Khaled M. Khan

  • Qatar University, KINDI Computing Lab, Doha, Qatar
  • Western Sydney University, School of ComputingandInformationTechnology, Sydney, NSW, Australia
  • Southern Cross University, Lismore, NSW, Australia
  • Monash University, Clayton, VIC, Australia (PhD 2005)

According to our database1, Khaled M. Khan authored at least 71 papers between 1992 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Threat-Specific Security Risk Evaluation in the Cloud.
IEEE Trans. Cloud Comput., 2021

Understanding the Impact of Emotions on the Quality of Software Artifacts.
IEEE Access, 2021

Cybersecurity for industrial control systems: A survey.
Comput. Secur., 2020

A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems.
IEEE Access, 2020

Highlight on Cryptocurrencies Mining with CPUs and GPUs and their Benefits Based on their Characteristics.
Proceedings of the 10th IEEE International Conference on System Engineering and Technology, 2020

Design and Implementation of a Threat-Specific Security Risk Assessment Tool.
Proceedings of the IEEE International Conference on Informatics, 2020

Matrix Barcode Based Secure Authentication without Trusting Third Party.
IT Prof., 2019

Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things.
IEEE Internet Things J., 2019

Systematic identification of threats in the cloud: A survey.
Comput. Networks, 2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Using Sparse Matrices to Prevent Information Leakage in Cloud Computing.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Stateless Security Risk Assessment for Dynamic Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Data confidentiality in cloud-based pervasive system.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming.
Int. J. Cooperative Inf. Syst., 2016

Garbled computation in cloud.
Future Gener. Comput. Syst., 2016

Using Block Cipher for Confidentiality of Images in Cloud-Based Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self Adapt. Syst., 2015

A Process Model for Customisation of Software in Multi-tenant SaaS Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Data Obfuscation for Privacy and Confidentiality in Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

Empowering users of cloud computing on data confidentiality.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

Reasoning about Security Policies of Services Using Answer Set Programming.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Addressing security compatibility for multi-tenant cloud services.
Int. J. Comput. Appl. Technol., 2013

Role of contextual properties in enterprise service migration to cloud computing.
Concurr. Comput. Pract. Exp., 2013

Trust in Cloud Services: Providing More Controls to Clients.
Computer, 2013

Social access control language (SocACL).
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Automatic verification of health regulatory compliance in cloud computing.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Secure Cloud Services: Matrix Multiplication Revisited.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Software Security Engineering: Design and Applications.
Int. J. Secur. Softw. Eng., 2012

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Ell Secure Information System Using Modal Logic Technique.
Int. J. Secur. Softw. Eng., 2011

Profile-Based Security Assurances for Service Software.
Proceedings of the Exploring Services Science - Second International Conference, 2011

Identifying Contextual Properties of Software Architecture in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Modal Logic for Information System Security.
Proceedings of the Ninth Australasian Information Security Conference, 2011

Establishing Trust in Cloud Computing.
IT Prof., 2010

A Tool Support for Secure Software Integration.
Int. J. Secur. Softw. Eng., 2010

Security-Aware Service Composition for End Users of Small Enterprises.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

SecCom: A Prototype for Integrating Security-Aware Components.
Proceedings of the Information Systems: Modeling, 2009

Knowledge-Based Algorithms to Optimise e-Learning Outcome.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

Wireless Networks.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Specifying Security Goals of Component Based Systems: An End-User Perspective.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

Assessing quality of web based systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Selecting Web Services with Security Compliances: A Managerial Perspective.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

Assessing Security Properties of Software Components: A Software Engineer's Perspective.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Security-Oriented Service Composition and Evolution.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

Deriving Systems Level Security Properties of Component Based Composite Systems.
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005

Evolution of Software Security - A Must.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

A framework for transforming artifacts from data flow diagrams to UML.
Proceedings of the IASTED International Conference on Software Engineering, 2004

A Process Framework for Characterising Security Properties of Component-Based Software Systems.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004

Incorporating Business Requirements and Constraints in Database Conceptual Model.
Proceedings of the Conceptual Modelling 2004, 2004

A Security Characterisation Framework for Trustworthy Component Based Software Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Composing Security-Aware Software.
IEEE Softw., 2002

Types of software evolution and software maintenance.
J. Softw. Maintenance Res. Pract., 2001

Tasks and Methods for Software Maintenance: a process oriented framework.
Australas. J. Inf. Syst., 2001

A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001

Security Characterization of Software Components and Their Composition.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000

Characterizing User Data Protection of Software Components.
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000

Security Properties of Software Components.
Proceedings of the Information Security, Second International Workshop, 1999

Adoption versus abandonment of CASE tools: lessons from two organizations.
Inf. Technol. People, 1997

Assessment Model for Software Maintenance Tools: A Conceptual Framework.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

A redefined software life cycle model for improved maintenance.
Proceedings of the Conference on Software Maintenance, 1992