Networks, 2013

Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications.
EURASIP J. Wirel. Commun. Netw., 2013

Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks.
Appl. Soft Comput., 2013

Optimized Energy-Efficient Iterative Distributed Localization for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network.
Proceedings of the IEEE International Conference on Systems, 2013

Welfare State Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Group Counseling Optimization for multi-objective functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

2012
A survey of Intrusion Detection Systems for Wireless Sensor Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization.
Appl. Soft Comput., 2012

Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Comprehensive Parent Selection-based Genetic Algorithm.
Proceedings of the Research and Development in Intelligent Systems XXIX, 2012

2011
Query Processing Systems for Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Binding Update Schemes for Inter-domain Mobility Management in Hierarchical Mobile IPv6: A Survey.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

A Solution to Bipartite Drawing Problem Using Genetic Algorithm.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Security requirements for a cyber physical community system: a case study.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Binary PSO and random forests algorithm for PROBE attacks detection in a network.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

2010
A New Location-Aware Hierarchical Routing Protocol for MANETs.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

Cryptanalysis of Four-Rounded DES Using Binary Artificial Immune System.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

An Improved EKG-Based Key Agreement Scheme for Body Area Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Remote-to-Local attacks detection using incremental genetic algorithm.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

SRCP: Sensor Reliability and Congestion Control Protocol.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Cryptanalysis of four-rounded DES using binary particleswarm optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Cryptanalysis of four-rounded DES using binary particle swarm optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Clustering in Mobile Ad Hoc Networks Using Comprehensive Learning Particle Swarm Optimization (CLPSO).
Proceedings of the Communication and Networking, 2009

Intrusion Detection Systems for Wireless Sensor Networks: A Survey.
Proceedings of the Communication and Networking, 2009

2007
Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
FPGA Implementation of a Neural Network for Character Recognition.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Convergence Analysis of Continuous-Time Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Neural Networks for Optimization Problem with Nonlinear Constraints.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Policy-Based Management in Ad hoc Networks Using Geographic Routing.
Proceedings of the Information Networking, 2006


  Loading...