Khaleel Ahmad

Orcid: 0000-0002-5682-7184

According to our database1, Khaleel Ahmad authored at least 16 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Common Fixed Point Results on a Double-Controlled Metric Space for Generalized Rational-Type Contractions with Application.
Axioms, October, 2023

Opportunistic Networks: An Empirical Research of Routing Protocols and Mobility Models.
SN Comput. Sci., September, 2023

An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach.
Comput. Commun., September, 2023

Extension of a Unique Solution in Generalized Neutrosophic Cone Metric Spaces.
Symmetry, 2023

2022
Graphical Views of Intuitionistic Fuzzy Double-Controlled Metric-Like Spaces and Certain Fixed-Point Results with Application.
Symmetry, November, 2022

A novel block encryption method based on Catalan random walks.
Multim. Tools Appl., 2022

An approach to adding simple interface as security gateway architecture for IoT device.
Multim. Tools Appl., 2022

CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT using Machine Learning.
Int. J. Interact. Multim. Artif. Intell., 2022

2021
Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature.
Wirel. Commun. Mob. Comput., 2021

Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page-End page/102872].
J. Inf. Secur. Appl., 2021

Fast hybrid-MixNet for security and privacy using NTRU algorithm.
J. Inf. Secur. Appl., 2021

ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs.
Future Gener. Comput. Syst., 2021

2019
Introduction to the Special Issue on Opportunistic Network and its Security Challenges.
Scalable Comput. Pract. Exp., 2019

Node Authentication Using NTRU Algorithm in Opportunistic Network.
Scalable Comput. Pract. Exp., 2019

2011
Finite state machine based approach to prevent format string attacks.
ACM SIGSOFT Softw. Eng. Notes, 2011

Analysis of Digital Forensic Tools and Investigation Process.
Proceedings of the High Performance Architecture and Grid Computing, 2011


  Loading...