Habib Ullah Khan

Orcid: 0000-0001-8373-2781

Affiliations:
  • Qatar University, Doha


According to our database1, Habib Ullah Khan authored at least 88 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revolutionizing software developmental processes by utilizing continuous software approaches.
J. Supercomput., May, 2024

Systematic analysis of software development in cloud computing perceptions.
J. Softw. Evol. Process., February, 2024

Detection of central serous retinopathy using deep learning through retinal images.
Multim. Tools Appl., 2024

Possible impact of video lecture capture as an e-learning tool: a case study of higher education of Republic of Korea.
Int. J. Bus. Inf. Syst., 2024

2023
Role of authentication factors in Fin-tech mobile transaction security.
J. Big Data, December, 2023

Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review.
J. Big Data, December, 2023

Digital-Twins-Based Internet of Robotic Things for Remote Health Monitoring of COVID-19 Patients.
IEEE Internet Things J., September, 2023

Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices.
Phys. Commun., August, 2023

A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions.
Comput. Networks, April, 2023

PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals.
Neural Process. Lett., February, 2023

Analysis of Cursive Text Recognition Systems: A Systematic Literature Review.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2023

Assessing the Role of AI-Based Smart Sensors in Smart Cities Using AHP and MOORA.
Sensors, 2023

A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain.
Inf., 2023

Role of e-voting system for void of errors in the electoral manipulations: a case study of Nigeria.
Int. J. Bus. Inf. Syst., 2023

Utilizing Bio Metric System for Enhancing Cyber Security in Banking Sector: A Systematic Analysis.
IEEE Access, 2023

2022
Editorial on decision support system for development of intelligent applications.
Soft Comput., 2022

Toward a Significant E-Voting Adoption Model: The Digital Divide.
Int. J. Technol. Hum. Interact., 2022

Web 2.0 technologies adoption barriers for external contacts and participation: a case study of federal establishment of Africa.
Int. J. Bus. Inf. Syst., 2022

Ensemble deep learning for brain tumor detection.
Frontiers Comput. Neurosci., 2022

An efficient approach for textual data classification using deep learning.
Frontiers Comput. Neurosci., 2022

Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan.
Comput. Electr. Eng., 2022

GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment.
Comput. Ind. Eng., 2022

A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method.
IEEE Access, 2022

Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches.
IEEE Access, 2022

Systematic Literature Review on Security Risks and its Practices in Secure Software Development.
IEEE Access, 2022

Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: A Systemic Literture Review of Busniess Sectors.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

2021
DLSA: Delay and Link Stability Aware Routing Protocol for Flying Ad-hoc Networks (FANETs).
Wirel. Pers. Commun., 2021

Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Decision Support System to Risk Stratification in the Acute Coronary Syndrome Using Fuzzy Logic.
Sci. Program., 2021

Bidirectional Language Modeling: A Systematic Literature Review.
Sci. Program., 2021

Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition.
Secur. Commun. Networks, 2021

Blockchain-Based Automated System for Identification and Storage of Networks.
Secur. Commun. Networks, 2021

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions.
Secur. Commun. Networks, 2021

Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach.
Secur. Commun. Networks, 2021

Offline Pashto Characters Dataset for OCR Systems.
Secur. Commun. Networks, 2021

Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview.
Complex., 2021

AI-Enabled Sensing and Decision-Making for IoT Systems.
Complex., 2021

An Efficient Decision Support System for the Selection of Appropriate Crowd in Crowdsourcing.
Complex., 2021

Green-Agile Maturity Model: An Evaluation Framework for Global Software Development Vendors.
IEEE Access, 2021

Making the Sourcing Decision of Software Maintenance and Information Technology.
IEEE Access, 2021

Empirical Investigation of Influencing Factors Regarding Offshore Outsourcing Decision of Application Maintenance.
IEEE Access, 2021

Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review.
IEEE Access, 2021

Empirical Investigation of Critical Requirements Engineering Practices for Global Software Development.
IEEE Access, 2021

Systematic Mapping Study on Security Approaches in Secure Software Engineering.
IEEE Access, 2021

Design and Analysis of Lightweight Authentication Protocol for Securing IoD.
IEEE Access, 2021

Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone.
IEEE Access, 2021

Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management From Vendors' Perspective.
IEEE Access, 2021

Corrections to "D2D-V2X-SDN: Taxonomy and Architecture Towards 5G Mobile Communication".
IEEE Access, 2021

D2D-V2X-SDN: Taxonomy and Architecture Towards 5G Mobile Communication System.
IEEE Access, 2021

An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm.
IEEE Access, 2021

Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client's Side Approach.
IEEE Access, 2021

Role of Critical Success Factors in Offshore Quality Requirement Change Management Using SLR.
IEEE Access, 2021

2020
Use of Big Data Tools and Industrial Internet of Things: An Overview.
Sci. Program., 2020

Software Piracy Awareness, Policy, and User Perspective in Educational Institutions.
Sci. Program., 2020

Evaluating the Role of Big Data in IIOT-Industrial Internet of Things for Executing Ranks Using the Analytic Network Process Approach.
Sci. Program., 2020

Big Data, Scientific Programming, and Its Role in Internet of Industrial Things: A Decision Support System.
Sci. Program., 2020

Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions.
Sci. Program., 2020

A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems.
Sensors, 2020

Modelling Features-Based Birthmarks for Security of End-to-End Communication System.
Secur. Commun. Networks, 2020

Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms.
Secur. Commun. Networks, 2020

Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications.
Secur. Commun. Networks, 2020

Complexity of Deep Convolutional Neural Networks in Mobile Computing.
Complex., 2020

Recognition of Different Types of Leukocytes Using YOLOv2 and Optimized Bag-of-Features.
IEEE Access, 2020

Analyzing Factors That Influence Offshore Outsourcing Decision of Application Maintenance.
IEEE Access, 2020

A Comprehensive Analysis of Healthcare Big Data Management, Analytics and Scientific Programming.
IEEE Access, 2020

Big Data Velocity Management-From Stream to Warehouse via High Performance Memory Optimized Index Join.
IEEE Access, 2020

Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review.
IEEE Access, 2020

Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network.
IEEE Access, 2020

An Integrated Design for Classification and Localization of Diabetic Foot Ulcer Based on CNN and YOLOv2-DFU Models.
IEEE Access, 2020

IoT-Enabled Smart Child Safety Digital System Architecture.
Proceedings of the IEEE 14th International Conference on Semantic Computing, 2020

Adaptive Architecture and Principles for Securing the IoT Systems.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

2019
Violators versus non-violators of information security measures in organizations - A study of distinguishing factors.
J. Organ. Comput. Electron. Commer., 2019

Measuring internet addiction in Europe-based knowledge societies: a case study of France.
Int. J. Bus. Inf. Syst., 2019

2017
Implementation of Health Information System-A Case Study of Magrabi Hospitals, KSA.
J. Comput. Sci., 2017

Big data analytics: does organizational factor matters impact technology acceptance?
J. Big Data, 2017

Possible factors affecting internet addiction: a case study of higher education students of Qatar.
Int. J. Bus. Inf. Syst., 2017

Are enterprises ready for big data analytics? A survey-based approach.
Int. J. Bus. Inf. Syst., 2017

2016
Security behaviors of smartphone users.
Inf. Comput. Secur., 2016

Factors affecting learning capacity of information technology concepts in a classroom environment of adult learner.
Proceedings of the 15th International Conference on Information Technology Based Higher Education and Training, 2016

2015
An analysis of the barriers to the proliferation of M-commerce in Qatar: A relationship modeling approach.
J. Syst. Inf. Technol., 2015

Factors influence consumers' adoption of mobile payment devices in Qatar.
Int. J. Mob. Commun., 2015

A Grey-based approach for ERP vendor selection in small and medium enterprises in Qatar.
Int. J. Bus. Inf. Syst., 2015

CAPRA: a comprehensive approach to product ranking using customer reviews.
Computing, 2015

Pedagogical potentials of IEEE 802.11 WLAN to higher educational institutions: A case study of Nigerian based University.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Ability and Hurdle to Provide Banking Online Services: A Case Study of Banking Employees in Nigeria.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
ConceptOnto: An upper ontology based on ConceptNet.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2008
Using Technologlical Tools to Solve Group Work Problems in Higher Education of Under Developing Countries: A Case Study.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008


  Loading...