Farrukh Aslam Khan

According to our database1, Farrukh Aslam Khan authored at least 53 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.
Multimedia Tools Appl., 2018

2017
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
J. Inf. Sci. Eng., 2017

Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
Neurocomputing, 2017

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks.
Future Generation Comp. Syst., 2017

Securing wireless sensor networks for improved performance in cloud-based environments.
Annales des Télécommunications, 2017

A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments.
IEEE Access, 2017

Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

A Comprehensive Survey on Security in Cloud Computing.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
Identifying an OpenID anti-phishing scheme for cyberspace.
Security and Communication Networks, 2016

Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
Journal of Intelligent and Fuzzy Systems, 2016

2015
Network intrusion detection using hybrid binary PSO and random forests algorithm.
Security and Communication Networks, 2015

Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art.
J. Medical Systems, 2015

Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism.
IJDSN, 2015

A framework to address inconstant user requirements in cloud SLAs management.
Cluster Computing, 2015

ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Analysis of Detection Features for Wormhole Attacks in MANETs.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2014
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks.
J. Medical Systems, 2014

Protocols and Architectures for Next-Generation Wireless Sensor Networks.
IJDSN, 2014

Particle Swarm Optimization with non-linear velocity.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks.
Proceedings of the Ad-hoc Networks and Wireless, 2014

2013
Advances in communication networks for pervasive and ubiquitous applications.
The Journal of Supercomputing, 2013

A novel intrusion detection framework for wireless sensor networks.
Personal and Ubiquitous Computing, 2013

A cluster-based key agreement scheme using keyed hashing for Body Area Networks.
Multimedia Tools Appl., 2013

A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications.
IJDSN, 2013

Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications.
EURASIP J. Wireless Comm. and Networking, 2013

Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks.
Appl. Soft Comput., 2013

Optimized Energy-Efficient Iterative Distributed Localization for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Systems, 2013

A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network.
Proceedings of the IEEE International Conference on Systems, 2013

Welfare State Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Group Counseling Optimization for multi-objective functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

2012
A survey of Intrusion Detection Systems for Wireless Sensor Networks.
IJAHUC, 2012

Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization.
Appl. Soft Comput., 2012

Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Comprehensive Parent Selection-based Genetic Algorithm.
Proceedings of the Research and Development in Intelligent Systems XXIX, 2012

2011
A Solution to Bipartite Drawing Problem Using Genetic Algorithm.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Security requirements for a cyber physical community system: a case study.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Binary PSO and random forests algorithm for PROBE attacks detection in a network.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

2010
A New Location-Aware Hierarchical Routing Protocol for MANETs.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

Cryptanalysis of Four-Rounded DES Using Binary Artificial Immune System.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

An Improved EKG-Based Key Agreement Scheme for Body Area Networks.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Remote-to-Local attacks detection using incremental genetic algorithm.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

SRCP: Sensor Reliability and Congestion Control Protocol.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Cryptanalysis of four-rounded DES using binary particleswarm optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Cryptanalysis of four-rounded DES using binary particle swarm optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Clustering in Mobile Ad Hoc Networks Using Comprehensive Learning Particle Swarm Optimization (CLPSO).
Proceedings of the Communication and Networking, 2009

Intrusion Detection Systems for Wireless Sensor Networks: A Survey.
Proceedings of the Communication and Networking, 2009

2007
Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

2006
FPGA Implementation of a Neural Network for Character Recognition.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Convergence Analysis of Continuous-Time Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Neural Networks for Optimization Problem with Nonlinear Constraints.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Policy-Based Management in Ad hoc Networks Using Geographic Routing.
Proceedings of the Information Networking, 2006


  Loading...