Khaled M. Khan

Orcid: 0000-0002-8848-0760

Affiliations:
  • Qatar University, KINDI Computing Lab, Doha, Qatar
  • Western Sydney University, School of ComputingandInformationTechnology, Sydney, NSW, Australia
  • Southern Cross University, Lismore, NSW, Australia
  • Monash University, Clayton, VIC, Australia (PhD 2005)


According to our database1, Khaled M. Khan authored at least 80 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A machine learning-based optimization approach for pre-copy live virtual machine migration.
Clust. Comput., April, 2024

2023
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security.
IEEE Internet Things J., February, 2023

Quantifying Satisfaction of Security Requirements of Cloud Software Systems.
IEEE Trans. Cloud Comput., 2023

Effective Collaboration in the Management of Access Control Policies: A Survey of Tools.
IEEE Access, 2023

A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems.
IEEE Access, 2023

Interactive Graphical Access Control Tools.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2023

2022
Live migration of virtual machine memory content in networked systems.
Comput. Networks, 2022

2021
Threat-Specific Security Risk Evaluation in the Cloud.
IEEE Trans. Cloud Comput., 2021

Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Understanding the Impact of Emotions on the Quality of Software Artifacts.
IEEE Access, 2021

2020
Cybersecurity for industrial control systems: A survey.
Comput. Secur., 2020

A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems.
IEEE Access, 2020

Highlight on Cryptocurrencies Mining with CPUs and GPUs and their Benefits Based on their Characteristics.
Proceedings of the 10th IEEE International Conference on System Engineering and Technology, 2020

Design and Implementation of a Threat-Specific Security Risk Assessment Tool.
Proceedings of the IEEE International Conference on Informatics, 2020

Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020

2019
Matrix Barcode Based Secure Authentication without Trusting Third Party.
IT Prof., 2019

Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things.
IEEE Internet Things J., 2019

Systematic identification of threats in the cloud: A survey.
Comput. Networks, 2019

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018

Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Using Sparse Matrices to Prevent Information Leakage in Cloud Computing.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Stateless Security Risk Assessment for Dynamic Networks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Data confidentiality in cloud-based pervasive system.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2016
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming.
Int. J. Cooperative Inf. Syst., 2016

Garbled computation in cloud.
Future Gener. Comput. Syst., 2016

Using Block Cipher for Confidentiality of Images in Cloud-Based Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

2015
"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self Adapt. Syst., 2015

A Process Model for Customisation of Software in Multi-tenant SaaS Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Data Obfuscation for Privacy and Confidentiality in Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

Empowering users of cloud computing on data confidentiality.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

Reasoning about Security Policies of Services Using Answer Set Programming.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Addressing security compatibility for multi-tenant cloud services.
Int. J. Comput. Appl. Technol., 2013

Role of contextual properties in enterprise service migration to cloud computing.
Concurr. Comput. Pract. Exp., 2013

Trust in Cloud Services: Providing More Controls to Clients.
Computer, 2013

Social access control language (SocACL).
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Automatic verification of health regulatory compliance in cloud computing.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Secure Cloud Services: Matrix Multiplication Revisited.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Software Security Engineering: Design and Applications.
Int. J. Secur. Softw. Eng., 2012

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Ell Secure Information System Using Modal Logic Technique.
Int. J. Secur. Softw. Eng., 2011

Profile-Based Security Assurances for Service Software.
Proceedings of the Exploring Services Science - Second International Conference, 2011

Identifying Contextual Properties of Software Architecture in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Modal Logic for Information System Security.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Establishing Trust in Cloud Computing.
IT Prof., 2010

A Tool Support for Secure Software Integration.
Int. J. Secur. Softw. Eng., 2010

Security-Aware Service Composition for End Users of Small Enterprises.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010

2009
SecCom: A Prototype for Integrating Security-Aware Components.
Proceedings of the Information Systems: Modeling, 2009

Knowledge-Based Algorithms to Optimise e-Learning Outcome.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

2008
Wireless Networks.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Specifying Security Goals of Component Based Systems: An End-User Perspective.
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008

Assessing quality of web based systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Selecting Web Services with Security Compliances: A Managerial Perspective.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

2006
Assessing Security Properties of Software Components: A Software Engineer's Perspective.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Security-Oriented Service Composition and Evolution.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

2005
Deriving Systems Level Security Properties of Component Based Composite Systems.
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005

2004
Evolution of Software Security - A Must.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

A framework for transforming artifacts from data flow diagrams to UML.
Proceedings of the IASTED International Conference on Software Engineering, 2004

A Process Framework for Characterising Security Properties of Component-Based Software Systems.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004

Incorporating Business Requirements and Constraints in Database Conceptual Model.
Proceedings of the Conceptual Modelling 2004, 2004

2003
A Security Characterisation Framework for Trustworthy Component Based Software Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Composing Security-Aware Software.
IEEE Softw., 2002

2001
Types of software evolution and software maintenance.
J. Softw. Maintenance Res. Pract., 2001

Tasks and Methods for Software Maintenance: a process oriented framework.
Australas. J. Inf. Syst., 2001

A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001

2000
Security Characterization of Software Components and Their Composition.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000

Characterizing User Data Protection of Software Components.
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000

1999
Security Properties of Software Components.
Proceedings of the Information Security, Second International Workshop, 1999

1997
Adoption versus abandonment of CASE tools: lessons from two organizations.
Inf. Technol. People, 1997

Assessment Model for Software Maintenance Tools: A Conceptual Framework.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

1992
A redefined software life cycle model for improved maintenance.
Proceedings of the Conference on Software Maintenance, 1992


  Loading...